Analysis
-
max time kernel
69s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe
-
Size
62KB
-
MD5
0420b684f36b0c0688bda149bcd7f316
-
SHA1
dfc5c96657e8398db309484fcc286ff3374d4559
-
SHA256
e13c926d4df8dea4a9c51da9e6884439f892803b539a6c250fbed536648bb7e7
-
SHA512
e491bfbb5090b6505847ce5a5984d8934a154c8f1171f90842d22f40342517b6c69af3a677da922f15ce69b4a8eaad3961c171526e6fd712231ff03c3fa9e7bb
-
SSDEEP
1536:L0F69FqImwHryxdwOOVDWtiaGJhlsAvkpSTxJpq:L0FsbmwHryxQVCkaGJJcCg
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VsTskMgr.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfwsvc.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpdaterUI.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavmonD.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvxp.kxp 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfwsvc.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SnipeSword.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpdaterUI.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UIHost.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mcshield.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\katmain.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfw32.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mcshield.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TBMon.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwproxy.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavmonD.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FrogAgent.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\katmain.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icesword.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SnipeSword.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UIHost.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwproxy.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Msconfig.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icesword.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VsTskMgr.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\naPrdMgr.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvsrvxp.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FrogAgent.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Taskmgr.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavsvc.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\naPrdMgr.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe\debugger = "C:\\Windows\\system32\\wscntfy.exe" 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 4140 0.exe 4468 0.exe 2648 host.exe 3916 host.exe 1676 host.exe 4868 host.exe 3088 host.exe 5432 host.exe 3860 host.exe 4604 host.exe 3816 host.exe 5212 host.exe 4452 host.exe 4220 host.exe 1484 host.exe 3488 host.exe 2412 host.exe 4996 host.exe 4348 host.exe 5488 host.exe 3988 host.exe 4048 host.exe 5600 host.exe 5604 host.exe 5416 host.exe 1260 host.exe 4848 host.exe 2744 host.exe 6048 host.exe 660 host.exe 2192 host.exe 3364 host.exe 3084 host.exe 4280 host.exe 3656 host.exe 2288 host.exe 5520 host.exe 4816 host.exe 3824 host.exe 776 host.exe 1532 host.exe 3456 host.exe 3052 host.exe 5284 host.exe 5380 host.exe 5776 host.exe 3964 host.exe 3796 host.exe 5676 host.exe 844 host.exe 2364 host.exe 5016 host.exe 5128 host.exe 2004 host.exe 4428 host.exe 5472 host.exe 3140 host.exe 496 host.exe 4516 host.exe 2020 host.exe 4012 host.exe 5348 host.exe 5912 host.exe 3608 host.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe host.exe File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found File created C:\Windows\SysWOW64\host.exe Process not Found -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\1.1 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe File opened for modification C:\Windows\k.k 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe File opened for modification C:\Windows\0.exe 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe File created C:\Windows\killme.bat 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 0.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Passport\LowDAMap iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore\Flags = "0" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore\Count = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Zones iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021493-0000-0000-C000-000000000046} IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\BrowserEmulation\UnattendLoaded = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\User Preferences\2BB20B33B4171CDAAB6469225AE6A582ED33D7B488 = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000502ad19e859229498b6106dd0e3bbebf00000000020000000000106600000001000020000000aaf759fe7de886f69e6b00e0298428029a3a32b629be6ff92e0d5df9c0bb2d96000000000e8000000002000020000000a1df1278f3a9007cbdec827c65945cf2db6a1390993c8223c468da6cfc58b52f10000000ffefc9e84ec4dcf7f258c67409efb1664000000071052f747a7646b32986bbd7bd0f082e6f9228bbc064f36816d254c1b0bcbc6806692de3d2258f3c22c9b756d0bfbe7917b7725eec3e3d688f19a67bc77df3bf iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\iexplore\Time = d0070100060001000000000001004a01 iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "2968984612" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Feeds iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Passport\LowDAMap iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\SearchBandMigrationVersion = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\iexplore iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Flags = "1024" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 0.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "29316145" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\SearchScopesUpgradeVersion = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Setup\UrlHistoryMigrationTime = 3507322b7ba1da01 iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\iexplore\Flags = "0" iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\iexplore\Time = d0070100060001000000000001003b01 iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021494-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000d007010006000100000000000a00540200000000 iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Software IEXPLORE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 0.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Recovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSystemtimePrivilege 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Token: SeSystemtimePrivilege 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Token: SeSystemtimePrivilege 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Token: SeSystemtimePrivilege 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe Token: SeSystemtimePrivilege 4140 0.exe Token: SeIncBasePriorityPrivilege 4140 0.exe Token: SeIncBasePriorityPrivilege 2648 host.exe Token: SeIncBasePriorityPrivilege 3916 host.exe Token: SeIncBasePriorityPrivilege 1676 host.exe Token: SeIncBasePriorityPrivilege 4868 host.exe Token: SeIncBasePriorityPrivilege 3088 host.exe Token: SeIncBasePriorityPrivilege 5432 host.exe Token: SeIncBasePriorityPrivilege 3860 host.exe Token: SeIncBasePriorityPrivilege 4604 host.exe Token: SeIncBasePriorityPrivilege 3816 host.exe Token: SeIncBasePriorityPrivilege 5212 host.exe Token: SeIncBasePriorityPrivilege 4452 host.exe Token: SeIncBasePriorityPrivilege 4220 host.exe Token: SeIncBasePriorityPrivilege 1484 host.exe Token: SeIncBasePriorityPrivilege 3488 host.exe Token: SeIncBasePriorityPrivilege 2412 host.exe Token: SeIncBasePriorityPrivilege 4996 host.exe Token: SeIncBasePriorityPrivilege 4348 host.exe Token: SeIncBasePriorityPrivilege 5488 host.exe Token: SeIncBasePriorityPrivilege 3988 host.exe Token: SeIncBasePriorityPrivilege 4048 host.exe Token: SeIncBasePriorityPrivilege 5600 host.exe Token: SeIncBasePriorityPrivilege 5604 host.exe Token: SeIncBasePriorityPrivilege 5416 host.exe Token: SeIncBasePriorityPrivilege 1260 host.exe Token: SeIncBasePriorityPrivilege 4848 host.exe Token: SeIncBasePriorityPrivilege 2744 host.exe Token: SeIncBasePriorityPrivilege 6048 host.exe Token: SeIncBasePriorityPrivilege 660 host.exe Token: SeIncBasePriorityPrivilege 2192 host.exe Token: SeIncBasePriorityPrivilege 3364 host.exe Token: SeIncBasePriorityPrivilege 3084 host.exe Token: SeIncBasePriorityPrivilege 4280 host.exe Token: SeIncBasePriorityPrivilege 3656 host.exe Token: SeIncBasePriorityPrivilege 2288 host.exe Token: SeIncBasePriorityPrivilege 5520 host.exe Token: SeIncBasePriorityPrivilege 4816 host.exe Token: SeIncBasePriorityPrivilege 3824 host.exe Token: SeIncBasePriorityPrivilege 776 host.exe Token: SeIncBasePriorityPrivilege 1532 host.exe Token: SeIncBasePriorityPrivilege 3456 host.exe Token: SeIncBasePriorityPrivilege 3052 host.exe Token: SeIncBasePriorityPrivilege 5284 host.exe Token: SeIncBasePriorityPrivilege 5380 host.exe Token: SeIncBasePriorityPrivilege 5776 host.exe Token: SeIncBasePriorityPrivilege 3964 host.exe Token: SeIncBasePriorityPrivilege 3796 host.exe Token: SeIncBasePriorityPrivilege 5676 host.exe Token: SeIncBasePriorityPrivilege 844 host.exe Token: SeIncBasePriorityPrivilege 2364 host.exe Token: SeIncBasePriorityPrivilege 5016 host.exe Token: SeIncBasePriorityPrivilege 5128 host.exe Token: SeIncBasePriorityPrivilege 2004 host.exe Token: SeIncBasePriorityPrivilege 4428 host.exe Token: SeIncBasePriorityPrivilege 5472 host.exe Token: SeIncBasePriorityPrivilege 3140 host.exe Token: SeIncBasePriorityPrivilege 496 host.exe Token: SeIncBasePriorityPrivilege 4516 host.exe Token: SeIncBasePriorityPrivilege 2020 host.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 4892 iexplore.exe 4892 iexplore.exe 4892 iexplore.exe 4892 iexplore.exe 4892 iexplore.exe 4892 iexplore.exe 4892 iexplore.exe 4892 iexplore.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 2648 host.exe 2648 host.exe 3916 host.exe 3916 host.exe 1676 host.exe 1676 host.exe 4892 iexplore.exe 4892 iexplore.exe 4868 host.exe 4868 host.exe 3088 host.exe 3088 host.exe 5432 host.exe 5432 host.exe 3860 host.exe 3860 host.exe 4604 host.exe 4604 host.exe 3816 host.exe 3816 host.exe 5212 host.exe 5212 host.exe 4452 host.exe 4452 host.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 4220 host.exe 4220 host.exe 1484 host.exe 1484 host.exe 3488 host.exe 3488 host.exe 2412 host.exe 2412 host.exe 4996 host.exe 4996 host.exe 4348 host.exe 4348 host.exe 5488 host.exe 5488 host.exe 3988 host.exe 3988 host.exe 4048 host.exe 4048 host.exe 5600 host.exe 5600 host.exe 5604 host.exe 5604 host.exe 5416 host.exe 5416 host.exe 1260 host.exe 1260 host.exe 4848 host.exe 4848 host.exe 2744 host.exe 2744 host.exe 6048 host.exe 6048 host.exe 660 host.exe 660 host.exe 2192 host.exe 2192 host.exe 3364 host.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4140 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 81 PID 3184 wrote to memory of 4140 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 81 PID 3184 wrote to memory of 4140 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 81 PID 4140 wrote to memory of 3928 4140 0.exe 83 PID 4140 wrote to memory of 3928 4140 0.exe 83 PID 4140 wrote to memory of 3928 4140 0.exe 83 PID 4468 wrote to memory of 4892 4468 0.exe 84 PID 4468 wrote to memory of 4892 4468 0.exe 84 PID 4468 wrote to memory of 4892 4468 0.exe 84 PID 4468 wrote to memory of 2648 4468 0.exe 85 PID 4468 wrote to memory of 2648 4468 0.exe 85 PID 4468 wrote to memory of 2648 4468 0.exe 85 PID 2648 wrote to memory of 3916 2648 host.exe 86 PID 2648 wrote to memory of 3916 2648 host.exe 86 PID 2648 wrote to memory of 3916 2648 host.exe 86 PID 2648 wrote to memory of 1020 2648 host.exe 87 PID 2648 wrote to memory of 1020 2648 host.exe 87 PID 2648 wrote to memory of 1020 2648 host.exe 87 PID 3916 wrote to memory of 1676 3916 host.exe 88 PID 3916 wrote to memory of 1676 3916 host.exe 88 PID 3916 wrote to memory of 1676 3916 host.exe 88 PID 3916 wrote to memory of 2384 3916 host.exe 89 PID 3916 wrote to memory of 2384 3916 host.exe 89 PID 3916 wrote to memory of 2384 3916 host.exe 89 PID 1676 wrote to memory of 4868 1676 host.exe 91 PID 1676 wrote to memory of 4868 1676 host.exe 91 PID 1676 wrote to memory of 4868 1676 host.exe 91 PID 4892 wrote to memory of 2416 4892 iexplore.exe 90 PID 4892 wrote to memory of 2416 4892 iexplore.exe 90 PID 4892 wrote to memory of 2416 4892 iexplore.exe 90 PID 1676 wrote to memory of 5624 1676 host.exe 92 PID 1676 wrote to memory of 5624 1676 host.exe 92 PID 1676 wrote to memory of 5624 1676 host.exe 92 PID 4868 wrote to memory of 3088 4868 host.exe 93 PID 4868 wrote to memory of 3088 4868 host.exe 93 PID 4868 wrote to memory of 3088 4868 host.exe 93 PID 4868 wrote to memory of 3104 4868 host.exe 94 PID 4868 wrote to memory of 3104 4868 host.exe 94 PID 4868 wrote to memory of 3104 4868 host.exe 94 PID 3088 wrote to memory of 5432 3088 host.exe 95 PID 3088 wrote to memory of 5432 3088 host.exe 95 PID 3088 wrote to memory of 5432 3088 host.exe 95 PID 3088 wrote to memory of 4976 3088 host.exe 96 PID 3088 wrote to memory of 4976 3088 host.exe 96 PID 3088 wrote to memory of 4976 3088 host.exe 96 PID 5432 wrote to memory of 3860 5432 host.exe 97 PID 5432 wrote to memory of 3860 5432 host.exe 97 PID 5432 wrote to memory of 3860 5432 host.exe 97 PID 5432 wrote to memory of 556 5432 host.exe 98 PID 5432 wrote to memory of 556 5432 host.exe 98 PID 5432 wrote to memory of 556 5432 host.exe 98 PID 3860 wrote to memory of 4604 3860 host.exe 99 PID 3860 wrote to memory of 4604 3860 host.exe 99 PID 3860 wrote to memory of 4604 3860 host.exe 99 PID 3860 wrote to memory of 1416 3860 host.exe 100 PID 3860 wrote to memory of 1416 3860 host.exe 100 PID 3860 wrote to memory of 1416 3860 host.exe 100 PID 4604 wrote to memory of 3816 4604 host.exe 101 PID 4604 wrote to memory of 3816 4604 host.exe 101 PID 4604 wrote to memory of 3816 4604 host.exe 101 PID 3184 wrote to memory of 1572 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 102 PID 3184 wrote to memory of 1572 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 102 PID 3184 wrote to memory of 1572 3184 0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe 102 PID 4604 wrote to memory of 5232 4604 host.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0420b684f36b0c0688bda149bcd7f316_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\0.exeC:\Windows\0.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\0.exe > nul3⤵PID:3928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\killme.bat2⤵PID:1572
-
-
C:\Windows\SysWOW64\0.exeC:\Windows\SysWOW64\0.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4892 CREDAT:17410 /prefetch:23⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5432 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3816 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5212 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4452 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4220 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3488 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4996 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4348 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5488 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3988 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4048 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5600 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5604 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5416 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4848 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:6048 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:660 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3364 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3084 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4280 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3656 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5520 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4816 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3824 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3052 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5284 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5380 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5776 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3796 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5676 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:844 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5128 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4428 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5472 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3140 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:496 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe60⤵
- Executes dropped EXE
PID:4012 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe61⤵
- Executes dropped EXE
PID:5348 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe62⤵
- Executes dropped EXE
PID:5912 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe63⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe64⤵PID:1112
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe65⤵PID:644
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe66⤵PID:4488
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe67⤵PID:6124
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe68⤵PID:4364
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe69⤵PID:6044
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe70⤵PID:2996
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe71⤵PID:2424
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe72⤵PID:4376
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe73⤵PID:684
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe74⤵PID:3596
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe75⤵PID:5056
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe76⤵PID:1140
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe77⤵PID:3916
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe78⤵PID:6040
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe79⤵PID:4868
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe80⤵PID:4984
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe81⤵PID:4404
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe82⤵PID:2144
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe83⤵PID:1520
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe84⤵PID:4836
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe85⤵PID:4688
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe86⤵PID:4328
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe87⤵PID:4916
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe88⤵PID:4436
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe89⤵PID:1232
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe90⤵PID:4260
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe91⤵PID:3620
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe92⤵PID:848
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe93⤵PID:1852
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe94⤵PID:5576
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe95⤵PID:5668
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe96⤵PID:5436
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe97⤵PID:5624
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe98⤵PID:5296
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe99⤵PID:4104
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe100⤵PID:5220
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe101⤵
- Drops file in System32 directory
PID:4568 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe102⤵PID:444
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe103⤵PID:3544
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe104⤵PID:3512
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe105⤵PID:4216
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe106⤵PID:4968
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe107⤵PID:3368
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe108⤵PID:1952
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe109⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe110⤵PID:448
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe111⤵PID:2720
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe112⤵PID:3084
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe113⤵PID:1012
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe114⤵PID:3700
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe115⤵PID:5304
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe116⤵PID:2236
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe117⤵PID:5260
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe118⤵PID:5004
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe119⤵PID:220
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe120⤵PID:1084
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe121⤵PID:3100
-
C:\Windows\SysWOW64\host.exeC:\Windows\system32\host.exe122⤵PID:1456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-