Analysis
-
max time kernel
55s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 19:54
Behavioral task
behavioral1
Sample
47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
47c43f81cb2a1efee20c87706cd21b0c
-
SHA1
3419fb89a39c9081196b5b1297f044ac48838801
-
SHA256
c2cdfe0df3732ca086ea8c5485b4d7ffabfc9c719e333ce1cb46a59a1f96b01e
-
SHA512
8f0f63ee57ee8d10a77efc2cfb5ae4decc2508a7eb2b402917cc1339a14de01c2ce3024c94aee8fba0644546a1d193376812ed355a8cf6976634b63380ed8f46
-
SSDEEP
24576:JanwhSe11QSONCpGJCjETPlGC78XCej5CnGJIOjfB7:knw9oUUEEDlGUrM5Cn2t
Malware Config
Signatures
-
XMRig Miner payload 49 IoCs
resource yara_rule behavioral2/memory/3564-12-0x00007FF7A10A0000-0x00007FF7A1491000-memory.dmp xmrig behavioral2/memory/3900-71-0x00007FF7C8310000-0x00007FF7C8701000-memory.dmp xmrig behavioral2/memory/4804-285-0x00007FF6E8FF0000-0x00007FF6E93E1000-memory.dmp xmrig behavioral2/memory/1776-288-0x00007FF6D2700000-0x00007FF6D2AF1000-memory.dmp xmrig behavioral2/memory/3156-289-0x00007FF695270000-0x00007FF695661000-memory.dmp xmrig behavioral2/memory/648-296-0x00007FF708710000-0x00007FF708B01000-memory.dmp xmrig behavioral2/memory/4188-302-0x00007FF783A20000-0x00007FF783E11000-memory.dmp xmrig behavioral2/memory/5108-308-0x00007FF7BF4B0000-0x00007FF7BF8A1000-memory.dmp xmrig behavioral2/memory/4584-314-0x00007FF70E1B0000-0x00007FF70E5A1000-memory.dmp xmrig behavioral2/memory/1344-312-0x00007FF7BBEE0000-0x00007FF7BC2D1000-memory.dmp xmrig behavioral2/memory/3672-326-0x00007FF7A6020000-0x00007FF7A6411000-memory.dmp xmrig behavioral2/memory/3292-328-0x00007FF6D5B10000-0x00007FF6D5F01000-memory.dmp xmrig behavioral2/memory/748-334-0x00007FF7C2300000-0x00007FF7C26F1000-memory.dmp xmrig behavioral2/memory/5092-292-0x00007FF690EF0000-0x00007FF6912E1000-memory.dmp xmrig behavioral2/memory/2120-72-0x00007FF77A680000-0x00007FF77AA71000-memory.dmp xmrig behavioral2/memory/1276-70-0x00007FF75E080000-0x00007FF75E471000-memory.dmp xmrig behavioral2/memory/400-53-0x00007FF6B6B70000-0x00007FF6B6F61000-memory.dmp xmrig behavioral2/memory/2488-1373-0x00007FF69F180000-0x00007FF69F571000-memory.dmp xmrig behavioral2/memory/4360-1822-0x00007FF7FDCE0000-0x00007FF7FE0D1000-memory.dmp xmrig behavioral2/memory/2068-1820-0x00007FF75AFC0000-0x00007FF75B3B1000-memory.dmp xmrig behavioral2/memory/3272-1991-0x00007FF67E530000-0x00007FF67E921000-memory.dmp xmrig behavioral2/memory/1132-2008-0x00007FF7C2810000-0x00007FF7C2C01000-memory.dmp xmrig behavioral2/memory/2484-2009-0x00007FF6E3A80000-0x00007FF6E3E71000-memory.dmp xmrig behavioral2/memory/4512-2023-0x00007FF671BB0000-0x00007FF671FA1000-memory.dmp xmrig behavioral2/memory/1276-2026-0x00007FF75E080000-0x00007FF75E471000-memory.dmp xmrig behavioral2/memory/3564-2179-0x00007FF7A10A0000-0x00007FF7A1491000-memory.dmp xmrig behavioral2/memory/3900-2181-0x00007FF7C8310000-0x00007FF7C8701000-memory.dmp xmrig behavioral2/memory/2488-2183-0x00007FF69F180000-0x00007FF69F571000-memory.dmp xmrig behavioral2/memory/2068-2215-0x00007FF75AFC0000-0x00007FF75B3B1000-memory.dmp xmrig behavioral2/memory/4360-2217-0x00007FF7FDCE0000-0x00007FF7FE0D1000-memory.dmp xmrig behavioral2/memory/3272-2219-0x00007FF67E530000-0x00007FF67E921000-memory.dmp xmrig behavioral2/memory/400-2221-0x00007FF6B6B70000-0x00007FF6B6F61000-memory.dmp xmrig behavioral2/memory/2884-2223-0x00007FF6B94C0000-0x00007FF6B98B1000-memory.dmp xmrig behavioral2/memory/2120-2232-0x00007FF77A680000-0x00007FF77AA71000-memory.dmp xmrig behavioral2/memory/2484-2231-0x00007FF6E3A80000-0x00007FF6E3E71000-memory.dmp xmrig behavioral2/memory/4804-2237-0x00007FF6E8FF0000-0x00007FF6E93E1000-memory.dmp xmrig behavioral2/memory/4512-2240-0x00007FF671BB0000-0x00007FF671FA1000-memory.dmp xmrig behavioral2/memory/4188-2244-0x00007FF783A20000-0x00007FF783E11000-memory.dmp xmrig behavioral2/memory/5092-2242-0x00007FF690EF0000-0x00007FF6912E1000-memory.dmp xmrig behavioral2/memory/1344-2250-0x00007FF7BBEE0000-0x00007FF7BC2D1000-memory.dmp xmrig behavioral2/memory/5108-2248-0x00007FF7BF4B0000-0x00007FF7BF8A1000-memory.dmp xmrig behavioral2/memory/4584-2252-0x00007FF70E1B0000-0x00007FF70E5A1000-memory.dmp xmrig behavioral2/memory/648-2247-0x00007FF708710000-0x00007FF708B01000-memory.dmp xmrig behavioral2/memory/1776-2239-0x00007FF6D2700000-0x00007FF6D2AF1000-memory.dmp xmrig behavioral2/memory/3156-2235-0x00007FF695270000-0x00007FF695661000-memory.dmp xmrig behavioral2/memory/3292-2260-0x00007FF6D5B10000-0x00007FF6D5F01000-memory.dmp xmrig behavioral2/memory/748-2258-0x00007FF7C2300000-0x00007FF7C26F1000-memory.dmp xmrig behavioral2/memory/3672-2257-0x00007FF7A6020000-0x00007FF7A6411000-memory.dmp xmrig behavioral2/memory/1132-2334-0x00007FF7C2810000-0x00007FF7C2C01000-memory.dmp xmrig -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 64 IoCs
pid Process 3564 yZlJUJe.exe 3900 MWMixeV.exe 2488 DlqcvdC.exe 2068 OKaCKXR.exe 4360 rVBASuA.exe 3272 QGpoaHk.exe 2884 doxjyKA.exe 400 ylhlvJB.exe 1132 ndXvTHX.exe 2484 ytGOHSo.exe 2120 cfOTCUU.exe 4512 hWSaKEm.exe 4804 yNvtfuG.exe 1776 NRlplqg.exe 3156 hvoPDnI.exe 5092 aVJNxYA.exe 648 qGHwAvg.exe 4188 pIoQAAE.exe 5108 YDrlKBC.exe 1344 wAfhsVt.exe 4584 pxlvADI.exe 3672 aXyhXvl.exe 3292 bZddQzz.exe 748 IlHJRPD.exe 3320 brbjdkD.exe 4376 dPqvvNk.exe 440 EyRPOOC.exe 860 TgKsHMU.exe 2088 vRZtKYY.exe 1824 JyOvHDF.exe 4664 KqLXBvj.exe 4668 AzFHEtj.exe 4864 AYkfbGN.exe 4928 JkUXPhl.exe 4824 vQnSgne.exe 1960 WrmjAbE.exe 832 xOdewoh.exe 4736 bFjNjcB.exe 5084 VWtYgIa.exe 3400 MujNtsD.exe 4468 lkypLyL.exe 4752 gFAzwnx.exe 2288 QEdqaUi.exe 4152 FfTNDGn.exe 4712 NArzKXM.exe 1388 MRmLCja.exe 2108 UDuBHtN.exe 2676 gwOGfrN.exe 700 TWmlSxS.exe 3756 GncfDtj.exe 3584 VwFRWKm.exe 4604 gsgaPEo.exe 1692 aQTzOJP.exe 4336 nbFpHKW.exe 1904 vOmbqIN.exe 3568 aLpFUcH.exe 1916 ikJJaQu.exe 2848 UAmyTUv.exe 4356 mxzvVwl.exe 2412 raJWegn.exe 228 OGBUKfl.exe 4868 vWAesxw.exe 4740 zTKhVOs.exe 2352 hNBXCKz.exe -
resource yara_rule behavioral2/memory/1276-0-0x00007FF75E080000-0x00007FF75E471000-memory.dmp upx behavioral2/files/0x000700000002327d-5.dat upx behavioral2/files/0x0007000000023439-9.dat upx behavioral2/memory/3900-16-0x00007FF7C8310000-0x00007FF7C8701000-memory.dmp upx behavioral2/memory/2488-20-0x00007FF69F180000-0x00007FF69F571000-memory.dmp upx behavioral2/files/0x0008000000023438-15.dat upx behavioral2/memory/3564-12-0x00007FF7A10A0000-0x00007FF7A1491000-memory.dmp upx behavioral2/files/0x000700000002343a-23.dat upx behavioral2/files/0x000700000002343b-29.dat upx behavioral2/files/0x0008000000023436-36.dat upx behavioral2/files/0x000700000002343c-35.dat upx behavioral2/memory/4360-39-0x00007FF7FDCE0000-0x00007FF7FE0D1000-memory.dmp upx behavioral2/files/0x000700000002343d-49.dat upx behavioral2/memory/1132-57-0x00007FF7C2810000-0x00007FF7C2C01000-memory.dmp upx behavioral2/memory/2484-61-0x00007FF6E3A80000-0x00007FF6E3E71000-memory.dmp upx behavioral2/files/0x0007000000023440-64.dat upx behavioral2/files/0x0007000000023441-67.dat upx behavioral2/memory/3900-71-0x00007FF7C8310000-0x00007FF7C8701000-memory.dmp upx behavioral2/files/0x0007000000023443-79.dat upx behavioral2/files/0x0007000000023448-104.dat upx behavioral2/files/0x000700000002344b-119.dat upx behavioral2/files/0x000700000002344d-129.dat upx behavioral2/files/0x000700000002344f-139.dat upx behavioral2/files/0x0007000000023453-159.dat upx behavioral2/memory/4804-285-0x00007FF6E8FF0000-0x00007FF6E93E1000-memory.dmp upx behavioral2/memory/1776-288-0x00007FF6D2700000-0x00007FF6D2AF1000-memory.dmp upx behavioral2/memory/3156-289-0x00007FF695270000-0x00007FF695661000-memory.dmp upx behavioral2/memory/648-296-0x00007FF708710000-0x00007FF708B01000-memory.dmp upx behavioral2/memory/4188-302-0x00007FF783A20000-0x00007FF783E11000-memory.dmp upx behavioral2/memory/5108-308-0x00007FF7BF4B0000-0x00007FF7BF8A1000-memory.dmp upx behavioral2/memory/4584-314-0x00007FF70E1B0000-0x00007FF70E5A1000-memory.dmp upx behavioral2/memory/1344-312-0x00007FF7BBEE0000-0x00007FF7BC2D1000-memory.dmp upx behavioral2/memory/3672-326-0x00007FF7A6020000-0x00007FF7A6411000-memory.dmp upx behavioral2/memory/3292-328-0x00007FF6D5B10000-0x00007FF6D5F01000-memory.dmp upx behavioral2/memory/748-334-0x00007FF7C2300000-0x00007FF7C26F1000-memory.dmp upx behavioral2/memory/5092-292-0x00007FF690EF0000-0x00007FF6912E1000-memory.dmp upx behavioral2/files/0x0007000000023456-174.dat upx behavioral2/files/0x0007000000023455-172.dat upx behavioral2/files/0x0007000000023454-164.dat upx behavioral2/files/0x0007000000023452-157.dat upx behavioral2/files/0x0007000000023451-149.dat upx behavioral2/files/0x0007000000023450-144.dat upx behavioral2/files/0x000700000002344e-134.dat upx behavioral2/files/0x000700000002344c-124.dat upx behavioral2/files/0x000700000002344a-114.dat upx behavioral2/files/0x0007000000023449-109.dat upx behavioral2/files/0x0007000000023447-99.dat upx behavioral2/files/0x0007000000023446-94.dat upx behavioral2/files/0x0007000000023445-89.dat upx behavioral2/files/0x0007000000023444-84.dat upx behavioral2/memory/4512-74-0x00007FF671BB0000-0x00007FF671FA1000-memory.dmp upx behavioral2/memory/2120-72-0x00007FF77A680000-0x00007FF77AA71000-memory.dmp upx behavioral2/memory/1276-70-0x00007FF75E080000-0x00007FF75E471000-memory.dmp upx behavioral2/files/0x000700000002343f-63.dat upx behavioral2/files/0x000700000002343e-60.dat upx behavioral2/memory/400-53-0x00007FF6B6B70000-0x00007FF6B6F61000-memory.dmp upx behavioral2/memory/3272-43-0x00007FF67E530000-0x00007FF67E921000-memory.dmp upx behavioral2/memory/2884-41-0x00007FF6B94C0000-0x00007FF6B98B1000-memory.dmp upx behavioral2/memory/2068-32-0x00007FF75AFC0000-0x00007FF75B3B1000-memory.dmp upx behavioral2/memory/2488-1373-0x00007FF69F180000-0x00007FF69F571000-memory.dmp upx behavioral2/memory/4360-1822-0x00007FF7FDCE0000-0x00007FF7FE0D1000-memory.dmp upx behavioral2/memory/2068-1820-0x00007FF75AFC0000-0x00007FF75B3B1000-memory.dmp upx behavioral2/memory/3272-1991-0x00007FF67E530000-0x00007FF67E921000-memory.dmp upx behavioral2/memory/1132-2008-0x00007FF7C2810000-0x00007FF7C2C01000-memory.dmp upx -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\RyMrnyz.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\zAyNzWy.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\HYscdsj.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\mpdlXPg.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\wzfJrsh.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\ObHAaJH.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\hvoPDnI.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\blrwkaF.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\TbNrHOi.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\cfOTCUU.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\yNvtfuG.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\iSRQpRt.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\RQLGBhI.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\NRlplqg.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\vuYlIQz.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\xraOdoJ.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\aVIclht.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\azthRPQ.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\gFoTvik.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\pQxAdeW.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\kaFeVPa.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\KsghsFG.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\WAizdAv.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\yXijHMh.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\HKLStwt.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\rPKUGCh.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\kcOELra.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\RuTlEHe.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\GrRtMBK.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\CBxhAsX.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\hMTDzJD.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\cpokBYj.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\WxuHyWu.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\dKRwnTR.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\zAYPFLw.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\fZTWgPX.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\AYyAXCk.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\KqLXBvj.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\MujNtsD.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\VoGsinH.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\nlxqatL.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\aARiSyS.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\wepJXDj.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\IHDyIWx.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\KqiSFEV.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\aQTzOJP.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\hDINTwd.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\cBCgwNh.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\sTtzJUj.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\xTgiYcI.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\AbrcXzD.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\vaBecXD.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\pIYZDTF.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\MveMMNi.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\cUXLWMD.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\ndRTqIY.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\PvXTERG.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\ylhlvJB.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\dALQOKv.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\fqobzyN.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\vBqKjGG.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\kOeuONl.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\aAMtouW.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe File created C:\Windows\System32\yiMRUlB.exe 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-711569230-3659488422-571408806-1000\{F555633D-A84A-4697-9F9B-DD4E2F002046} explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHost = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-711569230-3659488422-571408806-1000\{1EDDFE34-71C2-490F-98A0-D3546FDD7D19} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHost = 6801000088020000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-711569230-3659488422-571408806-1000\{57E4ED73-63E6-482A-8A0D-8B3F96917B2D} explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-711569230-3659488422-571408806-1000\{C7D0D771-6659-47A9-8AE8-8E32656EA579} explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 14060 explorer.exe Token: SeCreatePagefilePrivilege 14060 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe Token: SeShutdownPrivilege 2400 explorer.exe Token: SeCreatePagefilePrivilege 2400 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 13680 sihost.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 14060 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 2400 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8536 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe 8936 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4300 StartMenuExperienceHost.exe 4420 StartMenuExperienceHost.exe 14080 SearchApp.exe 6820 StartMenuExperienceHost.exe 7152 StartMenuExperienceHost.exe 4460 SearchApp.exe 3592 StartMenuExperienceHost.exe 13560 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 3564 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 83 PID 1276 wrote to memory of 3564 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 83 PID 1276 wrote to memory of 3900 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 84 PID 1276 wrote to memory of 3900 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 84 PID 1276 wrote to memory of 2488 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 85 PID 1276 wrote to memory of 2488 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 85 PID 1276 wrote to memory of 2068 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 86 PID 1276 wrote to memory of 2068 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 86 PID 1276 wrote to memory of 4360 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 87 PID 1276 wrote to memory of 4360 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 87 PID 1276 wrote to memory of 3272 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 88 PID 1276 wrote to memory of 3272 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 88 PID 1276 wrote to memory of 2884 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 89 PID 1276 wrote to memory of 2884 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 89 PID 1276 wrote to memory of 400 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 90 PID 1276 wrote to memory of 400 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 90 PID 1276 wrote to memory of 1132 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 91 PID 1276 wrote to memory of 1132 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 91 PID 1276 wrote to memory of 2484 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 92 PID 1276 wrote to memory of 2484 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 92 PID 1276 wrote to memory of 2120 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 93 PID 1276 wrote to memory of 2120 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 93 PID 1276 wrote to memory of 4512 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 94 PID 1276 wrote to memory of 4512 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 94 PID 1276 wrote to memory of 4804 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 95 PID 1276 wrote to memory of 4804 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 95 PID 1276 wrote to memory of 1776 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 96 PID 1276 wrote to memory of 1776 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 96 PID 1276 wrote to memory of 3156 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 97 PID 1276 wrote to memory of 3156 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 97 PID 1276 wrote to memory of 5092 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 98 PID 1276 wrote to memory of 5092 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 98 PID 1276 wrote to memory of 648 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 99 PID 1276 wrote to memory of 648 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 99 PID 1276 wrote to memory of 4188 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 100 PID 1276 wrote to memory of 4188 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 100 PID 1276 wrote to memory of 5108 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 101 PID 1276 wrote to memory of 5108 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 101 PID 1276 wrote to memory of 1344 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 102 PID 1276 wrote to memory of 1344 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 102 PID 1276 wrote to memory of 4584 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 103 PID 1276 wrote to memory of 4584 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 103 PID 1276 wrote to memory of 3672 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 104 PID 1276 wrote to memory of 3672 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 104 PID 1276 wrote to memory of 3292 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 105 PID 1276 wrote to memory of 3292 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 105 PID 1276 wrote to memory of 748 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 106 PID 1276 wrote to memory of 748 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 106 PID 1276 wrote to memory of 3320 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 107 PID 1276 wrote to memory of 3320 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 107 PID 1276 wrote to memory of 4376 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 108 PID 1276 wrote to memory of 4376 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 108 PID 1276 wrote to memory of 440 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 109 PID 1276 wrote to memory of 440 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 109 PID 1276 wrote to memory of 860 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 110 PID 1276 wrote to memory of 860 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 110 PID 1276 wrote to memory of 2088 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 111 PID 1276 wrote to memory of 2088 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 111 PID 1276 wrote to memory of 1824 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 112 PID 1276 wrote to memory of 1824 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 112 PID 1276 wrote to memory of 4664 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 113 PID 1276 wrote to memory of 4664 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 113 PID 1276 wrote to memory of 4668 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 114 PID 1276 wrote to memory of 4668 1276 47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\47c43f81cb2a1efee20c87706cd21b0c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\System32\yZlJUJe.exeC:\Windows\System32\yZlJUJe.exe2⤵
- Executes dropped EXE
PID:3564
-
-
C:\Windows\System32\MWMixeV.exeC:\Windows\System32\MWMixeV.exe2⤵
- Executes dropped EXE
PID:3900
-
-
C:\Windows\System32\DlqcvdC.exeC:\Windows\System32\DlqcvdC.exe2⤵
- Executes dropped EXE
PID:2488
-
-
C:\Windows\System32\OKaCKXR.exeC:\Windows\System32\OKaCKXR.exe2⤵
- Executes dropped EXE
PID:2068
-
-
C:\Windows\System32\rVBASuA.exeC:\Windows\System32\rVBASuA.exe2⤵
- Executes dropped EXE
PID:4360
-
-
C:\Windows\System32\QGpoaHk.exeC:\Windows\System32\QGpoaHk.exe2⤵
- Executes dropped EXE
PID:3272
-
-
C:\Windows\System32\doxjyKA.exeC:\Windows\System32\doxjyKA.exe2⤵
- Executes dropped EXE
PID:2884
-
-
C:\Windows\System32\ylhlvJB.exeC:\Windows\System32\ylhlvJB.exe2⤵
- Executes dropped EXE
PID:400
-
-
C:\Windows\System32\ndXvTHX.exeC:\Windows\System32\ndXvTHX.exe2⤵
- Executes dropped EXE
PID:1132
-
-
C:\Windows\System32\ytGOHSo.exeC:\Windows\System32\ytGOHSo.exe2⤵
- Executes dropped EXE
PID:2484
-
-
C:\Windows\System32\cfOTCUU.exeC:\Windows\System32\cfOTCUU.exe2⤵
- Executes dropped EXE
PID:2120
-
-
C:\Windows\System32\hWSaKEm.exeC:\Windows\System32\hWSaKEm.exe2⤵
- Executes dropped EXE
PID:4512
-
-
C:\Windows\System32\yNvtfuG.exeC:\Windows\System32\yNvtfuG.exe2⤵
- Executes dropped EXE
PID:4804
-
-
C:\Windows\System32\NRlplqg.exeC:\Windows\System32\NRlplqg.exe2⤵
- Executes dropped EXE
PID:1776
-
-
C:\Windows\System32\hvoPDnI.exeC:\Windows\System32\hvoPDnI.exe2⤵
- Executes dropped EXE
PID:3156
-
-
C:\Windows\System32\aVJNxYA.exeC:\Windows\System32\aVJNxYA.exe2⤵
- Executes dropped EXE
PID:5092
-
-
C:\Windows\System32\qGHwAvg.exeC:\Windows\System32\qGHwAvg.exe2⤵
- Executes dropped EXE
PID:648
-
-
C:\Windows\System32\pIoQAAE.exeC:\Windows\System32\pIoQAAE.exe2⤵
- Executes dropped EXE
PID:4188
-
-
C:\Windows\System32\YDrlKBC.exeC:\Windows\System32\YDrlKBC.exe2⤵
- Executes dropped EXE
PID:5108
-
-
C:\Windows\System32\wAfhsVt.exeC:\Windows\System32\wAfhsVt.exe2⤵
- Executes dropped EXE
PID:1344
-
-
C:\Windows\System32\pxlvADI.exeC:\Windows\System32\pxlvADI.exe2⤵
- Executes dropped EXE
PID:4584
-
-
C:\Windows\System32\aXyhXvl.exeC:\Windows\System32\aXyhXvl.exe2⤵
- Executes dropped EXE
PID:3672
-
-
C:\Windows\System32\bZddQzz.exeC:\Windows\System32\bZddQzz.exe2⤵
- Executes dropped EXE
PID:3292
-
-
C:\Windows\System32\IlHJRPD.exeC:\Windows\System32\IlHJRPD.exe2⤵
- Executes dropped EXE
PID:748
-
-
C:\Windows\System32\brbjdkD.exeC:\Windows\System32\brbjdkD.exe2⤵
- Executes dropped EXE
PID:3320
-
-
C:\Windows\System32\dPqvvNk.exeC:\Windows\System32\dPqvvNk.exe2⤵
- Executes dropped EXE
PID:4376
-
-
C:\Windows\System32\EyRPOOC.exeC:\Windows\System32\EyRPOOC.exe2⤵
- Executes dropped EXE
PID:440
-
-
C:\Windows\System32\TgKsHMU.exeC:\Windows\System32\TgKsHMU.exe2⤵
- Executes dropped EXE
PID:860
-
-
C:\Windows\System32\vRZtKYY.exeC:\Windows\System32\vRZtKYY.exe2⤵
- Executes dropped EXE
PID:2088
-
-
C:\Windows\System32\JyOvHDF.exeC:\Windows\System32\JyOvHDF.exe2⤵
- Executes dropped EXE
PID:1824
-
-
C:\Windows\System32\KqLXBvj.exeC:\Windows\System32\KqLXBvj.exe2⤵
- Executes dropped EXE
PID:4664
-
-
C:\Windows\System32\AzFHEtj.exeC:\Windows\System32\AzFHEtj.exe2⤵
- Executes dropped EXE
PID:4668
-
-
C:\Windows\System32\AYkfbGN.exeC:\Windows\System32\AYkfbGN.exe2⤵
- Executes dropped EXE
PID:4864
-
-
C:\Windows\System32\JkUXPhl.exeC:\Windows\System32\JkUXPhl.exe2⤵
- Executes dropped EXE
PID:4928
-
-
C:\Windows\System32\vQnSgne.exeC:\Windows\System32\vQnSgne.exe2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\System32\WrmjAbE.exeC:\Windows\System32\WrmjAbE.exe2⤵
- Executes dropped EXE
PID:1960
-
-
C:\Windows\System32\xOdewoh.exeC:\Windows\System32\xOdewoh.exe2⤵
- Executes dropped EXE
PID:832
-
-
C:\Windows\System32\bFjNjcB.exeC:\Windows\System32\bFjNjcB.exe2⤵
- Executes dropped EXE
PID:4736
-
-
C:\Windows\System32\VWtYgIa.exeC:\Windows\System32\VWtYgIa.exe2⤵
- Executes dropped EXE
PID:5084
-
-
C:\Windows\System32\MujNtsD.exeC:\Windows\System32\MujNtsD.exe2⤵
- Executes dropped EXE
PID:3400
-
-
C:\Windows\System32\lkypLyL.exeC:\Windows\System32\lkypLyL.exe2⤵
- Executes dropped EXE
PID:4468
-
-
C:\Windows\System32\gFAzwnx.exeC:\Windows\System32\gFAzwnx.exe2⤵
- Executes dropped EXE
PID:4752
-
-
C:\Windows\System32\QEdqaUi.exeC:\Windows\System32\QEdqaUi.exe2⤵
- Executes dropped EXE
PID:2288
-
-
C:\Windows\System32\FfTNDGn.exeC:\Windows\System32\FfTNDGn.exe2⤵
- Executes dropped EXE
PID:4152
-
-
C:\Windows\System32\NArzKXM.exeC:\Windows\System32\NArzKXM.exe2⤵
- Executes dropped EXE
PID:4712
-
-
C:\Windows\System32\MRmLCja.exeC:\Windows\System32\MRmLCja.exe2⤵
- Executes dropped EXE
PID:1388
-
-
C:\Windows\System32\UDuBHtN.exeC:\Windows\System32\UDuBHtN.exe2⤵
- Executes dropped EXE
PID:2108
-
-
C:\Windows\System32\gwOGfrN.exeC:\Windows\System32\gwOGfrN.exe2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\System32\TWmlSxS.exeC:\Windows\System32\TWmlSxS.exe2⤵
- Executes dropped EXE
PID:700
-
-
C:\Windows\System32\GncfDtj.exeC:\Windows\System32\GncfDtj.exe2⤵
- Executes dropped EXE
PID:3756
-
-
C:\Windows\System32\VwFRWKm.exeC:\Windows\System32\VwFRWKm.exe2⤵
- Executes dropped EXE
PID:3584
-
-
C:\Windows\System32\gsgaPEo.exeC:\Windows\System32\gsgaPEo.exe2⤵
- Executes dropped EXE
PID:4604
-
-
C:\Windows\System32\aQTzOJP.exeC:\Windows\System32\aQTzOJP.exe2⤵
- Executes dropped EXE
PID:1692
-
-
C:\Windows\System32\nbFpHKW.exeC:\Windows\System32\nbFpHKW.exe2⤵
- Executes dropped EXE
PID:4336
-
-
C:\Windows\System32\vOmbqIN.exeC:\Windows\System32\vOmbqIN.exe2⤵
- Executes dropped EXE
PID:1904
-
-
C:\Windows\System32\aLpFUcH.exeC:\Windows\System32\aLpFUcH.exe2⤵
- Executes dropped EXE
PID:3568
-
-
C:\Windows\System32\ikJJaQu.exeC:\Windows\System32\ikJJaQu.exe2⤵
- Executes dropped EXE
PID:1916
-
-
C:\Windows\System32\UAmyTUv.exeC:\Windows\System32\UAmyTUv.exe2⤵
- Executes dropped EXE
PID:2848
-
-
C:\Windows\System32\mxzvVwl.exeC:\Windows\System32\mxzvVwl.exe2⤵
- Executes dropped EXE
PID:4356
-
-
C:\Windows\System32\raJWegn.exeC:\Windows\System32\raJWegn.exe2⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\System32\OGBUKfl.exeC:\Windows\System32\OGBUKfl.exe2⤵
- Executes dropped EXE
PID:228
-
-
C:\Windows\System32\vWAesxw.exeC:\Windows\System32\vWAesxw.exe2⤵
- Executes dropped EXE
PID:4868
-
-
C:\Windows\System32\zTKhVOs.exeC:\Windows\System32\zTKhVOs.exe2⤵
- Executes dropped EXE
PID:4740
-
-
C:\Windows\System32\hNBXCKz.exeC:\Windows\System32\hNBXCKz.exe2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\System32\HXxFqOo.exeC:\Windows\System32\HXxFqOo.exe2⤵PID:1380
-
-
C:\Windows\System32\WRtlMFg.exeC:\Windows\System32\WRtlMFg.exe2⤵PID:1356
-
-
C:\Windows\System32\rvoLlSs.exeC:\Windows\System32\rvoLlSs.exe2⤵PID:2808
-
-
C:\Windows\System32\kQojHor.exeC:\Windows\System32\kQojHor.exe2⤵PID:3348
-
-
C:\Windows\System32\uZLhkGY.exeC:\Windows\System32\uZLhkGY.exe2⤵PID:1384
-
-
C:\Windows\System32\wnrpIWD.exeC:\Windows\System32\wnrpIWD.exe2⤵PID:368
-
-
C:\Windows\System32\eCqqZAK.exeC:\Windows\System32\eCqqZAK.exe2⤵PID:2044
-
-
C:\Windows\System32\Ulzmomm.exeC:\Windows\System32\Ulzmomm.exe2⤵PID:3592
-
-
C:\Windows\System32\pLszXxN.exeC:\Windows\System32\pLszXxN.exe2⤵PID:4316
-
-
C:\Windows\System32\TCXkYGz.exeC:\Windows\System32\TCXkYGz.exe2⤵PID:3404
-
-
C:\Windows\System32\msIvrom.exeC:\Windows\System32\msIvrom.exe2⤵PID:2752
-
-
C:\Windows\System32\ULlNQTg.exeC:\Windows\System32\ULlNQTg.exe2⤵PID:4452
-
-
C:\Windows\System32\hDINTwd.exeC:\Windows\System32\hDINTwd.exe2⤵PID:4536
-
-
C:\Windows\System32\pWGtYdq.exeC:\Windows\System32\pWGtYdq.exe2⤵PID:4456
-
-
C:\Windows\System32\iVcZiFc.exeC:\Windows\System32\iVcZiFc.exe2⤵PID:1600
-
-
C:\Windows\System32\QNMsgiK.exeC:\Windows\System32\QNMsgiK.exe2⤵PID:4216
-
-
C:\Windows\System32\vIlHfFb.exeC:\Windows\System32\vIlHfFb.exe2⤵PID:2512
-
-
C:\Windows\System32\MRfjKYH.exeC:\Windows\System32\MRfjKYH.exe2⤵PID:4252
-
-
C:\Windows\System32\PIhKOZa.exeC:\Windows\System32\PIhKOZa.exe2⤵PID:1200
-
-
C:\Windows\System32\LVFnLMG.exeC:\Windows\System32\LVFnLMG.exe2⤵PID:964
-
-
C:\Windows\System32\PMLrYkf.exeC:\Windows\System32\PMLrYkf.exe2⤵PID:1664
-
-
C:\Windows\System32\AcPpGHh.exeC:\Windows\System32\AcPpGHh.exe2⤵PID:3004
-
-
C:\Windows\System32\gYuRlPL.exeC:\Windows\System32\gYuRlPL.exe2⤵PID:4100
-
-
C:\Windows\System32\rVKBuyv.exeC:\Windows\System32\rVKBuyv.exe2⤵PID:2368
-
-
C:\Windows\System32\pHggPMw.exeC:\Windows\System32\pHggPMw.exe2⤵PID:2900
-
-
C:\Windows\System32\HFFixTg.exeC:\Windows\System32\HFFixTg.exe2⤵PID:1464
-
-
C:\Windows\System32\MduYoss.exeC:\Windows\System32\MduYoss.exe2⤵PID:4760
-
-
C:\Windows\System32\VhkQjRI.exeC:\Windows\System32\VhkQjRI.exe2⤵PID:4924
-
-
C:\Windows\System32\bkTJCMy.exeC:\Windows\System32\bkTJCMy.exe2⤵PID:2144
-
-
C:\Windows\System32\FwPHZBq.exeC:\Windows\System32\FwPHZBq.exe2⤵PID:1816
-
-
C:\Windows\System32\pQSJtNE.exeC:\Windows\System32\pQSJtNE.exe2⤵PID:4032
-
-
C:\Windows\System32\azthRPQ.exeC:\Windows\System32\azthRPQ.exe2⤵PID:3280
-
-
C:\Windows\System32\VcfEJHL.exeC:\Windows\System32\VcfEJHL.exe2⤵PID:3764
-
-
C:\Windows\System32\XPaVyFB.exeC:\Windows\System32\XPaVyFB.exe2⤵PID:4312
-
-
C:\Windows\System32\ACuczdq.exeC:\Windows\System32\ACuczdq.exe2⤵PID:5140
-
-
C:\Windows\System32\EYXhdQG.exeC:\Windows\System32\EYXhdQG.exe2⤵PID:5208
-
-
C:\Windows\System32\hDFPpzd.exeC:\Windows\System32\hDFPpzd.exe2⤵PID:5252
-
-
C:\Windows\System32\zAYPFLw.exeC:\Windows\System32\zAYPFLw.exe2⤵PID:5292
-
-
C:\Windows\System32\fdnDZoy.exeC:\Windows\System32\fdnDZoy.exe2⤵PID:5320
-
-
C:\Windows\System32\yFlUwCV.exeC:\Windows\System32\yFlUwCV.exe2⤵PID:5344
-
-
C:\Windows\System32\hjxZJGX.exeC:\Windows\System32\hjxZJGX.exe2⤵PID:5384
-
-
C:\Windows\System32\uQAlVKQ.exeC:\Windows\System32\uQAlVKQ.exe2⤵PID:5408
-
-
C:\Windows\System32\gPSGmHf.exeC:\Windows\System32\gPSGmHf.exe2⤵PID:5428
-
-
C:\Windows\System32\hALPbTj.exeC:\Windows\System32\hALPbTj.exe2⤵PID:5452
-
-
C:\Windows\System32\UBJyPSc.exeC:\Windows\System32\UBJyPSc.exe2⤵PID:5504
-
-
C:\Windows\System32\xfxaUcW.exeC:\Windows\System32\xfxaUcW.exe2⤵PID:5544
-
-
C:\Windows\System32\LsasiCG.exeC:\Windows\System32\LsasiCG.exe2⤵PID:5568
-
-
C:\Windows\System32\QqkpsXW.exeC:\Windows\System32\QqkpsXW.exe2⤵PID:5592
-
-
C:\Windows\System32\CvgidqF.exeC:\Windows\System32\CvgidqF.exe2⤵PID:5628
-
-
C:\Windows\System32\dALQOKv.exeC:\Windows\System32\dALQOKv.exe2⤵PID:5644
-
-
C:\Windows\System32\IFPdiDn.exeC:\Windows\System32\IFPdiDn.exe2⤵PID:5680
-
-
C:\Windows\System32\mjyuanm.exeC:\Windows\System32\mjyuanm.exe2⤵PID:5720
-
-
C:\Windows\System32\qtkgSsm.exeC:\Windows\System32\qtkgSsm.exe2⤵PID:5764
-
-
C:\Windows\System32\xLRGfSS.exeC:\Windows\System32\xLRGfSS.exe2⤵PID:5784
-
-
C:\Windows\System32\tvsCZKP.exeC:\Windows\System32\tvsCZKP.exe2⤵PID:5800
-
-
C:\Windows\System32\lPgZSbp.exeC:\Windows\System32\lPgZSbp.exe2⤵PID:5820
-
-
C:\Windows\System32\JdrJyeA.exeC:\Windows\System32\JdrJyeA.exe2⤵PID:5836
-
-
C:\Windows\System32\BZERoWO.exeC:\Windows\System32\BZERoWO.exe2⤵PID:5896
-
-
C:\Windows\System32\ceKcuRS.exeC:\Windows\System32\ceKcuRS.exe2⤵PID:5924
-
-
C:\Windows\System32\ulZpwPG.exeC:\Windows\System32\ulZpwPG.exe2⤵PID:5948
-
-
C:\Windows\System32\DrrzeTc.exeC:\Windows\System32\DrrzeTc.exe2⤵PID:5964
-
-
C:\Windows\System32\opHukYP.exeC:\Windows\System32\opHukYP.exe2⤵PID:5992
-
-
C:\Windows\System32\lcMTtQd.exeC:\Windows\System32\lcMTtQd.exe2⤵PID:6020
-
-
C:\Windows\System32\tjTxKXz.exeC:\Windows\System32\tjTxKXz.exe2⤵PID:6060
-
-
C:\Windows\System32\bCfHUPq.exeC:\Windows\System32\bCfHUPq.exe2⤵PID:6088
-
-
C:\Windows\System32\MpLwkBG.exeC:\Windows\System32\MpLwkBG.exe2⤵PID:6108
-
-
C:\Windows\System32\ctgnxdi.exeC:\Windows\System32\ctgnxdi.exe2⤵PID:6136
-
-
C:\Windows\System32\lIIenwh.exeC:\Windows\System32\lIIenwh.exe2⤵PID:912
-
-
C:\Windows\System32\sIqakks.exeC:\Windows\System32\sIqakks.exe2⤵PID:4204
-
-
C:\Windows\System32\rNDEecG.exeC:\Windows\System32\rNDEecG.exe2⤵PID:5180
-
-
C:\Windows\System32\diiIQKx.exeC:\Windows\System32\diiIQKx.exe2⤵PID:5224
-
-
C:\Windows\System32\yQVjMtZ.exeC:\Windows\System32\yQVjMtZ.exe2⤵PID:5336
-
-
C:\Windows\System32\WzAicXD.exeC:\Windows\System32\WzAicXD.exe2⤵PID:5368
-
-
C:\Windows\System32\TjCDgoI.exeC:\Windows\System32\TjCDgoI.exe2⤵PID:1712
-
-
C:\Windows\System32\YIcrKla.exeC:\Windows\System32\YIcrKla.exe2⤵PID:5516
-
-
C:\Windows\System32\WxuHyWu.exeC:\Windows\System32\WxuHyWu.exe2⤵PID:5540
-
-
C:\Windows\System32\kraWusi.exeC:\Windows\System32\kraWusi.exe2⤵PID:5360
-
-
C:\Windows\System32\ocHQgER.exeC:\Windows\System32\ocHQgER.exe2⤵PID:3176
-
-
C:\Windows\System32\wgHNxyl.exeC:\Windows\System32\wgHNxyl.exe2⤵PID:5696
-
-
C:\Windows\System32\GMlPlaz.exeC:\Windows\System32\GMlPlaz.exe2⤵PID:5828
-
-
C:\Windows\System32\traFKKK.exeC:\Windows\System32\traFKKK.exe2⤵PID:5816
-
-
C:\Windows\System32\XhKbiSl.exeC:\Windows\System32\XhKbiSl.exe2⤵PID:1348
-
-
C:\Windows\System32\vwsNnPx.exeC:\Windows\System32\vwsNnPx.exe2⤵PID:6000
-
-
C:\Windows\System32\gTGZLgk.exeC:\Windows\System32\gTGZLgk.exe2⤵PID:6072
-
-
C:\Windows\System32\uLmUzaJ.exeC:\Windows\System32\uLmUzaJ.exe2⤵PID:6128
-
-
C:\Windows\System32\tzqkJTC.exeC:\Windows\System32\tzqkJTC.exe2⤵PID:5164
-
-
C:\Windows\System32\byuAizU.exeC:\Windows\System32\byuAizU.exe2⤵PID:5288
-
-
C:\Windows\System32\GZOHBCC.exeC:\Windows\System32\GZOHBCC.exe2⤵PID:5436
-
-
C:\Windows\System32\VdHPJTV.exeC:\Windows\System32\VdHPJTV.exe2⤵PID:5468
-
-
C:\Windows\System32\RraKpEq.exeC:\Windows\System32\RraKpEq.exe2⤵PID:2320
-
-
C:\Windows\System32\wzfJrsh.exeC:\Windows\System32\wzfJrsh.exe2⤵PID:4576
-
-
C:\Windows\System32\ydZqPSN.exeC:\Windows\System32\ydZqPSN.exe2⤵PID:5692
-
-
C:\Windows\System32\YRSurlk.exeC:\Windows\System32\YRSurlk.exe2⤵PID:5776
-
-
C:\Windows\System32\DgoXCVH.exeC:\Windows\System32\DgoXCVH.exe2⤵PID:5956
-
-
C:\Windows\System32\KzAhKXT.exeC:\Windows\System32\KzAhKXT.exe2⤵PID:6076
-
-
C:\Windows\System32\sShYhPD.exeC:\Windows\System32\sShYhPD.exe2⤵PID:4776
-
-
C:\Windows\System32\bqRAPbq.exeC:\Windows\System32\bqRAPbq.exe2⤵PID:5380
-
-
C:\Windows\System32\SCMTkiR.exeC:\Windows\System32\SCMTkiR.exe2⤵PID:5844
-
-
C:\Windows\System32\oAeelUo.exeC:\Windows\System32\oAeelUo.exe2⤵PID:5564
-
-
C:\Windows\System32\HKLStwt.exeC:\Windows\System32\HKLStwt.exe2⤵PID:5304
-
-
C:\Windows\System32\GQnMNUg.exeC:\Windows\System32\GQnMNUg.exe2⤵PID:6180
-
-
C:\Windows\System32\gFoTvik.exeC:\Windows\System32\gFoTvik.exe2⤵PID:6236
-
-
C:\Windows\System32\cCVwyAf.exeC:\Windows\System32\cCVwyAf.exe2⤵PID:6284
-
-
C:\Windows\System32\cgAckaK.exeC:\Windows\System32\cgAckaK.exe2⤵PID:6304
-
-
C:\Windows\System32\uICbPFh.exeC:\Windows\System32\uICbPFh.exe2⤵PID:6324
-
-
C:\Windows\System32\dKRwnTR.exeC:\Windows\System32\dKRwnTR.exe2⤵PID:6352
-
-
C:\Windows\System32\shUDUrb.exeC:\Windows\System32\shUDUrb.exe2⤵PID:6368
-
-
C:\Windows\System32\PviMHMF.exeC:\Windows\System32\PviMHMF.exe2⤵PID:6408
-
-
C:\Windows\System32\kijFfqj.exeC:\Windows\System32\kijFfqj.exe2⤵PID:6464
-
-
C:\Windows\System32\hmkAZxk.exeC:\Windows\System32\hmkAZxk.exe2⤵PID:6480
-
-
C:\Windows\System32\ZOFidjr.exeC:\Windows\System32\ZOFidjr.exe2⤵PID:6516
-
-
C:\Windows\System32\oMnVEKD.exeC:\Windows\System32\oMnVEKD.exe2⤵PID:6556
-
-
C:\Windows\System32\bRdhosK.exeC:\Windows\System32\bRdhosK.exe2⤵PID:6580
-
-
C:\Windows\System32\kYjXvsj.exeC:\Windows\System32\kYjXvsj.exe2⤵PID:6604
-
-
C:\Windows\System32\TRGutmY.exeC:\Windows\System32\TRGutmY.exe2⤵PID:6632
-
-
C:\Windows\System32\egHIyiN.exeC:\Windows\System32\egHIyiN.exe2⤵PID:6660
-
-
C:\Windows\System32\fSGsUFk.exeC:\Windows\System32\fSGsUFk.exe2⤵PID:6688
-
-
C:\Windows\System32\ZIEOGZM.exeC:\Windows\System32\ZIEOGZM.exe2⤵PID:6716
-
-
C:\Windows\System32\BxOsQkC.exeC:\Windows\System32\BxOsQkC.exe2⤵PID:6760
-
-
C:\Windows\System32\kbZUPsm.exeC:\Windows\System32\kbZUPsm.exe2⤵PID:6776
-
-
C:\Windows\System32\KTErTYM.exeC:\Windows\System32\KTErTYM.exe2⤵PID:6796
-
-
C:\Windows\System32\VBDNYxo.exeC:\Windows\System32\VBDNYxo.exe2⤵PID:6840
-
-
C:\Windows\System32\iCKSgoL.exeC:\Windows\System32\iCKSgoL.exe2⤵PID:6856
-
-
C:\Windows\System32\QZXzPKd.exeC:\Windows\System32\QZXzPKd.exe2⤵PID:6880
-
-
C:\Windows\System32\TBHSRZj.exeC:\Windows\System32\TBHSRZj.exe2⤵PID:6908
-
-
C:\Windows\System32\bhqtgCy.exeC:\Windows\System32\bhqtgCy.exe2⤵PID:6928
-
-
C:\Windows\System32\ROWVGKc.exeC:\Windows\System32\ROWVGKc.exe2⤵PID:6960
-
-
C:\Windows\System32\pULsNiG.exeC:\Windows\System32\pULsNiG.exe2⤵PID:7004
-
-
C:\Windows\System32\BPJgafS.exeC:\Windows\System32\BPJgafS.exe2⤵PID:7024
-
-
C:\Windows\System32\bLexGbH.exeC:\Windows\System32\bLexGbH.exe2⤵PID:7048
-
-
C:\Windows\System32\UmsMTRy.exeC:\Windows\System32\UmsMTRy.exe2⤵PID:7068
-
-
C:\Windows\System32\jVwdYUB.exeC:\Windows\System32\jVwdYUB.exe2⤵PID:7084
-
-
C:\Windows\System32\vfKlbHe.exeC:\Windows\System32\vfKlbHe.exe2⤵PID:7104
-
-
C:\Windows\System32\fZTWgPX.exeC:\Windows\System32\fZTWgPX.exe2⤵PID:7160
-
-
C:\Windows\System32\bkFBvsU.exeC:\Windows\System32\bkFBvsU.exe2⤵PID:6152
-
-
C:\Windows\System32\AOtVBBE.exeC:\Windows\System32\AOtVBBE.exe2⤵PID:6252
-
-
C:\Windows\System32\NpvjkZL.exeC:\Windows\System32\NpvjkZL.exe2⤵PID:6228
-
-
C:\Windows\System32\jDNSGwl.exeC:\Windows\System32\jDNSGwl.exe2⤵PID:6364
-
-
C:\Windows\System32\GogxYAJ.exeC:\Windows\System32\GogxYAJ.exe2⤵PID:6312
-
-
C:\Windows\System32\dwGzgtW.exeC:\Windows\System32\dwGzgtW.exe2⤵PID:6504
-
-
C:\Windows\System32\rsxLeVH.exeC:\Windows\System32\rsxLeVH.exe2⤵PID:6552
-
-
C:\Windows\System32\wcvZkul.exeC:\Windows\System32\wcvZkul.exe2⤵PID:6568
-
-
C:\Windows\System32\hBKcMfr.exeC:\Windows\System32\hBKcMfr.exe2⤵PID:6592
-
-
C:\Windows\System32\kcOELra.exeC:\Windows\System32\kcOELra.exe2⤵PID:6700
-
-
C:\Windows\System32\txTCxnn.exeC:\Windows\System32\txTCxnn.exe2⤵PID:6772
-
-
C:\Windows\System32\XcqbkRu.exeC:\Windows\System32\XcqbkRu.exe2⤵PID:6828
-
-
C:\Windows\System32\eIrEnvr.exeC:\Windows\System32\eIrEnvr.exe2⤵PID:6920
-
-
C:\Windows\System32\rinBKWD.exeC:\Windows\System32\rinBKWD.exe2⤵PID:6896
-
-
C:\Windows\System32\lujlwKm.exeC:\Windows\System32\lujlwKm.exe2⤵PID:6968
-
-
C:\Windows\System32\gvFZFuA.exeC:\Windows\System32\gvFZFuA.exe2⤵PID:7076
-
-
C:\Windows\System32\UhpJPWO.exeC:\Windows\System32\UhpJPWO.exe2⤵PID:7120
-
-
C:\Windows\System32\CpLRuDB.exeC:\Windows\System32\CpLRuDB.exe2⤵PID:5472
-
-
C:\Windows\System32\IkOVnDz.exeC:\Windows\System32\IkOVnDz.exe2⤵PID:2080
-
-
C:\Windows\System32\sNniAaE.exeC:\Windows\System32\sNniAaE.exe2⤵PID:6332
-
-
C:\Windows\System32\BNqDdVZ.exeC:\Windows\System32\BNqDdVZ.exe2⤵PID:6344
-
-
C:\Windows\System32\pKVzfej.exeC:\Windows\System32\pKVzfej.exe2⤵PID:6572
-
-
C:\Windows\System32\ETHXzDE.exeC:\Windows\System32\ETHXzDE.exe2⤵PID:6748
-
-
C:\Windows\System32\TZQhwqF.exeC:\Windows\System32\TZQhwqF.exe2⤵PID:6980
-
-
C:\Windows\System32\ZApHCdS.exeC:\Windows\System32\ZApHCdS.exe2⤵PID:7020
-
-
C:\Windows\System32\aVrPSFi.exeC:\Windows\System32\aVrPSFi.exe2⤵PID:6212
-
-
C:\Windows\System32\IWfmVvi.exeC:\Windows\System32\IWfmVvi.exe2⤵PID:6492
-
-
C:\Windows\System32\MlAiLJU.exeC:\Windows\System32\MlAiLJU.exe2⤵PID:7092
-
-
C:\Windows\System32\sprVUNe.exeC:\Windows\System32\sprVUNe.exe2⤵PID:6360
-
-
C:\Windows\System32\VfCOqPy.exeC:\Windows\System32\VfCOqPy.exe2⤵PID:6824
-
-
C:\Windows\System32\PMZHeqy.exeC:\Windows\System32\PMZHeqy.exe2⤵PID:7176
-
-
C:\Windows\System32\oQcWmYS.exeC:\Windows\System32\oQcWmYS.exe2⤵PID:7196
-
-
C:\Windows\System32\PEeYrHN.exeC:\Windows\System32\PEeYrHN.exe2⤵PID:7240
-
-
C:\Windows\System32\WStoLLT.exeC:\Windows\System32\WStoLLT.exe2⤵PID:7264
-
-
C:\Windows\System32\ObHAaJH.exeC:\Windows\System32\ObHAaJH.exe2⤵PID:7284
-
-
C:\Windows\System32\HgLMxKB.exeC:\Windows\System32\HgLMxKB.exe2⤵PID:7304
-
-
C:\Windows\System32\UbXAYNa.exeC:\Windows\System32\UbXAYNa.exe2⤵PID:7336
-
-
C:\Windows\System32\TMvEgsD.exeC:\Windows\System32\TMvEgsD.exe2⤵PID:7352
-
-
C:\Windows\System32\jODEYcp.exeC:\Windows\System32\jODEYcp.exe2⤵PID:7380
-
-
C:\Windows\System32\ymOhfhL.exeC:\Windows\System32\ymOhfhL.exe2⤵PID:7404
-
-
C:\Windows\System32\cBDTZcm.exeC:\Windows\System32\cBDTZcm.exe2⤵PID:7472
-
-
C:\Windows\System32\MFnKOui.exeC:\Windows\System32\MFnKOui.exe2⤵PID:7496
-
-
C:\Windows\System32\TRtPfJj.exeC:\Windows\System32\TRtPfJj.exe2⤵PID:7520
-
-
C:\Windows\System32\XvwhOxJ.exeC:\Windows\System32\XvwhOxJ.exe2⤵PID:7540
-
-
C:\Windows\System32\vBXrVCH.exeC:\Windows\System32\vBXrVCH.exe2⤵PID:7560
-
-
C:\Windows\System32\EOHaBpo.exeC:\Windows\System32\EOHaBpo.exe2⤵PID:7576
-
-
C:\Windows\System32\XPJSEQl.exeC:\Windows\System32\XPJSEQl.exe2⤵PID:7604
-
-
C:\Windows\System32\vHmBiEe.exeC:\Windows\System32\vHmBiEe.exe2⤵PID:7620
-
-
C:\Windows\System32\PxLxXhD.exeC:\Windows\System32\PxLxXhD.exe2⤵PID:7660
-
-
C:\Windows\System32\QSClVPy.exeC:\Windows\System32\QSClVPy.exe2⤵PID:7716
-
-
C:\Windows\System32\eDxlvBx.exeC:\Windows\System32\eDxlvBx.exe2⤵PID:7736
-
-
C:\Windows\System32\uRryhCS.exeC:\Windows\System32\uRryhCS.exe2⤵PID:7756
-
-
C:\Windows\System32\cuPdhkX.exeC:\Windows\System32\cuPdhkX.exe2⤵PID:7784
-
-
C:\Windows\System32\AXxXhsS.exeC:\Windows\System32\AXxXhsS.exe2⤵PID:7800
-
-
C:\Windows\System32\HWAKuQt.exeC:\Windows\System32\HWAKuQt.exe2⤵PID:7828
-
-
C:\Windows\System32\kXXmnsv.exeC:\Windows\System32\kXXmnsv.exe2⤵PID:7844
-
-
C:\Windows\System32\nGPRyro.exeC:\Windows\System32\nGPRyro.exe2⤵PID:7868
-
-
C:\Windows\System32\FZjYVrg.exeC:\Windows\System32\FZjYVrg.exe2⤵PID:7916
-
-
C:\Windows\System32\pZOrgnr.exeC:\Windows\System32\pZOrgnr.exe2⤵PID:7972
-
-
C:\Windows\System32\VCyuPrr.exeC:\Windows\System32\VCyuPrr.exe2⤵PID:7988
-
-
C:\Windows\System32\FXOmDCy.exeC:\Windows\System32\FXOmDCy.exe2⤵PID:8004
-
-
C:\Windows\System32\wIzyUjv.exeC:\Windows\System32\wIzyUjv.exe2⤵PID:8028
-
-
C:\Windows\System32\dNIHzEw.exeC:\Windows\System32\dNIHzEw.exe2⤵PID:8052
-
-
C:\Windows\System32\OWuSTFB.exeC:\Windows\System32\OWuSTFB.exe2⤵PID:8080
-
-
C:\Windows\System32\PLEoCBZ.exeC:\Windows\System32\PLEoCBZ.exe2⤵PID:8132
-
-
C:\Windows\System32\zEuclzK.exeC:\Windows\System32\zEuclzK.exe2⤵PID:8156
-
-
C:\Windows\System32\ShhPUGJ.exeC:\Windows\System32\ShhPUGJ.exe2⤵PID:8180
-
-
C:\Windows\System32\kOeuONl.exeC:\Windows\System32\kOeuONl.exe2⤵PID:7220
-
-
C:\Windows\System32\lYCSrtY.exeC:\Windows\System32\lYCSrtY.exe2⤵PID:7292
-
-
C:\Windows\System32\mmqqrTb.exeC:\Windows\System32\mmqqrTb.exe2⤵PID:7296
-
-
C:\Windows\System32\XoVtpsf.exeC:\Windows\System32\XoVtpsf.exe2⤵PID:7348
-
-
C:\Windows\System32\PNvlfMW.exeC:\Windows\System32\PNvlfMW.exe2⤵PID:7484
-
-
C:\Windows\System32\jDfeDTb.exeC:\Windows\System32\jDfeDTb.exe2⤵PID:7536
-
-
C:\Windows\System32\SXdQQqR.exeC:\Windows\System32\SXdQQqR.exe2⤵PID:7572
-
-
C:\Windows\System32\YgThgAx.exeC:\Windows\System32\YgThgAx.exe2⤵PID:7556
-
-
C:\Windows\System32\aAMtouW.exeC:\Windows\System32\aAMtouW.exe2⤵PID:7712
-
-
C:\Windows\System32\GscTxss.exeC:\Windows\System32\GscTxss.exe2⤵PID:7732
-
-
C:\Windows\System32\ZwuneZc.exeC:\Windows\System32\ZwuneZc.exe2⤵PID:7808
-
-
C:\Windows\System32\PAALbPn.exeC:\Windows\System32\PAALbPn.exe2⤵PID:7792
-
-
C:\Windows\System32\GBXlslT.exeC:\Windows\System32\GBXlslT.exe2⤵PID:7952
-
-
C:\Windows\System32\wCrVYlp.exeC:\Windows\System32\wCrVYlp.exe2⤵PID:8000
-
-
C:\Windows\System32\VoGsinH.exeC:\Windows\System32\VoGsinH.exe2⤵PID:8076
-
-
C:\Windows\System32\QdIqSKy.exeC:\Windows\System32\QdIqSKy.exe2⤵PID:8140
-
-
C:\Windows\System32\zPuDARx.exeC:\Windows\System32\zPuDARx.exe2⤵PID:7228
-
-
C:\Windows\System32\xraOdoJ.exeC:\Windows\System32\xraOdoJ.exe2⤵PID:7392
-
-
C:\Windows\System32\GxAXIOm.exeC:\Windows\System32\GxAXIOm.exe2⤵PID:7532
-
-
C:\Windows\System32\BAcOdYU.exeC:\Windows\System32\BAcOdYU.exe2⤵PID:7748
-
-
C:\Windows\System32\JAPROWt.exeC:\Windows\System32\JAPROWt.exe2⤵PID:7964
-
-
C:\Windows\System32\XzapuCD.exeC:\Windows\System32\XzapuCD.exe2⤵PID:8044
-
-
C:\Windows\System32\EYvnBkc.exeC:\Windows\System32\EYvnBkc.exe2⤵PID:8148
-
-
C:\Windows\System32\bDozXHE.exeC:\Windows\System32\bDozXHE.exe2⤵PID:7516
-
-
C:\Windows\System32\CPFdhNC.exeC:\Windows\System32\CPFdhNC.exe2⤵PID:7880
-
-
C:\Windows\System32\tiRNVYD.exeC:\Windows\System32\tiRNVYD.exe2⤵PID:8040
-
-
C:\Windows\System32\tEpcjvY.exeC:\Windows\System32\tEpcjvY.exe2⤵PID:8196
-
-
C:\Windows\System32\nlxqatL.exeC:\Windows\System32\nlxqatL.exe2⤵PID:8216
-
-
C:\Windows\System32\xUrwMVk.exeC:\Windows\System32\xUrwMVk.exe2⤵PID:8232
-
-
C:\Windows\System32\zYSmoux.exeC:\Windows\System32\zYSmoux.exe2⤵PID:8256
-
-
C:\Windows\System32\xwCtoBC.exeC:\Windows\System32\xwCtoBC.exe2⤵PID:8280
-
-
C:\Windows\System32\YbWPIMD.exeC:\Windows\System32\YbWPIMD.exe2⤵PID:8316
-
-
C:\Windows\System32\SBqAAxx.exeC:\Windows\System32\SBqAAxx.exe2⤵PID:8336
-
-
C:\Windows\System32\MgzSjUI.exeC:\Windows\System32\MgzSjUI.exe2⤵PID:8388
-
-
C:\Windows\System32\GGFWswr.exeC:\Windows\System32\GGFWswr.exe2⤵PID:8416
-
-
C:\Windows\System32\vuYlIQz.exeC:\Windows\System32\vuYlIQz.exe2⤵PID:8440
-
-
C:\Windows\System32\OReMJpL.exeC:\Windows\System32\OReMJpL.exe2⤵PID:8456
-
-
C:\Windows\System32\aKsysAe.exeC:\Windows\System32\aKsysAe.exe2⤵PID:8504
-
-
C:\Windows\System32\NVhvWsZ.exeC:\Windows\System32\NVhvWsZ.exe2⤵PID:8524
-
-
C:\Windows\System32\QvtDHhS.exeC:\Windows\System32\QvtDHhS.exe2⤵PID:8552
-
-
C:\Windows\System32\TeSxHPf.exeC:\Windows\System32\TeSxHPf.exe2⤵PID:8580
-
-
C:\Windows\System32\WBwxAoK.exeC:\Windows\System32\WBwxAoK.exe2⤵PID:8600
-
-
C:\Windows\System32\NjqilTZ.exeC:\Windows\System32\NjqilTZ.exe2⤵PID:8632
-
-
C:\Windows\System32\YLpcqoR.exeC:\Windows\System32\YLpcqoR.exe2⤵PID:8668
-
-
C:\Windows\System32\QMMKFHG.exeC:\Windows\System32\QMMKFHG.exe2⤵PID:8696
-
-
C:\Windows\System32\rPKUGCh.exeC:\Windows\System32\rPKUGCh.exe2⤵PID:8716
-
-
C:\Windows\System32\LFZSZfO.exeC:\Windows\System32\LFZSZfO.exe2⤵PID:8748
-
-
C:\Windows\System32\XdcpQOb.exeC:\Windows\System32\XdcpQOb.exe2⤵PID:8784
-
-
C:\Windows\System32\eINDVUe.exeC:\Windows\System32\eINDVUe.exe2⤵PID:8800
-
-
C:\Windows\System32\bFKkoqW.exeC:\Windows\System32\bFKkoqW.exe2⤵PID:8848
-
-
C:\Windows\System32\yviWESU.exeC:\Windows\System32\yviWESU.exe2⤵PID:8876
-
-
C:\Windows\System32\QviuNxz.exeC:\Windows\System32\QviuNxz.exe2⤵PID:8900
-
-
C:\Windows\System32\fToSXCq.exeC:\Windows\System32\fToSXCq.exe2⤵PID:8916
-
-
C:\Windows\System32\PIrAadd.exeC:\Windows\System32\PIrAadd.exe2⤵PID:8940
-
-
C:\Windows\System32\CGVIDpJ.exeC:\Windows\System32\CGVIDpJ.exe2⤵PID:8988
-
-
C:\Windows\System32\fdDBrDd.exeC:\Windows\System32\fdDBrDd.exe2⤵PID:9008
-
-
C:\Windows\System32\cUXLWMD.exeC:\Windows\System32\cUXLWMD.exe2⤵PID:9028
-
-
C:\Windows\System32\hAhsGdg.exeC:\Windows\System32\hAhsGdg.exe2⤵PID:9060
-
-
C:\Windows\System32\rsFhRmB.exeC:\Windows\System32\rsFhRmB.exe2⤵PID:9100
-
-
C:\Windows\System32\kDeiGqB.exeC:\Windows\System32\kDeiGqB.exe2⤵PID:9132
-
-
C:\Windows\System32\DFFRWuI.exeC:\Windows\System32\DFFRWuI.exe2⤵PID:9148
-
-
C:\Windows\System32\pApWNiX.exeC:\Windows\System32\pApWNiX.exe2⤵PID:9188
-
-
C:\Windows\System32\RyMrnyz.exeC:\Windows\System32\RyMrnyz.exe2⤵PID:8168
-
-
C:\Windows\System32\BCCClyn.exeC:\Windows\System32\BCCClyn.exe2⤵PID:8252
-
-
C:\Windows\System32\dSPKVcI.exeC:\Windows\System32\dSPKVcI.exe2⤵PID:8272
-
-
C:\Windows\System32\TfgdUfm.exeC:\Windows\System32\TfgdUfm.exe2⤵PID:8304
-
-
C:\Windows\System32\aVIclht.exeC:\Windows\System32\aVIclht.exe2⤵PID:8376
-
-
C:\Windows\System32\mwmsZlG.exeC:\Windows\System32\mwmsZlG.exe2⤵PID:8432
-
-
C:\Windows\System32\EMJTjSg.exeC:\Windows\System32\EMJTjSg.exe2⤵PID:8540
-
-
C:\Windows\System32\sDYibDb.exeC:\Windows\System32\sDYibDb.exe2⤵PID:8620
-
-
C:\Windows\System32\clNWjuY.exeC:\Windows\System32\clNWjuY.exe2⤵PID:8680
-
-
C:\Windows\System32\gcKuTNt.exeC:\Windows\System32\gcKuTNt.exe2⤵PID:8704
-
-
C:\Windows\System32\VzeuyFR.exeC:\Windows\System32\VzeuyFR.exe2⤵PID:8824
-
-
C:\Windows\System32\dQPTRGV.exeC:\Windows\System32\dQPTRGV.exe2⤵PID:8888
-
-
C:\Windows\System32\ojRNOXV.exeC:\Windows\System32\ojRNOXV.exe2⤵PID:8928
-
-
C:\Windows\System32\aarFQOW.exeC:\Windows\System32\aarFQOW.exe2⤵PID:8968
-
-
C:\Windows\System32\pYYkkzz.exeC:\Windows\System32\pYYkkzz.exe2⤵PID:9052
-
-
C:\Windows\System32\lcIrFYK.exeC:\Windows\System32\lcIrFYK.exe2⤵PID:9128
-
-
C:\Windows\System32\NShPzcX.exeC:\Windows\System32\NShPzcX.exe2⤵PID:9212
-
-
C:\Windows\System32\jTphZYb.exeC:\Windows\System32\jTphZYb.exe2⤵PID:8328
-
-
C:\Windows\System32\RcGxPmZ.exeC:\Windows\System32\RcGxPmZ.exe2⤵PID:8332
-
-
C:\Windows\System32\ZcvGTxr.exeC:\Windows\System32\ZcvGTxr.exe2⤵PID:8568
-
-
C:\Windows\System32\ddPdMCH.exeC:\Windows\System32\ddPdMCH.exe2⤵PID:8728
-
-
C:\Windows\System32\JojUySm.exeC:\Windows\System32\JojUySm.exe2⤵PID:8908
-
-
C:\Windows\System32\eJFwoJt.exeC:\Windows\System32\eJFwoJt.exe2⤵PID:9056
-
-
C:\Windows\System32\mDZlXTM.exeC:\Windows\System32\mDZlXTM.exe2⤵PID:9076
-
-
C:\Windows\System32\mmDQvVN.exeC:\Windows\System32\mmDQvVN.exe2⤵PID:8368
-
-
C:\Windows\System32\FSDCyWS.exeC:\Windows\System32\FSDCyWS.exe2⤵PID:8400
-
-
C:\Windows\System32\xVaVZQr.exeC:\Windows\System32\xVaVZQr.exe2⤵PID:8828
-
-
C:\Windows\System32\SKZtJsE.exeC:\Windows\System32\SKZtJsE.exe2⤵PID:9228
-
-
C:\Windows\System32\zAyNzWy.exeC:\Windows\System32\zAyNzWy.exe2⤵PID:9268
-
-
C:\Windows\System32\QlOdrTo.exeC:\Windows\System32\QlOdrTo.exe2⤵PID:9288
-
-
C:\Windows\System32\dOQgrrc.exeC:\Windows\System32\dOQgrrc.exe2⤵PID:9312
-
-
C:\Windows\System32\iGVrZVx.exeC:\Windows\System32\iGVrZVx.exe2⤵PID:9352
-
-
C:\Windows\System32\MmtqvOI.exeC:\Windows\System32\MmtqvOI.exe2⤵PID:9376
-
-
C:\Windows\System32\FRZVLmg.exeC:\Windows\System32\FRZVLmg.exe2⤵PID:9392
-
-
C:\Windows\System32\ZiGdpnI.exeC:\Windows\System32\ZiGdpnI.exe2⤵PID:9416
-
-
C:\Windows\System32\BtNBftR.exeC:\Windows\System32\BtNBftR.exe2⤵PID:9440
-
-
C:\Windows\System32\qOVvNkz.exeC:\Windows\System32\qOVvNkz.exe2⤵PID:9484
-
-
C:\Windows\System32\WpNWlVv.exeC:\Windows\System32\WpNWlVv.exe2⤵PID:9508
-
-
C:\Windows\System32\IAmOTMj.exeC:\Windows\System32\IAmOTMj.exe2⤵PID:9528
-
-
C:\Windows\System32\aJYTMAX.exeC:\Windows\System32\aJYTMAX.exe2⤵PID:9556
-
-
C:\Windows\System32\RuTlEHe.exeC:\Windows\System32\RuTlEHe.exe2⤵PID:9580
-
-
C:\Windows\System32\MzriyKq.exeC:\Windows\System32\MzriyKq.exe2⤵PID:9624
-
-
C:\Windows\System32\GNltWqo.exeC:\Windows\System32\GNltWqo.exe2⤵PID:9640
-
-
C:\Windows\System32\ecTfxnc.exeC:\Windows\System32\ecTfxnc.exe2⤵PID:9660
-
-
C:\Windows\System32\HYscdsj.exeC:\Windows\System32\HYscdsj.exe2⤵PID:9704
-
-
C:\Windows\System32\xXKriiY.exeC:\Windows\System32\xXKriiY.exe2⤵PID:9724
-
-
C:\Windows\System32\yCkWRZH.exeC:\Windows\System32\yCkWRZH.exe2⤵PID:9744
-
-
C:\Windows\System32\KaluGnE.exeC:\Windows\System32\KaluGnE.exe2⤵PID:9788
-
-
C:\Windows\System32\XsBfYhQ.exeC:\Windows\System32\XsBfYhQ.exe2⤵PID:9808
-
-
C:\Windows\System32\TsnjQCm.exeC:\Windows\System32\TsnjQCm.exe2⤵PID:9828
-
-
C:\Windows\System32\fDTZfwt.exeC:\Windows\System32\fDTZfwt.exe2⤵PID:9860
-
-
C:\Windows\System32\pYZkpVo.exeC:\Windows\System32\pYZkpVo.exe2⤵PID:9900
-
-
C:\Windows\System32\yMyIWHP.exeC:\Windows\System32\yMyIWHP.exe2⤵PID:9920
-
-
C:\Windows\System32\RAdEfcX.exeC:\Windows\System32\RAdEfcX.exe2⤵PID:9940
-
-
C:\Windows\System32\VcPonvJ.exeC:\Windows\System32\VcPonvJ.exe2⤵PID:9960
-
-
C:\Windows\System32\aXylLxU.exeC:\Windows\System32\aXylLxU.exe2⤵PID:10008
-
-
C:\Windows\System32\OyUJgsu.exeC:\Windows\System32\OyUJgsu.exe2⤵PID:10040
-
-
C:\Windows\System32\YHqOxis.exeC:\Windows\System32\YHqOxis.exe2⤵PID:10072
-
-
C:\Windows\System32\ySypabt.exeC:\Windows\System32\ySypabt.exe2⤵PID:10108
-
-
C:\Windows\System32\aARiSyS.exeC:\Windows\System32\aARiSyS.exe2⤵PID:10132
-
-
C:\Windows\System32\UKmXWRs.exeC:\Windows\System32\UKmXWRs.exe2⤵PID:10160
-
-
C:\Windows\System32\zdyyPfx.exeC:\Windows\System32\zdyyPfx.exe2⤵PID:10192
-
-
C:\Windows\System32\CKuuQrg.exeC:\Windows\System32\CKuuQrg.exe2⤵PID:10216
-
-
C:\Windows\System32\hrGCYiq.exeC:\Windows\System32\hrGCYiq.exe2⤵PID:8500
-
-
C:\Windows\System32\wfAjLcH.exeC:\Windows\System32\wfAjLcH.exe2⤵PID:9276
-
-
C:\Windows\System32\TETLaLO.exeC:\Windows\System32\TETLaLO.exe2⤵PID:9360
-
-
C:\Windows\System32\WAizdAv.exeC:\Windows\System32\WAizdAv.exe2⤵PID:9460
-
-
C:\Windows\System32\mKoUkXP.exeC:\Windows\System32\mKoUkXP.exe2⤵PID:9496
-
-
C:\Windows\System32\XFyoMOR.exeC:\Windows\System32\XFyoMOR.exe2⤵PID:9588
-
-
C:\Windows\System32\GXlPsrQ.exeC:\Windows\System32\GXlPsrQ.exe2⤵PID:9652
-
-
C:\Windows\System32\TRqgXHU.exeC:\Windows\System32\TRqgXHU.exe2⤵PID:9756
-
-
C:\Windows\System32\zAQJCnN.exeC:\Windows\System32\zAQJCnN.exe2⤵PID:9760
-
-
C:\Windows\System32\XnjAsJF.exeC:\Windows\System32\XnjAsJF.exe2⤵PID:9816
-
-
C:\Windows\System32\XaoPrJx.exeC:\Windows\System32\XaoPrJx.exe2⤵PID:9912
-
-
C:\Windows\System32\FVORTVQ.exeC:\Windows\System32\FVORTVQ.exe2⤵PID:9956
-
-
C:\Windows\System32\hDWYDHE.exeC:\Windows\System32\hDWYDHE.exe2⤵PID:10064
-
-
C:\Windows\System32\KPbEqks.exeC:\Windows\System32\KPbEqks.exe2⤵PID:10120
-
-
C:\Windows\System32\loHULfN.exeC:\Windows\System32\loHULfN.exe2⤵PID:10172
-
-
C:\Windows\System32\yiMRUlB.exeC:\Windows\System32\yiMRUlB.exe2⤵PID:9248
-
-
C:\Windows\System32\FMFkjmH.exeC:\Windows\System32\FMFkjmH.exe2⤵PID:9400
-
-
C:\Windows\System32\xRWzvuz.exeC:\Windows\System32\xRWzvuz.exe2⤵PID:9576
-
-
C:\Windows\System32\wDlbHPh.exeC:\Windows\System32\wDlbHPh.exe2⤵PID:9608
-
-
C:\Windows\System32\shTHoxQ.exeC:\Windows\System32\shTHoxQ.exe2⤵PID:9888
-
-
C:\Windows\System32\Clhmbrl.exeC:\Windows\System32\Clhmbrl.exe2⤵PID:10020
-
-
C:\Windows\System32\SbQeNBc.exeC:\Windows\System32\SbQeNBc.exe2⤵PID:10100
-
-
C:\Windows\System32\KBaAExw.exeC:\Windows\System32\KBaAExw.exe2⤵PID:10252
-
-
C:\Windows\System32\QzemSRT.exeC:\Windows\System32\QzemSRT.exe2⤵PID:10296
-
-
C:\Windows\System32\nNYrDIT.exeC:\Windows\System32\nNYrDIT.exe2⤵PID:10312
-
-
C:\Windows\System32\pIYZDTF.exeC:\Windows\System32\pIYZDTF.exe2⤵PID:10328
-
-
C:\Windows\System32\MveMMNi.exeC:\Windows\System32\MveMMNi.exe2⤵PID:10344
-
-
C:\Windows\System32\wepJXDj.exeC:\Windows\System32\wepJXDj.exe2⤵PID:10400
-
-
C:\Windows\System32\aSVuiVb.exeC:\Windows\System32\aSVuiVb.exe2⤵PID:10420
-
-
C:\Windows\System32\PsXYMEG.exeC:\Windows\System32\PsXYMEG.exe2⤵PID:10440
-
-
C:\Windows\System32\VcomHaT.exeC:\Windows\System32\VcomHaT.exe2⤵PID:10492
-
-
C:\Windows\System32\ndRTqIY.exeC:\Windows\System32\ndRTqIY.exe2⤵PID:10568
-
-
C:\Windows\System32\LiQbfLv.exeC:\Windows\System32\LiQbfLv.exe2⤵PID:10600
-
-
C:\Windows\System32\WnFAgse.exeC:\Windows\System32\WnFAgse.exe2⤵PID:10616
-
-
C:\Windows\System32\jobRuUu.exeC:\Windows\System32\jobRuUu.exe2⤵PID:10656
-
-
C:\Windows\System32\IHDyIWx.exeC:\Windows\System32\IHDyIWx.exe2⤵PID:10676
-
-
C:\Windows\System32\ZyfUCUO.exeC:\Windows\System32\ZyfUCUO.exe2⤵PID:10700
-
-
C:\Windows\System32\NnofmXR.exeC:\Windows\System32\NnofmXR.exe2⤵PID:10720
-
-
C:\Windows\System32\aZYnFML.exeC:\Windows\System32\aZYnFML.exe2⤵PID:10736
-
-
C:\Windows\System32\kaFeVPa.exeC:\Windows\System32\kaFeVPa.exe2⤵PID:10788
-
-
C:\Windows\System32\MtzsrXl.exeC:\Windows\System32\MtzsrXl.exe2⤵PID:10816
-
-
C:\Windows\System32\eGvzwkD.exeC:\Windows\System32\eGvzwkD.exe2⤵PID:10832
-
-
C:\Windows\System32\GfxQKer.exeC:\Windows\System32\GfxQKer.exe2⤵PID:10856
-
-
C:\Windows\System32\SzJyAvo.exeC:\Windows\System32\SzJyAvo.exe2⤵PID:10888
-
-
C:\Windows\System32\qXLmUYh.exeC:\Windows\System32\qXLmUYh.exe2⤵PID:10928
-
-
C:\Windows\System32\IQqVNWb.exeC:\Windows\System32\IQqVNWb.exe2⤵PID:10944
-
-
C:\Windows\System32\iWtOktq.exeC:\Windows\System32\iWtOktq.exe2⤵PID:11016
-
-
C:\Windows\System32\CKQNlzp.exeC:\Windows\System32\CKQNlzp.exe2⤵PID:11044
-
-
C:\Windows\System32\WTnuVXQ.exeC:\Windows\System32\WTnuVXQ.exe2⤵PID:11076
-
-
C:\Windows\System32\KqiSFEV.exeC:\Windows\System32\KqiSFEV.exe2⤵PID:11136
-
-
C:\Windows\System32\ZRNJpWr.exeC:\Windows\System32\ZRNJpWr.exe2⤵PID:11168
-
-
C:\Windows\System32\kqjjTKo.exeC:\Windows\System32\kqjjTKo.exe2⤵PID:11192
-
-
C:\Windows\System32\oPqggvh.exeC:\Windows\System32\oPqggvh.exe2⤵PID:11236
-
-
C:\Windows\System32\sTVYZwz.exeC:\Windows\System32\sTVYZwz.exe2⤵PID:9492
-
-
C:\Windows\System32\FAOtuNi.exeC:\Windows\System32\FAOtuNi.exe2⤵PID:10004
-
-
C:\Windows\System32\YrCeXJR.exeC:\Windows\System32\YrCeXJR.exe2⤵PID:10208
-
-
C:\Windows\System32\XTItEKX.exeC:\Windows\System32\XTItEKX.exe2⤵PID:10364
-
-
C:\Windows\System32\fqobzyN.exeC:\Windows\System32\fqobzyN.exe2⤵PID:10248
-
-
C:\Windows\System32\yKkVEgU.exeC:\Windows\System32\yKkVEgU.exe2⤵PID:10356
-
-
C:\Windows\System32\pDRoNcn.exeC:\Windows\System32\pDRoNcn.exe2⤵PID:10408
-
-
C:\Windows\System32\PAeqhpn.exeC:\Windows\System32\PAeqhpn.exe2⤵PID:10468
-
-
C:\Windows\System32\UOisHzR.exeC:\Windows\System32\UOisHzR.exe2⤵PID:10540
-
-
C:\Windows\System32\qySrJgk.exeC:\Windows\System32\qySrJgk.exe2⤵PID:10592
-
-
C:\Windows\System32\LMSLfUR.exeC:\Windows\System32\LMSLfUR.exe2⤵PID:10644
-
-
C:\Windows\System32\TfuRIaf.exeC:\Windows\System32\TfuRIaf.exe2⤵PID:10696
-
-
C:\Windows\System32\DkoPuai.exeC:\Windows\System32\DkoPuai.exe2⤵PID:10796
-
-
C:\Windows\System32\CpqrrLf.exeC:\Windows\System32\CpqrrLf.exe2⤵PID:10900
-
-
C:\Windows\System32\LHmFjGs.exeC:\Windows\System32\LHmFjGs.exe2⤵PID:10940
-
-
C:\Windows\System32\sZFHmUP.exeC:\Windows\System32\sZFHmUP.exe2⤵PID:11108
-
-
C:\Windows\System32\zbPLbPd.exeC:\Windows\System32\zbPLbPd.exe2⤵PID:10428
-
-
C:\Windows\System32\SOkftaF.exeC:\Windows\System32\SOkftaF.exe2⤵PID:9752
-
-
C:\Windows\System32\QnbUIcE.exeC:\Windows\System32\QnbUIcE.exe2⤵PID:10304
-
-
C:\Windows\System32\QwPPKKL.exeC:\Windows\System32\QwPPKKL.exe2⤵PID:10268
-
-
C:\Windows\System32\RFBTcIN.exeC:\Windows\System32\RFBTcIN.exe2⤵PID:10360
-
-
C:\Windows\System32\gqJejAq.exeC:\Windows\System32\gqJejAq.exe2⤵PID:10672
-
-
C:\Windows\System32\xsLcZfp.exeC:\Windows\System32\xsLcZfp.exe2⤵PID:10752
-
-
C:\Windows\System32\BVCmnln.exeC:\Windows\System32\BVCmnln.exe2⤵PID:10952
-
-
C:\Windows\System32\yNEPiCs.exeC:\Windows\System32\yNEPiCs.exe2⤵PID:11256
-
-
C:\Windows\System32\ghkoZRH.exeC:\Windows\System32\ghkoZRH.exe2⤵PID:11360
-
-
C:\Windows\System32\uMrpwXT.exeC:\Windows\System32\uMrpwXT.exe2⤵PID:11376
-
-
C:\Windows\System32\uaxIssi.exeC:\Windows\System32\uaxIssi.exe2⤵PID:11392
-
-
C:\Windows\System32\AbHQFKq.exeC:\Windows\System32\AbHQFKq.exe2⤵PID:11424
-
-
C:\Windows\System32\rpxUmVI.exeC:\Windows\System32\rpxUmVI.exe2⤵PID:11464
-
-
C:\Windows\System32\vBqKjGG.exeC:\Windows\System32\vBqKjGG.exe2⤵PID:11484
-
-
C:\Windows\System32\zdkHRrm.exeC:\Windows\System32\zdkHRrm.exe2⤵PID:11516
-
-
C:\Windows\System32\pDpqaor.exeC:\Windows\System32\pDpqaor.exe2⤵PID:11536
-
-
C:\Windows\System32\blrwkaF.exeC:\Windows\System32\blrwkaF.exe2⤵PID:11580
-
-
C:\Windows\System32\VWDzQXm.exeC:\Windows\System32\VWDzQXm.exe2⤵PID:11620
-
-
C:\Windows\System32\PtetUUz.exeC:\Windows\System32\PtetUUz.exe2⤵PID:11636
-
-
C:\Windows\System32\UmDLczI.exeC:\Windows\System32\UmDLczI.exe2⤵PID:11652
-
-
C:\Windows\System32\pNchrwy.exeC:\Windows\System32\pNchrwy.exe2⤵PID:11692
-
-
C:\Windows\System32\WQWmzRW.exeC:\Windows\System32\WQWmzRW.exe2⤵PID:11748
-
-
C:\Windows\System32\bOzwudd.exeC:\Windows\System32\bOzwudd.exe2⤵PID:11772
-
-
C:\Windows\System32\OHfDKSj.exeC:\Windows\System32\OHfDKSj.exe2⤵PID:11796
-
-
C:\Windows\System32\SPIypjG.exeC:\Windows\System32\SPIypjG.exe2⤵PID:11836
-
-
C:\Windows\System32\TvBpJkK.exeC:\Windows\System32\TvBpJkK.exe2⤵PID:11860
-
-
C:\Windows\System32\GrRtMBK.exeC:\Windows\System32\GrRtMBK.exe2⤵PID:11884
-
-
C:\Windows\System32\lsebYjn.exeC:\Windows\System32\lsebYjn.exe2⤵PID:11908
-
-
C:\Windows\System32\bZolhyZ.exeC:\Windows\System32\bZolhyZ.exe2⤵PID:11932
-
-
C:\Windows\System32\HUOUmfu.exeC:\Windows\System32\HUOUmfu.exe2⤵PID:11960
-
-
C:\Windows\System32\eKDMDMW.exeC:\Windows\System32\eKDMDMW.exe2⤵PID:12024
-
-
C:\Windows\System32\OmyJTCg.exeC:\Windows\System32\OmyJTCg.exe2⤵PID:12044
-
-
C:\Windows\System32\CzIpLJm.exeC:\Windows\System32\CzIpLJm.exe2⤵PID:12076
-
-
C:\Windows\System32\yBbZDaF.exeC:\Windows\System32\yBbZDaF.exe2⤵PID:12096
-
-
C:\Windows\System32\oTSOHqE.exeC:\Windows\System32\oTSOHqE.exe2⤵PID:12124
-
-
C:\Windows\System32\ulwabCr.exeC:\Windows\System32\ulwabCr.exe2⤵PID:12144
-
-
C:\Windows\System32\iSRQpRt.exeC:\Windows\System32\iSRQpRt.exe2⤵PID:12172
-
-
C:\Windows\System32\KFWfLKL.exeC:\Windows\System32\KFWfLKL.exe2⤵PID:12188
-
-
C:\Windows\System32\KaAWWPC.exeC:\Windows\System32\KaAWWPC.exe2⤵PID:12216
-
-
C:\Windows\System32\LRuFlHz.exeC:\Windows\System32\LRuFlHz.exe2⤵PID:12236
-
-
C:\Windows\System32\nNsKBaz.exeC:\Windows\System32\nNsKBaz.exe2⤵PID:11248
-
-
C:\Windows\System32\RQLGBhI.exeC:\Windows\System32\RQLGBhI.exe2⤵PID:11272
-
-
C:\Windows\System32\lNdNlbd.exeC:\Windows\System32\lNdNlbd.exe2⤵PID:11284
-
-
C:\Windows\System32\KsghsFG.exeC:\Windows\System32\KsghsFG.exe2⤵PID:11308
-
-
C:\Windows\System32\tomICec.exeC:\Windows\System32\tomICec.exe2⤵PID:11324
-
-
C:\Windows\System32\lgsORZm.exeC:\Windows\System32\lgsORZm.exe2⤵PID:10396
-
-
C:\Windows\System32\yJsdKde.exeC:\Windows\System32\yJsdKde.exe2⤵PID:11440
-
-
C:\Windows\System32\NPTTwxw.exeC:\Windows\System32\NPTTwxw.exe2⤵PID:11664
-
-
C:\Windows\System32\ybncrbF.exeC:\Windows\System32\ybncrbF.exe2⤵PID:11688
-
-
C:\Windows\System32\OMgZcpv.exeC:\Windows\System32\OMgZcpv.exe2⤵PID:11792
-
-
C:\Windows\System32\NexnZmI.exeC:\Windows\System32\NexnZmI.exe2⤵PID:11832
-
-
C:\Windows\System32\LNNBEBE.exeC:\Windows\System32\LNNBEBE.exe2⤵PID:11896
-
-
C:\Windows\System32\qHefunZ.exeC:\Windows\System32\qHefunZ.exe2⤵PID:11944
-
-
C:\Windows\System32\AYyAXCk.exeC:\Windows\System32\AYyAXCk.exe2⤵PID:12036
-
-
C:\Windows\System32\UnAdmxr.exeC:\Windows\System32\UnAdmxr.exe2⤵PID:12064
-
-
C:\Windows\System32\pjBoIFe.exeC:\Windows\System32\pjBoIFe.exe2⤵PID:12140
-
-
C:\Windows\System32\NfYMKgu.exeC:\Windows\System32\NfYMKgu.exe2⤵PID:12180
-
-
C:\Windows\System32\ygSRmcz.exeC:\Windows\System32\ygSRmcz.exe2⤵PID:12276
-
-
C:\Windows\System32\LZlLPyE.exeC:\Windows\System32\LZlLPyE.exe2⤵PID:10852
-
-
C:\Windows\System32\edhICTh.exeC:\Windows\System32\edhICTh.exe2⤵PID:10436
-
-
C:\Windows\System32\HrRyUWV.exeC:\Windows\System32\HrRyUWV.exe2⤵PID:11568
-
-
C:\Windows\System32\IRTvgGY.exeC:\Windows\System32\IRTvgGY.exe2⤵PID:10320
-
-
C:\Windows\System32\jXXcxUG.exeC:\Windows\System32\jXXcxUG.exe2⤵PID:11676
-
-
C:\Windows\System32\dDnNSUG.exeC:\Windows\System32\dDnNSUG.exe2⤵PID:11704
-
-
C:\Windows\System32\ihJTEUZ.exeC:\Windows\System32\ihJTEUZ.exe2⤵PID:12032
-
-
C:\Windows\System32\PvXTERG.exeC:\Windows\System32\PvXTERG.exe2⤵PID:12084
-
-
C:\Windows\System32\oolfKBP.exeC:\Windows\System32\oolfKBP.exe2⤵PID:12228
-
-
C:\Windows\System32\MWgCFWd.exeC:\Windows\System32\MWgCFWd.exe2⤵PID:11268
-
-
C:\Windows\System32\LHZzKUp.exeC:\Windows\System32\LHZzKUp.exe2⤵PID:11644
-
-
C:\Windows\System32\xBdDizO.exeC:\Windows\System32\xBdDizO.exe2⤵PID:11764
-
-
C:\Windows\System32\BoYEZgx.exeC:\Windows\System32\BoYEZgx.exe2⤵PID:12196
-
-
C:\Windows\System32\oFYEKON.exeC:\Windows\System32\oFYEKON.exe2⤵PID:11576
-
-
C:\Windows\System32\PGCYkdM.exeC:\Windows\System32\PGCYkdM.exe2⤵PID:12292
-
-
C:\Windows\System32\YZOkssz.exeC:\Windows\System32\YZOkssz.exe2⤵PID:12308
-
-
C:\Windows\System32\uFDyCmR.exeC:\Windows\System32\uFDyCmR.exe2⤵PID:12348
-
-
C:\Windows\System32\sgyBxUg.exeC:\Windows\System32\sgyBxUg.exe2⤵PID:12376
-
-
C:\Windows\System32\wpjfxqw.exeC:\Windows\System32\wpjfxqw.exe2⤵PID:12396
-
-
C:\Windows\System32\CBxhAsX.exeC:\Windows\System32\CBxhAsX.exe2⤵PID:12444
-
-
C:\Windows\System32\PVZAFtu.exeC:\Windows\System32\PVZAFtu.exe2⤵PID:12472
-
-
C:\Windows\System32\jMhUDvL.exeC:\Windows\System32\jMhUDvL.exe2⤵PID:12488
-
-
C:\Windows\System32\oEJEftl.exeC:\Windows\System32\oEJEftl.exe2⤵PID:12520
-
-
C:\Windows\System32\TUGqiiS.exeC:\Windows\System32\TUGqiiS.exe2⤵PID:12544
-
-
C:\Windows\System32\ROHlFMY.exeC:\Windows\System32\ROHlFMY.exe2⤵PID:12568
-
-
C:\Windows\System32\aPrxIRW.exeC:\Windows\System32\aPrxIRW.exe2⤵PID:12608
-
-
C:\Windows\System32\BRlYmaI.exeC:\Windows\System32\BRlYmaI.exe2⤵PID:12632
-
-
C:\Windows\System32\dwbodkp.exeC:\Windows\System32\dwbodkp.exe2⤵PID:12648
-
-
C:\Windows\System32\ttWOgOL.exeC:\Windows\System32\ttWOgOL.exe2⤵PID:12680
-
-
C:\Windows\System32\yXijHMh.exeC:\Windows\System32\yXijHMh.exe2⤵PID:12712
-
-
C:\Windows\System32\gCkoRtY.exeC:\Windows\System32\gCkoRtY.exe2⤵PID:12756
-
-
C:\Windows\System32\qdYdQYx.exeC:\Windows\System32\qdYdQYx.exe2⤵PID:12776
-
-
C:\Windows\System32\MxNKySS.exeC:\Windows\System32\MxNKySS.exe2⤵PID:12812
-
-
C:\Windows\System32\gYgKxQL.exeC:\Windows\System32\gYgKxQL.exe2⤵PID:12836
-
-
C:\Windows\System32\uwJWcER.exeC:\Windows\System32\uwJWcER.exe2⤵PID:12864
-
-
C:\Windows\System32\ybefOGS.exeC:\Windows\System32\ybefOGS.exe2⤵PID:12880
-
-
C:\Windows\System32\zOfRaqE.exeC:\Windows\System32\zOfRaqE.exe2⤵PID:12904
-
-
C:\Windows\System32\xTgiYcI.exeC:\Windows\System32\xTgiYcI.exe2⤵PID:12936
-
-
C:\Windows\System32\ymCArDf.exeC:\Windows\System32\ymCArDf.exe2⤵PID:12960
-
-
C:\Windows\System32\OyRLStN.exeC:\Windows\System32\OyRLStN.exe2⤵PID:13028
-
-
C:\Windows\System32\XPMwjBs.exeC:\Windows\System32\XPMwjBs.exe2⤵PID:13052
-
-
C:\Windows\System32\boCmLSS.exeC:\Windows\System32\boCmLSS.exe2⤵PID:13072
-
-
C:\Windows\System32\AudrtsE.exeC:\Windows\System32\AudrtsE.exe2⤵PID:13100
-
-
C:\Windows\System32\CTFtdvx.exeC:\Windows\System32\CTFtdvx.exe2⤵PID:13124
-
-
C:\Windows\System32\OUquFcx.exeC:\Windows\System32\OUquFcx.exe2⤵PID:13144
-
-
C:\Windows\System32\cTqfxEo.exeC:\Windows\System32\cTqfxEo.exe2⤵PID:13204
-
-
C:\Windows\System32\VIZPLNU.exeC:\Windows\System32\VIZPLNU.exe2⤵PID:13240
-
-
C:\Windows\System32\mboOdig.exeC:\Windows\System32\mboOdig.exe2⤵PID:13268
-
-
C:\Windows\System32\mxBzYqb.exeC:\Windows\System32\mxBzYqb.exe2⤵PID:12136
-
-
C:\Windows\System32\ipYERQW.exeC:\Windows\System32\ipYERQW.exe2⤵PID:11868
-
-
C:\Windows\System32\TQWLnRa.exeC:\Windows\System32\TQWLnRa.exe2⤵PID:12316
-
-
C:\Windows\System32\biNeNam.exeC:\Windows\System32\biNeNam.exe2⤵PID:12388
-
-
C:\Windows\System32\djbHZKR.exeC:\Windows\System32\djbHZKR.exe2⤵PID:12496
-
-
C:\Windows\System32\TBpYLaW.exeC:\Windows\System32\TBpYLaW.exe2⤵PID:12480
-
-
C:\Windows\System32\TbNrHOi.exeC:\Windows\System32\TbNrHOi.exe2⤵PID:12556
-
-
C:\Windows\System32\GOpEUah.exeC:\Windows\System32\GOpEUah.exe2⤵PID:12664
-
-
C:\Windows\System32\yGmYmNJ.exeC:\Windows\System32\yGmYmNJ.exe2⤵PID:12728
-
-
C:\Windows\System32\wkHortm.exeC:\Windows\System32\wkHortm.exe2⤵PID:12748
-
-
C:\Windows\System32\JmWABRA.exeC:\Windows\System32\JmWABRA.exe2⤵PID:2788
-
-
C:\Windows\System32\XFgQaeg.exeC:\Windows\System32\XFgQaeg.exe2⤵PID:12876
-
-
C:\Windows\System32\RaXeMry.exeC:\Windows\System32\RaXeMry.exe2⤵PID:12948
-
-
C:\Windows\System32\NWQGGHF.exeC:\Windows\System32\NWQGGHF.exe2⤵PID:12992
-
-
C:\Windows\System32\tgTCmtL.exeC:\Windows\System32\tgTCmtL.exe2⤵PID:13060
-
-
C:\Windows\System32\TmlXmgP.exeC:\Windows\System32\TmlXmgP.exe2⤵PID:13136
-
-
C:\Windows\System32\hMTDzJD.exeC:\Windows\System32\hMTDzJD.exe2⤵PID:13216
-
-
C:\Windows\System32\JxgORdC.exeC:\Windows\System32\JxgORdC.exe2⤵PID:13260
-
-
C:\Windows\System32\DOHTxKj.exeC:\Windows\System32\DOHTxKj.exe2⤵PID:12300
-
-
C:\Windows\System32\ZzNiLzY.exeC:\Windows\System32\ZzNiLzY.exe2⤵PID:12504
-
-
C:\Windows\System32\SAaMHwM.exeC:\Windows\System32\SAaMHwM.exe2⤵PID:12644
-
-
C:\Windows\System32\NlGJVQd.exeC:\Windows\System32\NlGJVQd.exe2⤵PID:3700
-
-
C:\Windows\System32\iDboRbd.exeC:\Windows\System32\iDboRbd.exe2⤵PID:12924
-
-
C:\Windows\System32\cBCgwNh.exeC:\Windows\System32\cBCgwNh.exe2⤵PID:13016
-
-
C:\Windows\System32\RPSOSrE.exeC:\Windows\System32\RPSOSrE.exe2⤵PID:1984
-
-
C:\Windows\System32\zTVqxxr.exeC:\Windows\System32\zTVqxxr.exe2⤵PID:12120
-
-
C:\Windows\System32\omhwqzJ.exeC:\Windows\System32\omhwqzJ.exe2⤵PID:12704
-
-
C:\Windows\System32\NLAsAAN.exeC:\Windows\System32\NLAsAAN.exe2⤵PID:12912
-
-
C:\Windows\System32\VGaOqtO.exeC:\Windows\System32\VGaOqtO.exe2⤵PID:13236
-
-
C:\Windows\System32\UZZPNwi.exeC:\Windows\System32\UZZPNwi.exe2⤵PID:13168
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:13680 -
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:14060
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4300
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2400
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4420
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:14080
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:8536
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6820
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:8936
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7152
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4460
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:6172
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3592
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:13560
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5924
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6196
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:9284
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:10152
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5020
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:8156
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7260
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:10260
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:13720
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8428
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8844
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:9704
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1344
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1956
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:12340
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11428
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:11752
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11912
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9048
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5608
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:13100
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:12384
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:13168
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6680
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5312
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7720
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6692
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:13572
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7872
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2084
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2572
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6668
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8788
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9028
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4932
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:9920
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:10108
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:11888
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:11628
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:12292
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:14316
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3924
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:11876
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1944
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6292
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3416
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:13440
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2068
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3044
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6896
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8424
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3900
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:10808
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8552
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:10420
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5620
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:9156
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1740
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1020
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5148
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\3MKUANJA\microsoft.windows[1].xml
Filesize97B
MD56a517bf11dbd236d703ed9898dd3f910
SHA1f8d64563b0eaba616dc29496c51f795ede02d767
SHA256d7b7aa87d942a062dd03f78ade8fab7d8efcba60b8c44c52326eea574eeb182b
SHA51204f15407222285b97dfff27db7320a590d20c7982d13e2eabc68d3b99fce2863951de8321780e7e70d0d187297c6ee6202014dc0ac6d30a7010bff59be769058
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133602764864559107.txt
Filesize75KB
MD58cdd0e31fdc880d03dd47abc4b0efbf9
SHA137648604549b090bc8683dffda89fe8338b18d9c
SHA256edf5f36d377aa149ebfbf55c896fe8716ea11f49a9ec61df2d327bc43c835bab
SHA512b7cb49eb50e7b5e0d36c7e971b39bde726d36383f5723ad5bb082c266435550030d5a8b53eda5c2ddfc720d73007aba4ffd36b32949161876104328d98a9a511
-
Filesize
1.2MB
MD5389319cf484e058a1f600dc4c95b9c6b
SHA12456d2ceec8f53c7d560dd4c1150062993237b92
SHA25620e8705900241fa7ba465b6895d021a4ee37134baefce11a01491c937d8c7d1d
SHA512048bef192d7cafff471105d3319590948a113f404bd0d01095431a92cc9c75ea9acae6bdbc2acead226d95fae4bcd6f0d69de74bb9415c4daf62dfc479515e3b
-
Filesize
1.2MB
MD59a2b706930e7e3d1a8a8ddb05aa504e7
SHA16ee057b8d40813c9ce65bfbaf33179ffa3507164
SHA25661decb3c30321345e97ed0b0328f345b15776972c00f1fe27f3ce8cdffd831bc
SHA51266564bf6f5039787fffeb2bb96edffa551d104a62723367fa9acde57978342458bfb1feef3a90a7c50a6ecf5205cb98044ca690ab95dc6730188bc58bb2c485a
-
Filesize
1.2MB
MD58f0c5a7b30824ebc9102650cf68b84b0
SHA1c102e302de55638ee2ff73eca79ca32fd0a6e810
SHA256601ddc9acabcf81d109c320c784d1269ac01132c3d6602e991501b80e4921816
SHA5120d1916eb516e637369269757f563ba720285174dbbac6951432afa64309d04fe48bb253956a734c57d4c07e682d0590ae777f778d71b9bb0f4f8cd5a32625e88
-
Filesize
1.2MB
MD59caf76a7cfc2534049b459d184cd301d
SHA190d231074b46bc0b547921ba3f1e266c7916f732
SHA256555ab0029ca4f907efa3db5312164742929eef0267e9cfb704c665f7c8b41eaf
SHA512ec4d01ab58180684d6e2aea1805d4f73fd53f6c403de32923a4aca9e3fa3942441d2bc5d528787bc1928cae579662c6af46345c915d364a32c63319b0a8e3c28
-
Filesize
1.2MB
MD5bb19d388bec056ff7cc71df0a6aefff0
SHA15a045e6727b318dc65a60b758668da97ff53611c
SHA25665a7951a71391f8c96393ec5a5e884858b3eee93f50d77d6c4f60fa1b4deca8c
SHA51233f6466f93dfaa95a3e5eddaed29512acf9fb10d1a662d0cfa3b0a45422bace7c6d5df5a06ae2edd75f3bf4b4bc95b22f28d5c7b370afd213b37b167cd78949e
-
Filesize
1.2MB
MD5478352d98517ccfbce1348e16579f64e
SHA118ad02246505a9c8ad6d176286258882855244f8
SHA2563784cc333a21e069a9ada9abc594603fe30e84f9c439566fb4c56d404bc3ebce
SHA51255818df8b63c9da482c4866e1a0762df8cf0186c24983c67025c6f76a2ba84cd19c7cde997289e9c95641cb2a7c07273c4ca466530e7cd298d26496cb2af71ed
-
Filesize
1.2MB
MD5b6e127b1eebe47e66e54c15430901909
SHA11d34f25767ea20fba3f50d90b9f048511bc86557
SHA2566a26131248c925d0131330a5bdd57ce3f0b383e14794ba5ad0ed4567efbcb2e8
SHA5127a8268a71220964b22c48704d3bdf3af6626c9646d9560db152231a6707239425d1c8e326ca4f2735255dc2b806cdd5fb62970ebd118aa9f2f961ffeef65b4fb
-
Filesize
1.2MB
MD5cdb7e983a75b3e02aba2deb3190d0010
SHA17572c7a41ecbf4b83840abb700ff51ca556a692b
SHA256fd8bfa79bc593ebbe3a649d36c5496eb59ca39637e08a938e30c84016fd0e3aa
SHA512d096dd5f76f1c0339a40439bd9b3e8fa7458798d8c26fcd28b0e0b7c50cb6b04a89add5450c15e51ea90bf55329767dc7c856e56a81e8f99c6da65a9c6b9823a
-
Filesize
1.2MB
MD5551dc42d85a4ababba94f9f985067962
SHA1c84119b2508233c7d78d7ff5fcad4e7f658662ca
SHA25655d45fbd18ae946fb414984e276bf0c40f673d43f107f0ce40ed26f3bfafa66d
SHA5120029642dcb91988b139aa0f579f26b4a7a796c201eee0381dda14ee30c6b9170a95287392d2f5447e8d7d3e22b935d53dbcc5e75672791f763376300e38addda
-
Filesize
1.2MB
MD515e118d5b9b8e20c34a4477f14446470
SHA1752fc0175c62ad5bd58808ae982807da44af7663
SHA2568785ecc373767eeb331eceb5911c72651030a05a0ebcfee0fb86505ff33fc0f1
SHA5120edabda442eedc4dd4c576924a5064091032f26015e0a6ab3a47431b0be9350d48a621726d396265e58170c3b1dc179d6eeb22bc1420d4fb0b3edf3c80903e58
-
Filesize
1.2MB
MD5ab5dd8eaab0427c27342cc63b00886dc
SHA1c2d5f4c3964bd93bfc15b1cf762385a0dfcc25c5
SHA256de8b8b001c40abe0d98a6ec5b1c38eed8f6ce206768de6a8003f362da329366f
SHA512842b37d79038fcc276e2060227d6aea234aacc1a7f204fecf149cb23cec98a6bd2e5bd22e0b1dc28b9474783c9ca1aae32a04d58375ac8f34d923f2fdf66f193
-
Filesize
1.2MB
MD5c95b95a43e6d9aa4f1970b1785e9e4a5
SHA1f6cd3041485a1003d74c0d9f3c0763db9cb721aa
SHA256af523fe30f64f818d17f9dfa66943d7f5af1990ffa78381845cf5f169ce50091
SHA512c247d18dfde108627c4009663a3c8d9bb4d55f574120e1440f3a91bb39e8dc473cb6b17f722693514edbbb9f17756f20320872e9c582c1274fcc3db770e0bb79
-
Filesize
1.2MB
MD5a81978ef7a2bdbdb4eb85d424ec6e4aa
SHA1bf324b0499544a51742f027d7ad451990c2ab13f
SHA25683805d5883c80653022b4fb003a375fb7639e9ee8fdf83e06fe11f85ae494ad7
SHA5120b9a4887bb0a3f006dc3f85c23670ef5b2f9ca7c2f194b3607a259667555e2cb4d24986f972f77ade9873e20634e732be0bba22f857be9bea05cc39caff5d23f
-
Filesize
1.2MB
MD526dcfa82e375c4d5eaacc21a4d6d2398
SHA1b4a4406b7e73ddb12cacd40a190bfd2ec97a35cc
SHA256cdd42933cf81bd2f7721a262ea1428343a20d8eab1122ce9d7f335d62107fe4c
SHA5125208b01a18dbb06853167fea0a19e7027f359907f79fdc6c6b42b270baac85abc1db98e0da9390ea3c95a28962fa4417a4a3af3ab7c5a573df1582bde2872157
-
Filesize
1.2MB
MD5a55665288a54aedd7ea8c1b719a576b1
SHA1104c43523369a7ceb1855ac237e313aedf799b28
SHA256e8d4d99a4397f2849521cdce588771a6f9e440d659dbc4d80f098acb88a0a613
SHA51214c0830225335102c982b1a2b9318ecffe646f4e9951657c6d41191125a76f8746ee7e1a6eb11db3c37edb3ab838159a8539aa328685b6e05746008ac1be640a
-
Filesize
1.2MB
MD5569f86764b552d0324fa0d6f82cec24a
SHA1994c0dd432197939e5f6d5e9fb41c7b4636d9a13
SHA2560690471333bfedcebdae6fb4ad14033f6d06871f1e45c7a00ad366139db611cf
SHA5121a0fc94634c051aa0e9c1a98853cfc6ee40809ee3151e4ecd4f82aa9817afcc268567f6c18dbbe6b2a874fe6fcb00da3f422d6250e0f129b2b661c5de5cd7c76
-
Filesize
1.2MB
MD5256ee10812a081e01723687ea0a9fe30
SHA10cd76bc019ae9946f89bdf0df872dff3a38ee925
SHA2569b95b19795b56468f19ef8101462efcd7c03be6e490e24fadbcb5f8643c67c92
SHA5126317cf8056e8e14b635bde67f2b2b1667296554b6a25e60221310c22103289f78a4c3d4e5b2c7b49b9cf07ee8eec1cc9a7bccb3f404718c5fa977fffab2eb18e
-
Filesize
1.2MB
MD50b7265284fac8fc4816789e7ade0f332
SHA11fbbf62940a97d42e5f310f53d8d384423c36528
SHA256a20510047a8bf30b298b0858167d40bb4ff2f466797721c3d8e95c122b79f54b
SHA5120e51f2e2c613eda7672ffb0453152af6036871470a261a514758a8f5e76de4595751aa0f583f4998d55e739fd99df51012cd85af012f2e11b3992e23364d7784
-
Filesize
1.2MB
MD5822150771df58caa4f2d48e0dfee0897
SHA15215d1de83e5890a13654e7a6cd96b9c0bcea75d
SHA256b36689cb5e7a2ae3f4b4f8be20855bbf5c8fe5901700e7c09782c56b41f2a6fb
SHA512130516fd0cb4df6300bbb311e2ebb70b75dd4cf5c26470f3d2ad70e45ed3de354d49ee900c5105a736c34be543a5d4013cf3331bd724ebd7cd04c04bbcecc2ea
-
Filesize
1.2MB
MD561606ad29e490796646bf32dba856213
SHA1791e6fdb6cbce9ac44ceeba728118a258f696065
SHA256de44ab5b06e152591c4ebe2c0d73eb264dca6b57a3741c79bcd48387fdef4667
SHA51207e4d0da8e764c02b7e188b2915e815da3f6ad8f7624a0a299650ffb0e94356c1056f8bbb1ce5fc2cbd451f2f45ae2746c7966dd87a7924529b4890d2a38a738
-
Filesize
1.2MB
MD5c67eb7a481550b5ec2e5d2b7293dd60f
SHA1052fb9a0811c2c767a15354e15afbdbb5705bb53
SHA25612d91ad2b0243f38efaa151c073feee6cae35df52138b4687b4f72d04cd842d8
SHA51281ff579039d5801ffb5635f4cef2c9a45c2675faf2727b8846c6830a94ba648ad834551307aa7704a3ecc2224fce466f9893f4402aa1ace93332803d5b4c1258
-
Filesize
1.2MB
MD5451c8187a9d407cd5698b59076cbc608
SHA196dc37e41db72bfa29d3e40de5acf6a09b83be80
SHA2564246048ecdf82a613ebb69aa0fc7eb0e337e3872df5e1ad7fc17d3e714e63d8e
SHA5125cbc2567d8fe029ba008f5d8ee1c870ab141bed399b25684a12ab309317c5fc28ab13868891749500607acfdaad5452bd167acc3063e6ccb69338ca58b06daa2
-
Filesize
1.2MB
MD51ab072902ace616e0747b2b4596dc977
SHA1572bfbc1ad30c9f6bc34852cc659cbfbb71809b8
SHA256018ecf2e0ac236d2d741b985ae7208ddcde68f6af3a1588a80ec5f08d2b60e75
SHA5123272c887dc4812218081951ca6d0f3a3887bdacc3eebf87f5e393bd436918d588ac58f758df5e20bf11fe3d08609ffaac8afbdfed67dc4b2814b6e4a83194397
-
Filesize
1.2MB
MD52cdd804ca64e5f06c66586295ff3256f
SHA151337f801016c068ec4a41d92a4552c9414036ab
SHA2563ca08d266ea6abcc99c0750c0084025771005997dffbe75b4c0131e7127cb68d
SHA5123ad507a9e1bfcde4400f169bd1cd3ef216d1ce8d84bb1cd549b1019e37be1abd03032eede5bbf874404acbd5ddd8f3c7ad8a5d7fe8fd94b991551c97c67f0b89
-
Filesize
1.2MB
MD51d5e61d067cd4d344d27df46baf650bb
SHA1407741e60d16483c3d2bd7565d191ade546eeba9
SHA256069ba63da1aaf61939061a90ff488a164aae8dc9c3d6c67a06d7b1c8e6976633
SHA51264affeb027b28487ce8df5c7912f1d4cb9eb87e62a89bd5647a2bf50712e4d9fbc887b32f6a8443dd7c7d6bcb2e2964e6ea19065e3b13f9eddc4734c68b4a998
-
Filesize
1.2MB
MD5baa86549a174a1fa64ae9d2a514b8d2a
SHA1373d8f011994be68710fd026bf53b71f343d98f1
SHA2567cc40b9ae98b9216e4e242ad7ec2ad65e6002a521829e14df7647a2cbeac909b
SHA5121a6a171db72493fbc87479135a8b283d93e605450899a776e382c826c4d370decdfdf8fc1d212e8594389ebb65e2324699da74c85a91f54f3ec3df6efaa26e46
-
Filesize
1.2MB
MD5660b1e2b4f34ab2d3c2b4ffed9ff334f
SHA15d7bd55e539d4c8ef7351c457c6f2f7fd8e78efd
SHA25683d869f2ebc29e09e427a38e2c0be26be167ca5654688390077927d1a5732996
SHA512c8ba3831f7ca6e519ebe3c413d587e59ba0564fc6ec8c20ec86b93a725ec4a4cd91cb53397970dc923f9b6b4e4823f4f62bc78f7d35ad41911cce066c805fabc
-
Filesize
1.2MB
MD5334cf9ff8e2d89cce99f25ec8a36b04a
SHA1b8899fb8cd04aefbcc9e26200ca05c845f9a85f5
SHA256521d18c318a96fa3af145ae2435fe2a8447a3437bcde24633b7a043161c6f6dd
SHA5123b1478384edd61b515f03697b43198421baaead3bead6ef9d8b51824d9cb61d3e318bb6b7f372e7edf6d2e11ac2c525335e01a7d84960e43a17b39fffaa905de
-
Filesize
1.2MB
MD5784f751ff18816dcd61a4319fcfac8ad
SHA1040c35f43a52df11f0ab39a5a1f204ccad1c5663
SHA2566bc7e8feaa22c2c4174a23eb7f99cafbece10973e8d705b9d06d0553a28292c6
SHA51249ad007f5a715a158c6411267a127812aa14f1feb82b694b61b95fcd510e1e9472dcd8349cb1609702421d5ae1c3b255680d13e9e7b77c66c6300004b95201de
-
Filesize
1.2MB
MD5577def9f569bb5b884b0b56746d53a58
SHA145856e189f86efac1cf3c5e9677a2d38e42ca847
SHA256b1d4d7abc7ca6f5d341986c4be0272f7b93e3606c836fea7a36c6deb243abcfb
SHA512111675857a12aa9b71b674499fd8f90779971bbfbfd02cee44578c1b30bd51e54b114e65d5a6fbf83062e01a39eb746ce7930122645eba0cdb9455c66deaa3a0
-
Filesize
1.2MB
MD50bb0aff1b37ee65d5f34174c1f7b9282
SHA1dfeb9843a962af680025d4ae9e274099cdc09b88
SHA2561a85aa70cfcf79fdf83f1cfaebe1d5085762b6bcad340175d9d9792b8d323779
SHA512e79eee69e802dbc654a37e3e0e9116dc577aaaa7a880612f1b78b958a42121569913c02e934b20cbdb58da45871af03118fe0ca0a4af3153d6e381980ce2cbe1
-
Filesize
1.2MB
MD54dbacca97003c0c420a28dee57716aab
SHA1dce051309075fdde671545786e45d97afb907d21
SHA256956d07a2e61b43db04badbd45d7e24a2ab1938bf118a4a2c576bf4a98460f4e8
SHA512a095229031861359c319a36691d3997cc5c44322140bda807992bb5a4e1d529297385e43dc95070b0110e2d82f0bf7d5d61ece7a8a6918d35076d466cbd38394