Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe
-
Size
136KB
-
MD5
6f423fedda86b5e4abf581fe4401ff51
-
SHA1
0353510fa3a97cb1c67b0eb16962d8fa4a6a9ffa
-
SHA256
bc69380599d6cbe918a4043530cd903658b42a045831e0a383252521e91da987
-
SHA512
9b1b181df27e3b246ef643a4b98a669fb2531be8b3be851b3996ed5bad83460b59b4d76e1c9b96e0c436398e6b7fd71036ff2143082b251cd6140e0a330b9624
-
SSDEEP
3072:lhT2137DYmJVnurminBwDXuk4CUq8uh+I1YVEtAihhGGsS+CUO:lhRKnuOL4pFu4OzvGfS+DO
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4980-82-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exegy.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation gy.exe -
Executes dropped EXE 64 IoCs
Processes:
2019.exegy.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exepid process 4980 2019.exe 2336 gy.exe 2500 zepvew.exe 464 zepvew.exe 3968 zepvew.exe 3104 zepvew.exe 3188 zepvew.exe 2056 zepvew.exe 1472 zepvew.exe 1288 zepvew.exe 5080 zepvew.exe 4404 zepvew.exe 4136 zepvew.exe 4192 zepvew.exe 1716 zepvew.exe 4660 zepvew.exe 8 zepvew.exe 3260 zepvew.exe 2404 zepvew.exe 3632 zepvew.exe 628 zepvew.exe 4692 zepvew.exe 3124 zepvew.exe 1600 zepvew.exe 2056 zepvew.exe 4772 zepvew.exe 4596 zepvew.exe 2492 zepvew.exe 4712 zepvew.exe 1724 zepvew.exe 3440 zepvew.exe 4864 zepvew.exe 3596 zepvew.exe 892 zepvew.exe 3720 zepvew.exe 1008 zepvew.exe 2220 zepvew.exe 636 zepvew.exe 3256 zepvew.exe 4996 zepvew.exe 228 zepvew.exe 3312 zepvew.exe 2544 zepvew.exe 2820 zepvew.exe 3264 zepvew.exe 3484 zepvew.exe 2192 zepvew.exe 2448 zepvew.exe 4136 zepvew.exe 4516 zepvew.exe 1916 zepvew.exe 4864 zepvew.exe 1584 zepvew.exe 3644 zepvew.exe 428 zepvew.exe 3216 zepvew.exe 3056 zepvew.exe 636 zepvew.exe 3260 zepvew.exe 4996 zepvew.exe 4228 zepvew.exe 368 zepvew.exe 3884 zepvew.exe 444 zepvew.exe -
Loads dropped DLL 64 IoCs
Processes:
zepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exepid process 2500 zepvew.exe 464 zepvew.exe 3968 zepvew.exe 3104 zepvew.exe 3188 zepvew.exe 2056 zepvew.exe 1472 zepvew.exe 1288 zepvew.exe 5080 zepvew.exe 4404 zepvew.exe 4136 zepvew.exe 4192 zepvew.exe 1716 zepvew.exe 4660 zepvew.exe 8 zepvew.exe 3260 zepvew.exe 2404 zepvew.exe 3632 zepvew.exe 628 zepvew.exe 4692 zepvew.exe 3124 zepvew.exe 1600 zepvew.exe 2056 zepvew.exe 4772 zepvew.exe 4596 zepvew.exe 2492 zepvew.exe 4712 zepvew.exe 1724 zepvew.exe 3440 zepvew.exe 4864 zepvew.exe 3596 zepvew.exe 892 zepvew.exe 3720 zepvew.exe 1008 zepvew.exe 2220 zepvew.exe 636 zepvew.exe 3256 zepvew.exe 4996 zepvew.exe 228 zepvew.exe 3312 zepvew.exe 2544 zepvew.exe 2820 zepvew.exe 3264 zepvew.exe 3484 zepvew.exe 2192 zepvew.exe 2448 zepvew.exe 4136 zepvew.exe 4516 zepvew.exe 1916 zepvew.exe 4864 zepvew.exe 1584 zepvew.exe 3644 zepvew.exe 428 zepvew.exe 3216 zepvew.exe 3056 zepvew.exe 636 zepvew.exe 3260 zepvew.exe 4996 zepvew.exe 4228 zepvew.exe 368 zepvew.exe 3884 zepvew.exe 444 zepvew.exe 448 zepvew.exe 5080 zepvew.exe -
Processes:
resource yara_rule C:\2019.exe upx C:\gy.exe upx behavioral2/memory/4980-14-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2336-17-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2336-22-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2500-32-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/464-34-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/464-45-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3968-47-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3968-56-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3104-58-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3104-68-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3188-70-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3188-80-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4980-82-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/2056-83-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2056-94-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1472-97-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1472-108-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1288-110-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1288-120-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/5080-122-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/5080-131-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4404-133-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4404-143-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4136-145-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4136-155-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4192-157-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4192-167-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1716-169-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1716-179-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4660-189-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/8-191-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/8-201-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3260-203-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3260-212-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2404-214-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2404-223-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3632-225-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3632-234-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/628-236-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/628-246-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4692-248-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4692-258-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3124-259-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3124-267-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1600-268-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1600-276-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2056-277-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2056-285-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4772-286-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4772-294-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4596-303-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2492-304-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2492-311-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4712-312-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4712-319-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1724-327-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3440-328-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3440-336-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4864-337-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4864-345-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3596-346-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3596-353-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2019.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bootcon2019.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2019.exe" 2019.exe -
Drops file in System32 directory 64 IoCs
Processes:
zepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exezepvew.exedescription ioc process File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File created C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe File opened for modification C:\Windows\SysWOW64\hra33.dll zepvew.exe -
Drops file in Windows directory 2 IoCs
Processes:
gy.exedescription ioc process File created C:\Windows\zepvew.exe gy.exe File opened for modification C:\Windows\zepvew.exe gy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
gy.exedescription pid process Token: SeIncBasePriorityPrivilege 2336 gy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exegy.exedescription pid process target process PID 2420 wrote to memory of 4980 2420 6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe 2019.exe PID 2420 wrote to memory of 4980 2420 6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe 2019.exe PID 2420 wrote to memory of 4980 2420 6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe 2019.exe PID 2420 wrote to memory of 2336 2420 6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe gy.exe PID 2420 wrote to memory of 2336 2420 6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe gy.exe PID 2420 wrote to memory of 2336 2420 6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe gy.exe PID 2336 wrote to memory of 3476 2336 gy.exe cmd.exe PID 2336 wrote to memory of 3476 2336 gy.exe cmd.exe PID 2336 wrote to memory of 3476 2336 gy.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f423fedda86b5e4abf581fe4401ff51_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\2019.exe"C:\2019.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\gy.exe"C:\gy.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\gy.exe > nul3⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Loads dropped DLL
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
- Drops file in System32 directory
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
-
C:\Windows\zepvew.exeC:\Windows\zepvew.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\2019.exeFilesize
75KB
MD542d1c5df8c0406dd52249160018a458c
SHA162dcd55d74423dfa0618a916672fbc706bab2919
SHA2566a4a55d7486ab05009c144c3da303328a2d514a59721f17ddc9bda76a8dc7817
SHA5124e79366cd9c9947e0d543d31d3b747dd1cb4de9e20ef5af52a9cc62b014eb4042375e3762699f0af2ef1f78fe061f1beffa751796489fd3eacf289c300da0aae
-
C:\RCX4FD5.tmpFilesize
35KB
MD529cba70d417ad3f5c22fb7b384062c21
SHA1e1a2e8b1f52b2933c15fdd8cfa85f538e8da5183
SHA256097c70189ec4aae5d5431e449a368f00ddf1a749ed69098077343e85e34e7ea0
SHA512463062b099a3b661c8c587351cd178e733972638bec67d3ee938521c24c44053006fbd7838915bffef4639ed0a9d8d10e1b42c138ac81c962900853e4110205b
-
C:\Windows\SysWOW64\hra33.dllFilesize
8KB
MD5e702ee910aa2c2b7a31331eb8f02753f
SHA1032c3700e17a3730a85fb364c236422096ac9003
SHA2560086dbeda3b2a54b728adc43c3d3193ed2d4c9b79784d7df7bcf9d8f4b8dae45
SHA512235a428ec5c2f55fbc099e5051fe36fe6d6450a59ec0b5474e6c5241aebab5e8dd15f2bdea837e1d8ac118f7ed5a4e09e90e5781fe2add29ec713c947cf67c13
-
C:\gy.exeFilesize
26KB
MD57302d781d2818727280d6eb9c74a15dd
SHA13bf6ca2e89e768147dcd1644d648e570de64ff60
SHA256a0ddfc9728aa7d9661da4d7874be5290245895673a7a3d7162b57cbcde6c98a2
SHA512024d7fde4c99b3ad813ba5237af46be7d17c38044fa1f85c1bb41281240547e0d655803a6cf5c04b28c31ac0bedbc5a210af4de81d0a245788d7583e98ed7db1
-
memory/8-201-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/8-191-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/228-424-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/368-601-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/368-609-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/428-550-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/428-542-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/444-628-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/448-638-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/448-629-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/464-45-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/464-34-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/628-246-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/628-236-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/636-390-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/636-568-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/636-576-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/636-398-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/848-704-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/848-712-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/892-354-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/892-730-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/892-739-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/892-361-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1008-371-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1008-380-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1048-777-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1048-768-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1288-120-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1288-110-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1448-667-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1448-658-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1472-97-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1472-108-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1584-525-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1584-533-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1600-268-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1600-276-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1716-169-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1716-179-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1724-327-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1916-515-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1916-506-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2056-83-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2056-94-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2056-277-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2056-285-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2192-472-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2192-480-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2220-381-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2220-389-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2336-17-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2336-22-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2404-223-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2404-214-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2448-481-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2448-489-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2492-304-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2492-311-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2500-676-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2500-32-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2544-443-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2544-434-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2632-779-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2632-788-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2820-444-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2820-452-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3056-567-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3056-560-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3104-58-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3104-68-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3124-267-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3124-259-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3156-816-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3188-80-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3188-70-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3216-551-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3216-559-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3256-399-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3256-407-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3260-584-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3260-212-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3260-203-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3264-454-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3264-461-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3276-657-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3276-648-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3312-433-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3312-425-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3440-328-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3440-336-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3484-462-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3484-471-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3596-353-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3596-346-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3616-767-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3632-225-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3632-234-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3644-748-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3644-541-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3720-362-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3720-370-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3884-619-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3884-611-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3948-729-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3968-798-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3968-789-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3968-47-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3968-56-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4052-720-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4116-686-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4116-677-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4136-145-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4136-498-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4136-490-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4136-155-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4192-157-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4192-167-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4228-592-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4228-600-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4404-133-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4404-143-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4444-703-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4516-505-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4596-303-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4660-189-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4692-258-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4692-248-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4696-687-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4696-695-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4712-319-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4712-312-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4772-294-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4772-286-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4864-516-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4864-524-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4864-345-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4864-337-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4980-82-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/4980-14-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/4996-591-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4996-408-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4996-416-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4996-807-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5080-131-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5080-122-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5080-647-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5080-639-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5092-749-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5092-758-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB