Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
73e3898ded99d9f062cfb167d5b57635
-
SHA1
0b2aa86bccbed7a61a066f48c259433b6af25c1a
-
SHA256
ff647e3d6a50d31f4a526cdef1af0f7b428716e1e57597ac27ef374580c63925
-
SHA512
0f7d58c3d1fea43659a6f4ce93150e0d5f1199d9f9465100e099aeb578f7311469e3db4f08c0d3e281d6ffc298bf0945a5cf422430c2e762d8437664762e75cb
-
SSDEEP
24576:xhcmZ4JV6y3gOv4gfd+e61g4l2G2pfm47S5IBkgdElKcnT9U:xh4Jl7E3g4lYfm47S5IBfdSr9U
Malware Config
Signatures
-
Executes dropped EXE 57 IoCs
pid Process 2696 A29FDD.EXE 2632 A29FDD.EXE 2128 A29FDD.EXE 2912 A29FDD.EXE 844 A29FDD.EXE 2200 A29FDD.EXE 700 A29FDD.EXE 1084 A29FDD.EXE 1572 A29FDD.EXE 2708 A29FDD.EXE 1716 A29FDD.EXE 2096 A29FDD.EXE 284 A29FDD.EXE 2960 A29FDD.EXE 2996 A29FDD.EXE 2076 A29FDD.EXE 2032 A29FDD.EXE 2772 A29FDD.EXE 576 A29FDD.EXE 1208 A29FDD.EXE 2312 A29FDD.EXE 2448 A29FDD.EXE 1820 A29FDD.EXE 2456 A29FDD.EXE 2712 A29FDD.EXE 2916 A29FDD.EXE 2076 A29FDD.EXE 264 A29FDD.EXE 3152 A29FDD.EXE 3300 A29FDD.EXE 3440 A29FDD.EXE 3596 A29FDD.EXE 3740 A29FDD.EXE 3880 A29FDD.EXE 4028 A29FDD.EXE 3164 A29FDD.EXE 3380 A29FDD.EXE 3568 A29FDD.EXE 3824 A29FDD.EXE 3932 A29FDD.EXE 3268 A29FDD.EXE 3612 A29FDD.EXE 3976 A29FDD.EXE 3152 A29FDD.EXE 3380 A29FDD.EXE 2452 A29FDD.EXE 3560 A29FDD.EXE 4168 A29FDD.EXE 4288 A29FDD.EXE 4408 A29FDD.EXE 4500 A29FDD.EXE 4616 A29FDD.EXE 4744 A29FDD.EXE 4872 A29FDD.EXE 4984 A29FDD.EXE 5096 A29FDD.EXE 4268 A29FDD.EXE -
Loads dropped DLL 64 IoCs
pid Process 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1572 A29FDD.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 57 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2696 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2632 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2128 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 2912 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 844 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 2200 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 700 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1084 A29FDD.EXE 1572 A29FDD.EXE 1572 A29FDD.EXE 1572 A29FDD.EXE 1572 A29FDD.EXE 1572 A29FDD.EXE 1572 A29FDD.EXE 2708 A29FDD.EXE 2708 A29FDD.EXE 2708 A29FDD.EXE 2708 A29FDD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2404 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2404 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2404 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2404 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2696 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 32 PID 2524 wrote to memory of 2696 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 32 PID 2524 wrote to memory of 2696 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 32 PID 2524 wrote to memory of 2696 2524 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 32 PID 2696 wrote to memory of 2908 2696 A29FDD.EXE 33 PID 2696 wrote to memory of 2908 2696 A29FDD.EXE 33 PID 2696 wrote to memory of 2908 2696 A29FDD.EXE 33 PID 2696 wrote to memory of 2908 2696 A29FDD.EXE 33 PID 2696 wrote to memory of 2632 2696 A29FDD.EXE 34 PID 2696 wrote to memory of 2632 2696 A29FDD.EXE 34 PID 2696 wrote to memory of 2632 2696 A29FDD.EXE 34 PID 2696 wrote to memory of 2632 2696 A29FDD.EXE 34 PID 2632 wrote to memory of 676 2632 A29FDD.EXE 67 PID 2632 wrote to memory of 676 2632 A29FDD.EXE 67 PID 2632 wrote to memory of 676 2632 A29FDD.EXE 67 PID 2632 wrote to memory of 676 2632 A29FDD.EXE 67 PID 2632 wrote to memory of 2128 2632 A29FDD.EXE 38 PID 2632 wrote to memory of 2128 2632 A29FDD.EXE 38 PID 2632 wrote to memory of 2128 2632 A29FDD.EXE 38 PID 2632 wrote to memory of 2128 2632 A29FDD.EXE 38 PID 2128 wrote to memory of 1560 2128 A29FDD.EXE 39 PID 2128 wrote to memory of 1560 2128 A29FDD.EXE 39 PID 2128 wrote to memory of 1560 2128 A29FDD.EXE 39 PID 2128 wrote to memory of 1560 2128 A29FDD.EXE 39 PID 2128 wrote to memory of 2912 2128 A29FDD.EXE 40 PID 2128 wrote to memory of 2912 2128 A29FDD.EXE 40 PID 2128 wrote to memory of 2912 2128 A29FDD.EXE 40 PID 2128 wrote to memory of 2912 2128 A29FDD.EXE 40 PID 2912 wrote to memory of 2432 2912 A29FDD.EXE 41 PID 2912 wrote to memory of 2432 2912 A29FDD.EXE 41 PID 2912 wrote to memory of 2432 2912 A29FDD.EXE 41 PID 2912 wrote to memory of 2432 2912 A29FDD.EXE 41 PID 2912 wrote to memory of 844 2912 A29FDD.EXE 44 PID 2912 wrote to memory of 844 2912 A29FDD.EXE 44 PID 2912 wrote to memory of 844 2912 A29FDD.EXE 44 PID 2912 wrote to memory of 844 2912 A29FDD.EXE 44 PID 844 wrote to memory of 1964 844 A29FDD.EXE 45 PID 844 wrote to memory of 1964 844 A29FDD.EXE 45 PID 844 wrote to memory of 1964 844 A29FDD.EXE 45 PID 844 wrote to memory of 1964 844 A29FDD.EXE 45 PID 844 wrote to memory of 2200 844 A29FDD.EXE 47 PID 844 wrote to memory of 2200 844 A29FDD.EXE 47 PID 844 wrote to memory of 2200 844 A29FDD.EXE 47 PID 844 wrote to memory of 2200 844 A29FDD.EXE 47 PID 2200 wrote to memory of 1672 2200 A29FDD.EXE 48 PID 2200 wrote to memory of 1672 2200 A29FDD.EXE 48 PID 2200 wrote to memory of 1672 2200 A29FDD.EXE 48 PID 2200 wrote to memory of 1672 2200 A29FDD.EXE 48 PID 2200 wrote to memory of 700 2200 A29FDD.EXE 50 PID 2200 wrote to memory of 700 2200 A29FDD.EXE 50 PID 2200 wrote to memory of 700 2200 A29FDD.EXE 50 PID 2200 wrote to memory of 700 2200 A29FDD.EXE 50 PID 700 wrote to memory of 2480 700 A29FDD.EXE 51 PID 700 wrote to memory of 2480 700 A29FDD.EXE 51 PID 700 wrote to memory of 2480 700 A29FDD.EXE 51 PID 700 wrote to memory of 2480 700 A29FDD.EXE 51 PID 700 wrote to memory of 1084 700 A29FDD.EXE 53 PID 700 wrote to memory of 1084 700 A29FDD.EXE 53 PID 700 wrote to memory of 1084 700 A29FDD.EXE 53 PID 700 wrote to memory of 1084 700 A29FDD.EXE 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\73e3898ded99d9f062cfb167d5b57635_JaffaCakes1182⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD3⤵PID:2908
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD4⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD5⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD6⤵PID:2432
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD7⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD8⤵PID:1672
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD9⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD10⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD11⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD12⤵PID:2660
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD13⤵PID:2644
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2096 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD14⤵PID:2916
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE14⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:284 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD15⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD16⤵PID:1532
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE16⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD17⤵PID:1440
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE17⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2076 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD18⤵
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE18⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD19⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE19⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD20⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE20⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:576 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD21⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE21⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD22⤵PID:1592
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE22⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD23⤵PID:2656
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE23⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD24⤵PID:2792
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE24⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD25⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE25⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2456 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD26⤵PID:2888
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE26⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD27⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE27⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD28⤵
- System Location Discovery: System Language Discovery
PID:264
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE28⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2076 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD29⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE29⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:264 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD30⤵
- System Location Discovery: System Language Discovery
PID:3104
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE30⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD31⤵PID:3248
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE31⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3300 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD32⤵
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE32⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD33⤵
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE33⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD34⤵PID:3684
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE34⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:3740 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD35⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE35⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3880 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD36⤵PID:3976
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE36⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD37⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE37⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD38⤵PID:3324
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE38⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:3380 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD39⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE39⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3568 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD40⤵PID:3808
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE40⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3824 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD41⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE41⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3932 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD42⤵PID:3264
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE42⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:3268 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD43⤵
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE43⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3612 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD44⤵
- System Location Discovery: System Language Discovery
PID:3728
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE44⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD45⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE45⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD46⤵
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE46⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3380 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD47⤵PID:3548
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE47⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD48⤵
- System Location Discovery: System Language Discovery
PID:3400
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE48⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:3560 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD49⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE49⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:4168 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD50⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE50⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4288 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD51⤵
- System Location Discovery: System Language Discovery
PID:4372
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE51⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4408 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD52⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE52⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4500 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD53⤵
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE53⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD54⤵PID:4696
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE54⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4744 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD55⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE55⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4872 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD56⤵
- System Location Discovery: System Language Discovery
PID:4940
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE56⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4984 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD57⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE57⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5096 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD58⤵PID:4156
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE58⤵
- Executes dropped EXE
PID:4268 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD59⤵PID:4428
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE59⤵PID:4372
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD60⤵PID:4628
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE60⤵PID:4596
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD61⤵PID:4724
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE61⤵PID:4796
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD62⤵PID:4944
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE62⤵PID:3400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD63⤵PID:4144
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE63⤵PID:4464
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD64⤵PID:4636
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE64⤵PID:5000
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD65⤵PID:4416
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE65⤵PID:3568
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD66⤵PID:4492
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE66⤵PID:4596
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD67⤵PID:4292
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE67⤵PID:5132
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD68⤵PID:5216
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE68⤵PID:5248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD69⤵PID:5312
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE69⤵PID:5356
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD70⤵PID:5440
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE70⤵PID:5484
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD71⤵PID:5560
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE71⤵PID:5600
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD72⤵PID:5676
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE72⤵PID:5712
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD73⤵PID:5780
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE73⤵PID:5816
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD74⤵PID:5896
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE74⤵PID:5936
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD75⤵PID:6016
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE75⤵PID:6056
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD76⤵PID:6140
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE76⤵PID:4884
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD77⤵PID:5084
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE77⤵PID:5448
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD78⤵PID:5572
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE78⤵PID:5740
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD79⤵PID:5956
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE79⤵PID:5900
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD80⤵PID:5260
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE80⤵PID:5368
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD81⤵PID:6060
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE81⤵PID:5572
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD82⤵PID:5448
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE82⤵PID:5152
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD83⤵PID:2356
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE83⤵PID:5256
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD84⤵PID:5500
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE84⤵PID:1860
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD85⤵PID:1092
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE85⤵PID:6148
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD86⤵PID:6236
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE86⤵PID:6272
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD87⤵PID:6368
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE87⤵PID:6408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD88⤵PID:6496
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE88⤵PID:6544
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD89⤵PID:6620
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE89⤵PID:6660
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD90⤵PID:6744
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE90⤵PID:6792
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD91⤵PID:6888
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE91⤵PID:6928
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD92⤵PID:7004
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE92⤵PID:7036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD93⤵PID:7112
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE93⤵PID:7144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD94⤵PID:6288
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE94⤵PID:6236
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD95⤵PID:6600
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE95⤵PID:6504
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD96⤵PID:6800
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE96⤵PID:6772
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD97⤵PID:6888
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE97⤵PID:7068
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD98⤵PID:7132
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE98⤵PID:1860
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD99⤵PID:6556
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE99⤵PID:6548
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD100⤵PID:6888
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE100⤵PID:7112
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD101⤵PID:6556
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE101⤵PID:6668
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD102⤵PID:7208
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE102⤵PID:7248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD103⤵PID:7344
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE103⤵PID:7384
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD104⤵PID:7468
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE104⤵PID:7508
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD105⤵PID:7584
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE105⤵PID:7616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD106⤵PID:7708
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE106⤵PID:7752
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD107⤵PID:7840
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE107⤵PID:7872
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD108⤵PID:7964
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE108⤵PID:8000
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD109⤵PID:8076
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE109⤵PID:8128
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD110⤵PID:6756
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE110⤵PID:7220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD111⤵PID:7520
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE111⤵PID:7252
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD112⤵PID:7740
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE112⤵PID:7884
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD113⤵PID:7752
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE113⤵PID:8144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD114⤵PID:8004
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE114⤵PID:7628
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD115⤵PID:7732
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE115⤵PID:8116
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD116⤵PID:7316
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE116⤵PID:7524
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD117⤵PID:8144
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE117⤵PID:7628
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD118⤵PID:8292
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE118⤵PID:8332
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD119⤵PID:8408
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE119⤵PID:8444
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD120⤵PID:8544
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE120⤵PID:8580
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD121⤵PID:8660
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE121⤵PID:8720
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD122⤵PID:8792
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-