Analysis
-
max time kernel
6s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
3471559d03285d0a137fd49a35dff65f
-
SHA1
87c54386b8d06389e0c24238a312144976ff7fe4
-
SHA256
88c3bef2b165566d6c3754b28b97136635f8607d14c2b1d3acba58775bb54bf9
-
SHA512
efc9472e376a16ff0dc05995e32ff5c4a14164ad609dd24fa8ebb98d39cf4e083a9c6fac618b747eab44ba160e66c782386b9da65a081950a1170d15853741d9
-
SSDEEP
24576:EvOte8kvO25n5awhvTVAeXXjvK1PDZEZx6u53MHmhF7VdNO0l2uaaUVP7MoJOwuu:ETZXzvJZxT530+1V/flfaaUVfOwuD3W1
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 4584 BFA1C7.EXE 1848 BFA1C7.EXE 4720 BFA1C7.EXE 1540 BFA1C7.EXE 3248 BFA1C7.EXE 2864 BFA1C7.EXE 4724 BFA1C7.EXE -
Loads dropped DLL 49 IoCs
pid Process 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 7 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 BFA1C7.EXE File opened for modification \??\PhysicalDrive0 BFA1C7.EXE File opened for modification \??\PhysicalDrive0 BFA1C7.EXE File opened for modification \??\PhysicalDrive0 BFA1C7.EXE File opened for modification \??\PhysicalDrive0 BFA1C7.EXE File opened for modification \??\PhysicalDrive0 BFA1C7.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\046D17 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\70B97F 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\497A92 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe File created C:\Windows\SysWOW64\046D17\BFA1C7.EXE 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\046D17\BFA1C7.EXE 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 51 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4744 explorer.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 4584 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 1848 BFA1C7.EXE 4744 explorer.exe 4744 explorer.exe 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4720 BFA1C7.EXE 4516 explorer.exe 4516 explorer.exe 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 1540 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 3248 BFA1C7.EXE 2092 explorer.exe 2092 explorer.exe 2864 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE 2864 BFA1C7.EXE 688 explorer.exe 688 explorer.exe 2864 BFA1C7.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3516 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 85 PID 2332 wrote to memory of 3516 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 85 PID 2332 wrote to memory of 3516 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 85 PID 2332 wrote to memory of 4584 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 87 PID 2332 wrote to memory of 4584 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 87 PID 2332 wrote to memory of 4584 2332 3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe 87 PID 4584 wrote to memory of 2476 4584 BFA1C7.EXE 88 PID 4584 wrote to memory of 2476 4584 BFA1C7.EXE 88 PID 4584 wrote to memory of 2476 4584 BFA1C7.EXE 88 PID 4584 wrote to memory of 1848 4584 BFA1C7.EXE 89 PID 4584 wrote to memory of 1848 4584 BFA1C7.EXE 89 PID 4584 wrote to memory of 1848 4584 BFA1C7.EXE 89 PID 1848 wrote to memory of 1444 1848 BFA1C7.EXE 91 PID 1848 wrote to memory of 1444 1848 BFA1C7.EXE 91 PID 1848 wrote to memory of 1444 1848 BFA1C7.EXE 91 PID 1848 wrote to memory of 4720 1848 BFA1C7.EXE 127 PID 1848 wrote to memory of 4720 1848 BFA1C7.EXE 127 PID 1848 wrote to memory of 4720 1848 BFA1C7.EXE 127 PID 4720 wrote to memory of 3284 4720 BFA1C7.EXE 249 PID 4720 wrote to memory of 3284 4720 BFA1C7.EXE 249 PID 4720 wrote to memory of 3284 4720 BFA1C7.EXE 249 PID 4720 wrote to memory of 1540 4720 BFA1C7.EXE 95 PID 4720 wrote to memory of 1540 4720 BFA1C7.EXE 95 PID 4720 wrote to memory of 1540 4720 BFA1C7.EXE 95 PID 1540 wrote to memory of 4396 1540 BFA1C7.EXE 125 PID 1540 wrote to memory of 4396 1540 BFA1C7.EXE 125 PID 1540 wrote to memory of 4396 1540 BFA1C7.EXE 125 PID 1540 wrote to memory of 3248 1540 BFA1C7.EXE 98 PID 1540 wrote to memory of 3248 1540 BFA1C7.EXE 98 PID 1540 wrote to memory of 3248 1540 BFA1C7.EXE 98 PID 3248 wrote to memory of 1580 3248 BFA1C7.EXE 100 PID 3248 wrote to memory of 1580 3248 BFA1C7.EXE 100 PID 3248 wrote to memory of 1580 3248 BFA1C7.EXE 100 PID 3248 wrote to memory of 2864 3248 BFA1C7.EXE 101 PID 3248 wrote to memory of 2864 3248 BFA1C7.EXE 101 PID 3248 wrote to memory of 2864 3248 BFA1C7.EXE 101 PID 2864 wrote to memory of 4468 2864 BFA1C7.EXE 130 PID 2864 wrote to memory of 4468 2864 BFA1C7.EXE 130 PID 2864 wrote to memory of 4468 2864 BFA1C7.EXE 130 PID 2864 wrote to memory of 4724 2864 BFA1C7.EXE 104 PID 2864 wrote to memory of 4724 2864 BFA1C7.EXE 104 PID 2864 wrote to memory of 4724 2864 BFA1C7.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3471559d03285d0a137fd49a35dff65f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\3471559d03285d0a137fd49a35dff65f_JaffaCakes1182⤵PID:3516
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C73⤵PID:2476
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C74⤵PID:1444
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C75⤵PID:3284
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C76⤵PID:4396
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C77⤵PID:1580
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C78⤵PID:4468
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE8⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C79⤵PID:4552
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE9⤵PID:208
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C710⤵PID:636
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE10⤵PID:2080
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C711⤵PID:2648
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE11⤵PID:2444
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C712⤵PID:3128
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE12⤵PID:4948
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C713⤵PID:3236
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE13⤵PID:3888
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C714⤵PID:2344
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE14⤵PID:5092
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C715⤵PID:4396
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE15⤵PID:4656
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C716⤵PID:3252
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE16⤵PID:2892
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C717⤵PID:340
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE17⤵PID:3828
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C718⤵PID:3788
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE18⤵PID:3488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C719⤵PID:4696
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE19⤵PID:3392
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C720⤵PID:3056
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE20⤵PID:3156
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C721⤵PID:4472
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE21⤵PID:3200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C722⤵PID:1016
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE22⤵PID:3480
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C723⤵PID:4324
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE23⤵PID:2112
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C724⤵PID:3108
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE24⤵PID:2772
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C725⤵PID:3700
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE25⤵PID:3736
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C726⤵PID:3068
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE26⤵PID:4568
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C727⤵PID:5024
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE27⤵PID:2456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C728⤵PID:3768
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE28⤵PID:3104
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C729⤵PID:2380
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE29⤵PID:5148
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C730⤵PID:5280
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE30⤵PID:5324
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C731⤵PID:5468
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE31⤵PID:5528
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C732⤵PID:5672
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE32⤵PID:5720
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C733⤵PID:5856
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE33⤵PID:5908
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C734⤵PID:6016
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE34⤵PID:6084
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C735⤵PID:5224
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE35⤵PID:5084
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C736⤵PID:5572
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE36⤵PID:5664
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C737⤵PID:5460
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE37⤵PID:5892
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C738⤵PID:5876
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE38⤵PID:1836
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C739⤵PID:5440
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE39⤵PID:2144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C740⤵PID:3200
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE40⤵PID:5416
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C741⤵PID:5792
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE41⤵PID:5680
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C742⤵PID:5720
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE42⤵PID:5856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C743⤵PID:748
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE43⤵PID:6036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C744⤵PID:2548
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE44⤵PID:5472
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C745⤵PID:5704
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE45⤵PID:6088
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C746⤵PID:5856
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE46⤵PID:5012
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C747⤵PID:932
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE47⤵PID:5204
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C748⤵PID:6204
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE48⤵PID:6268
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C749⤵PID:6364
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE49⤵PID:6424
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C750⤵PID:6528
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE50⤵PID:6576
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C751⤵PID:6704
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE51⤵PID:6760
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C752⤵PID:6856
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE52⤵PID:6900
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C753⤵PID:7064
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE53⤵PID:7140
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C754⤵PID:6088
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE54⤵PID:6040
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C755⤵PID:6476
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE55⤵PID:3284
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C756⤵PID:6448
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE56⤵PID:4924
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C757⤵PID:6984
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE57⤵PID:3528
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C758⤵PID:1228
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE58⤵PID:1320
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C759⤵PID:6968
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE59⤵PID:2144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C760⤵PID:6512
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE60⤵PID:6220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C761⤵PID:2360
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE61⤵PID:6428
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C762⤵PID:5204
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE62⤵PID:3924
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C763⤵PID:5824
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE63⤵PID:4920
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C764⤵PID:6832
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE64⤵PID:4192
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C765⤵PID:3480
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE65⤵PID:1720
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C766⤵PID:7264
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE66⤵PID:7308
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C767⤵PID:7416
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE67⤵PID:7476
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C768⤵PID:7568
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE68⤵PID:7616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C769⤵PID:7764
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE69⤵PID:7808
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C770⤵PID:7908
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE70⤵PID:7968
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C771⤵PID:8064
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE71⤵PID:8100
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C772⤵PID:5392
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE72⤵PID:6836
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C773⤵PID:5572
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE73⤵PID:7292
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C774⤵PID:7400
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE74⤵PID:4912
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C775⤵PID:7600
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE75⤵PID:7764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C776⤵PID:5172
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE76⤵PID:8160
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C777⤵PID:8060
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE77⤵PID:6988
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C778⤵PID:7324
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE78⤵PID:5936
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C779⤵PID:7296
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE79⤵PID:7388
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C780⤵PID:7008
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE80⤵PID:5520
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C781⤵PID:8080
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE81⤵PID:7312
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C782⤵PID:2212
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE82⤵PID:6108
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C783⤵PID:6832
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE83⤵PID:6448
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C784⤵PID:7088
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE84⤵PID:5232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C785⤵PID:7440
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE85⤵PID:552
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C786⤵PID:8312
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE86⤵PID:8384
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C787⤵PID:8512
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE87⤵PID:8596
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C788⤵PID:8692
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE88⤵PID:8732
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C789⤵PID:8832
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE89⤵PID:8868
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C790⤵PID:8984
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE90⤵PID:9036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C791⤵PID:9144
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE91⤵PID:9184
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C792⤵PID:7440
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE92⤵PID:8236
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C793⤵PID:8304
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE93⤵PID:8544
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C794⤵PID:8400
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE94⤵PID:7556
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C795⤵PID:8776
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE95⤵PID:8988
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C796⤵PID:9056
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE96⤵PID:9164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C797⤵PID:6404
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE97⤵PID:1904
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C798⤵PID:6520
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE98⤵PID:8492
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C799⤵PID:1080
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE99⤵PID:4024
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C7100⤵PID:1944
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE100⤵PID:8988
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C7101⤵PID:8760
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE101⤵PID:8304
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C7102⤵PID:1600
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE102⤵PID:8632
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C7103⤵PID:7440
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE103⤵PID:4860
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C7104⤵PID:2212
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE104⤵PID:8076
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C7105⤵PID:892
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE105⤵PID:7424
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C7106⤵PID:3436
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE106⤵PID:3984
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\046D17\BFA1C7107⤵PID:9272
-
-
C:\Windows\SysWOW64\046D17\BFA1C7.EXEC:\Windows\system32\046D17\BFA1C7.EXE107⤵PID:9316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4744
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4516
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2092
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:688
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
PID:3472
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
PID:3232
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1940
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:796
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3280
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:436
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2664
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:776
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3540
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4720
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4468
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:332
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3724
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3452
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3112
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4636
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1680
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2040
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2860
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3308
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2836
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1256
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:988
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5160
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5332
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5536
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5736
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5920
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6092
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5356
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5176
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5944
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4512
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5168
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2256
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4728
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5688
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2264
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4048
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3036
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3492
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6300
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6432
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6584
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6768
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6908
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7164
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4972
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6320
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6508
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2676
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2708
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5532
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6544
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5588
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5972
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6188
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2572
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1084
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7316
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7508
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7632
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7800
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7976
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8108
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3924
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7260
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1568
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7780
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8164
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8136
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7304
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6408
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7744
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8052
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3480
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6732
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7312
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5292
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8392
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8604
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8720
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8884
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:9044
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:9192
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6048
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8576
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4472
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7680
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:9144
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8612
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8528
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4668
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6088
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:9152
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8976
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:7760
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3496
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8632
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:8304
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:9304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD586a24830826fb6ec43756a3cec45e180
SHA1191b4cba3f1fe657f68e1474d94c3ce6867035cc
SHA25673a0e179a4676b6d5ffaf0306e999fad201c588847acbf072a0448c157163eb3
SHA512c3246434d10ebd26b66b6067cf118ce941cfa31677b180826a915c661e310b0b514cb1b9882fdaf1aeba7aaf70b19a2e8291f14b9066ec0d29a1d6d44378f431
-
Filesize
264KB
MD52f31a4260cf89c3ed00a6d455ce1ec1a
SHA1030a3f68141062b7e6c5ef9c4ba221967443b62b
SHA256201173bf95b4a096b15835203ef271004aee5e6a18c99d9ab0f3aa92e70b53ee
SHA51294fa0c1b57d229489f82789ecaa88010352f497f256ea8d77524bf1ce3a0aa5096dd08ff2ea5e9e15c0bfcfee43d96736e14ffaa35de6f8d77d3b94d6d252e61
-
Filesize
112KB
MD5c846eeab065cb2fc23e128a832197057
SHA15ab50cc5490b5e8009496db0a8796fec62b687bb
SHA256eaef2da2cd5463291a02dbb73a25a2e0e9034691e21cbd9e69e52ee483eebbf7
SHA51292047b2867193af531e83bb82ce9c16b09520f8e0b4f140887b217c88739ee4e59b970a273f01e34340b6f6a56e42e7b34862b630528717a9beecb9b117e58e1
-
Filesize
316KB
MD5ab084d2267d7ab09a6bb3c8a09e093bb
SHA1d30f41fd6b2c574e153d6b2c48adbaca6bd4a04a
SHA25638b2b0ce08aa617bd2a541ce43e3d68f57a6199bd432dc80b12676a005f92758
SHA5120509402d0b78d355fb0f81c34a4cc2817821ec0ce5476c8faa113a184f68e4a65b2c6289bc3e054ab52a451be34f8147e96b5130b24da9f01cbc17379e975d78
-
Filesize
180KB
MD5b59dbbfc4c97ad6c19c12573bededcee
SHA182bdc09ef9218efc1bd370e9b24341c7fdeb424d
SHA25671c010843f94da623636c4d42f26dbe28784774ce96381f78dc2deb0ae028c0e
SHA5125f28df0dba218cf04af599ad351bd59de75b8f4f6eca4e6f38417fbc860e1280f2b2a8a361823a1a4c96082e08313530103728bc3af4ee73e90aeec8c1865be7
-
Filesize
1.0MB
MD52eae38a1ddb969425dbd2a1203789f25
SHA17566a0c64025c510d4119dad99b0d27767217e47
SHA256af1f382e9df00cfc710b7bfa677df2f275bd0f93c7e0ddc239930c1fa4d7e8b6
SHA51225c4dd7bcad6a60e34ef9a5d8047822709a533eb49152f7d9d4981c3bd77bdb0687a2ab462c8586af1d7d305334993a2d81b89b1a63d63a1cac66c30489f5813
-
Filesize
40KB
MD508b6b94f403e703f09b7f685689aa586
SHA1a8c759abc2c7fb20675809e1f600a6ee9101d958
SHA2562c1ace790a79b5dfc61b763f019076edc7ad78dbadaef2638ba43558a34384e9
SHA5128feb62641090f24fbd6ec18365af28bb57bd440aba11bf8fe651bbe5c50fbe9a70535618aee3b33a7e49a8e299dd68120abd1a2f9b5506e68e4619c688b7fc3c
-
Filesize
72KB
MD5a6768c6f33ced9313532181750db9d7e
SHA1b8c9873259c716c3c83374a8e2239388c3557362
SHA256f0efe8b7e163754d59445040693b79551580bb49e0d29716d953596edf2aefde
SHA512a0e592c88b07a18a127f4f45f01982a572889543622c570110a763a60f4b526ba8b0e99315ab1e1a6dc9b4d8484c98132df1fdbdeb5eea41496a8922f86789fb
-
Filesize
1.4MB
MD53471559d03285d0a137fd49a35dff65f
SHA187c54386b8d06389e0c24238a312144976ff7fe4
SHA25688c3bef2b165566d6c3754b28b97136635f8607d14c2b1d3acba58775bb54bf9
SHA512efc9472e376a16ff0dc05995e32ff5c4a14164ad609dd24fa8ebb98d39cf4e083a9c6fac618b747eab44ba160e66c782386b9da65a081950a1170d15853741d9