Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 11:10
Behavioral task
behavioral1
Sample
0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe
-
Size
176KB
-
MD5
0574ba053f676337d4fa1d7d3851ada3
-
SHA1
30edab748632fab8dba7bf586019bcb4e7436cc3
-
SHA256
7fb0ad2dda136efc7860caeaf4eb2ba2205fbedf7f7c919fd9ec4c78589e8fc0
-
SHA512
bdfb12b6311ebd9caa7d3e7914555b589b6fe6b92e6452f5c4fa6abd4161f6b1f14031b14a39a4d57e486534aa5bb896fc86c1f4314d007c72d5d0db7a854986
-
SSDEEP
3072:XFRZxizN4ExwNMcf3BOYphy+ryk0W87JjcL2u9aL+pTo:X3OvkxfYJj22UaL+pc
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 13 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\explore.exe modiloader_stage2 behavioral1/memory/6716-2079-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/6804-2090-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/7932-2621-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/6388-5885-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/1192-5903-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/2492-5904-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/2920-5907-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/2360-5908-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/2576-5909-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/2584-5910-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/2136-5911-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/18540-5929-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
Processes:
pid process 18664 -
Executes dropped EXE 64 IoCs
Processes:
explore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exepid process 3052 explore.exe 1276 explore.exe 2516 explore.exe 2312 explore.exe 2920 explore.exe 2256 explore.exe 2360 explore.exe 2576 explore.exe 2632 explore.exe 2656 explore.exe 2584 explore.exe 2660 explore.exe 2440 explore.exe 2716 explore.exe 2136 explore.exe 2604 explore.exe 2568 explore.exe 2488 explore.exe 2444 explore.exe 2496 explore.exe 2732 explore.exe 2856 explore.exe 2916 explore.exe 2996 explore.exe 3060 explore.exe 1736 explore.exe 2216 explore.exe 812 explore.exe 2192 explore.exe 2304 explore.exe 1780 explore.exe 1728 explore.exe 1684 explore.exe 1784 explore.exe 1716 explore.exe 1648 explore.exe 1880 explore.exe 1192 explore.exe 2156 explore.exe 2308 explore.exe 1628 explore.exe 2492 explore.exe 1608 explore.exe 1568 explore.exe 1740 explore.exe 1668 explore.exe 1064 explore.exe 2500 explore.exe 2172 explore.exe 1516 explore.exe 2420 explore.exe 1504 explore.exe 1444 explore.exe 1420 explore.exe 1404 explore.exe 1796 explore.exe 2948 explore.exe 2836 explore.exe 2744 explore.exe 2720 explore.exe 2668 explore.exe 2472 explore.exe 1828 explore.exe 1080 explore.exe -
Loads dropped DLL 64 IoCs
Processes:
0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exepid process 1848 0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe 1848 0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe 3052 explore.exe 3052 explore.exe 1276 explore.exe 1276 explore.exe 2516 explore.exe 2516 explore.exe 2312 explore.exe 2312 explore.exe 2920 explore.exe 2920 explore.exe 2256 explore.exe 2256 explore.exe 2360 explore.exe 2360 explore.exe 2576 explore.exe 2576 explore.exe 2632 explore.exe 2632 explore.exe 2656 explore.exe 2656 explore.exe 2584 explore.exe 2584 explore.exe 2660 explore.exe 2660 explore.exe 2440 explore.exe 2440 explore.exe 2716 explore.exe 2716 explore.exe 2136 explore.exe 2136 explore.exe 2604 explore.exe 2604 explore.exe 2568 explore.exe 2568 explore.exe 2488 explore.exe 2488 explore.exe 2444 explore.exe 2444 explore.exe 2496 explore.exe 2496 explore.exe 2732 explore.exe 2732 explore.exe 2856 explore.exe 2856 explore.exe 2916 explore.exe 2916 explore.exe 2996 explore.exe 2996 explore.exe 3060 explore.exe 3060 explore.exe 1736 explore.exe 1736 explore.exe 2216 explore.exe 2216 explore.exe 812 explore.exe 812 explore.exe 2192 explore.exe 2192 explore.exe 2304 explore.exe 2304 explore.exe 1780 explore.exe 1780 explore.exe -
Drops file in System32 directory 64 IoCs
Processes:
explore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exedescription ioc process File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat File opened for modification C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\$$a.bat File opened for modification C:\Windows\SysWOW64\$$a.bat File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exedescription pid process target process PID 1848 wrote to memory of 3052 1848 0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe explore.exe PID 1848 wrote to memory of 3052 1848 0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe explore.exe PID 1848 wrote to memory of 3052 1848 0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe explore.exe PID 1848 wrote to memory of 3052 1848 0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe explore.exe PID 3052 wrote to memory of 1276 3052 explore.exe explore.exe PID 3052 wrote to memory of 1276 3052 explore.exe explore.exe PID 3052 wrote to memory of 1276 3052 explore.exe explore.exe PID 3052 wrote to memory of 1276 3052 explore.exe explore.exe PID 1276 wrote to memory of 2516 1276 explore.exe explore.exe PID 1276 wrote to memory of 2516 1276 explore.exe explore.exe PID 1276 wrote to memory of 2516 1276 explore.exe explore.exe PID 1276 wrote to memory of 2516 1276 explore.exe explore.exe PID 2516 wrote to memory of 2312 2516 explore.exe explore.exe PID 2516 wrote to memory of 2312 2516 explore.exe explore.exe PID 2516 wrote to memory of 2312 2516 explore.exe explore.exe PID 2516 wrote to memory of 2312 2516 explore.exe explore.exe PID 2312 wrote to memory of 2920 2312 explore.exe explore.exe PID 2312 wrote to memory of 2920 2312 explore.exe explore.exe PID 2312 wrote to memory of 2920 2312 explore.exe explore.exe PID 2312 wrote to memory of 2920 2312 explore.exe explore.exe PID 2920 wrote to memory of 2256 2920 explore.exe explore.exe PID 2920 wrote to memory of 2256 2920 explore.exe explore.exe PID 2920 wrote to memory of 2256 2920 explore.exe explore.exe PID 2920 wrote to memory of 2256 2920 explore.exe explore.exe PID 2256 wrote to memory of 2360 2256 explore.exe explore.exe PID 2256 wrote to memory of 2360 2256 explore.exe explore.exe PID 2256 wrote to memory of 2360 2256 explore.exe explore.exe PID 2256 wrote to memory of 2360 2256 explore.exe explore.exe PID 2360 wrote to memory of 2576 2360 explore.exe explore.exe PID 2360 wrote to memory of 2576 2360 explore.exe explore.exe PID 2360 wrote to memory of 2576 2360 explore.exe explore.exe PID 2360 wrote to memory of 2576 2360 explore.exe explore.exe PID 2576 wrote to memory of 2632 2576 explore.exe explore.exe PID 2576 wrote to memory of 2632 2576 explore.exe explore.exe PID 2576 wrote to memory of 2632 2576 explore.exe explore.exe PID 2576 wrote to memory of 2632 2576 explore.exe explore.exe PID 2632 wrote to memory of 2656 2632 explore.exe explore.exe PID 2632 wrote to memory of 2656 2632 explore.exe explore.exe PID 2632 wrote to memory of 2656 2632 explore.exe explore.exe PID 2632 wrote to memory of 2656 2632 explore.exe explore.exe PID 2656 wrote to memory of 2584 2656 explore.exe explore.exe PID 2656 wrote to memory of 2584 2656 explore.exe explore.exe PID 2656 wrote to memory of 2584 2656 explore.exe explore.exe PID 2656 wrote to memory of 2584 2656 explore.exe explore.exe PID 2584 wrote to memory of 2660 2584 explore.exe explore.exe PID 2584 wrote to memory of 2660 2584 explore.exe explore.exe PID 2584 wrote to memory of 2660 2584 explore.exe explore.exe PID 2584 wrote to memory of 2660 2584 explore.exe explore.exe PID 2660 wrote to memory of 2440 2660 explore.exe explore.exe PID 2660 wrote to memory of 2440 2660 explore.exe explore.exe PID 2660 wrote to memory of 2440 2660 explore.exe explore.exe PID 2660 wrote to memory of 2440 2660 explore.exe explore.exe PID 2440 wrote to memory of 2716 2440 explore.exe explore.exe PID 2440 wrote to memory of 2716 2440 explore.exe explore.exe PID 2440 wrote to memory of 2716 2440 explore.exe explore.exe PID 2440 wrote to memory of 2716 2440 explore.exe explore.exe PID 2716 wrote to memory of 2136 2716 explore.exe explore.exe PID 2716 wrote to memory of 2136 2716 explore.exe explore.exe PID 2716 wrote to memory of 2136 2716 explore.exe explore.exe PID 2716 wrote to memory of 2136 2716 explore.exe explore.exe PID 2136 wrote to memory of 2604 2136 explore.exe explore.exe PID 2136 wrote to memory of 2604 2136 explore.exe explore.exe PID 2136 wrote to memory of 2604 2136 explore.exe explore.exe PID 2136 wrote to memory of 2604 2136 explore.exe explore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0574ba053f676337d4fa1d7d3851ada3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2732 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2916 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2216 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:812 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2304 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe33⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe34⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe35⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe36⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe37⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe38⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe39⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe40⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe41⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe42⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe43⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe44⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe45⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe46⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe47⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe48⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe49⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe50⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe51⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe52⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe53⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe54⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe55⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe56⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe57⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe58⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe59⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe60⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe61⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe62⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe63⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1828 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe65⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe66⤵PID:1092
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe67⤵PID:1184
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe68⤵
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe69⤵PID:2132
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe70⤵PID:2064
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe71⤵PID:2104
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe72⤵PID:2228
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe73⤵PID:2236
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe74⤵PID:2240
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe75⤵PID:2036
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe76⤵PID:572
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe77⤵PID:268
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe78⤵PID:476
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe79⤵PID:528
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe80⤵PID:492
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe81⤵PID:1328
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe82⤵PID:1472
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe83⤵PID:636
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe84⤵PID:584
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe85⤵PID:1460
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe86⤵PID:1944
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe87⤵PID:3044
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe88⤵PID:1360
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe89⤵PID:1984
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe90⤵PID:1632
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe91⤵PID:1308
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe92⤵PID:3056
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe93⤵PID:1988
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe94⤵PID:1148
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe95⤵PID:444
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe96⤵PID:352
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe97⤵PID:2400
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe98⤵PID:2992
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe99⤵PID:2904
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe100⤵PID:2688
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe101⤵PID:2800
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe102⤵PID:2412
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe103⤵PID:1236
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe104⤵PID:1480
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe105⤵PID:2364
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe106⤵PID:1120
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe107⤵PID:1892
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe108⤵PID:1948
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe109⤵PID:1540
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe110⤵PID:1776
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe111⤵PID:1112
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe112⤵PID:1600
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe113⤵PID:776
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe114⤵PID:968
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe115⤵PID:1012
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe116⤵PID:1952
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe117⤵PID:1772
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe118⤵PID:2088
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe119⤵PID:1768
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe120⤵PID:1764
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe121⤵PID:1748
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe122⤵PID:900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-