Analysis
-
max time kernel
7s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
73e3898ded99d9f062cfb167d5b57635
-
SHA1
0b2aa86bccbed7a61a066f48c259433b6af25c1a
-
SHA256
ff647e3d6a50d31f4a526cdef1af0f7b428716e1e57597ac27ef374580c63925
-
SHA512
0f7d58c3d1fea43659a6f4ce93150e0d5f1199d9f9465100e099aeb578f7311469e3db4f08c0d3e281d6ffc298bf0945a5cf422430c2e762d8437664762e75cb
-
SSDEEP
24576:xhcmZ4JV6y3gOv4gfd+e61g4l2G2pfm47S5IBkgdElKcnT9U:xh4Jl7E3g4lYfm47S5IBfdSr9U
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 4320 A29FDD.EXE 4316 A29FDD.EXE 3964 A29FDD.EXE 4084 A29FDD.EXE 568 A29FDD.EXE 2452 A29FDD.EXE 4260 A29FDD.EXE 2252 A29FDD.EXE 3596 A29FDD.EXE 4600 A29FDD.EXE 532 A29FDD.EXE 4840 A29FDD.EXE -
Loads dropped DLL 64 IoCs
pid Process 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 4260 A29FDD.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 12 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE File opened for modification \??\PhysicalDrive0 A29FDD.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\D5B797\ 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File created C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\666585\ A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E9804A\A29FDD.EXE A29FDD.EXE File opened for modification C:\Windows\SysWOW64\E82AF8\ A29FDD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A29FDD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe -
Suspicious behavior: AddClipboardFormatListener 6 IoCs
pid Process 2332 explorer.exe 4016 explorer.exe 2924 explorer.exe 1768 explorer.exe 1540 explorer.exe 4500 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 4320 A29FDD.EXE 2332 explorer.exe 2332 explorer.exe 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 4316 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 3964 A29FDD.EXE 4016 explorer.exe 4016 explorer.exe 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 4084 A29FDD.EXE 2924 explorer.exe 2924 explorer.exe 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 568 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 2452 A29FDD.EXE 1768 explorer.exe 1768 explorer.exe 4260 A29FDD.EXE 4260 A29FDD.EXE 4260 A29FDD.EXE 4260 A29FDD.EXE 4260 A29FDD.EXE 4260 A29FDD.EXE 1540 explorer.exe 1540 explorer.exe 2252 A29FDD.EXE 2252 A29FDD.EXE 2252 A29FDD.EXE 2252 A29FDD.EXE 2252 A29FDD.EXE 2252 A29FDD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4912 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 86 PID 1840 wrote to memory of 4912 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 86 PID 1840 wrote to memory of 4912 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 86 PID 1840 wrote to memory of 4320 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 89 PID 1840 wrote to memory of 4320 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 89 PID 1840 wrote to memory of 4320 1840 73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe 89 PID 4320 wrote to memory of 804 4320 A29FDD.EXE 90 PID 4320 wrote to memory of 804 4320 A29FDD.EXE 90 PID 4320 wrote to memory of 804 4320 A29FDD.EXE 90 PID 4320 wrote to memory of 4316 4320 A29FDD.EXE 91 PID 4320 wrote to memory of 4316 4320 A29FDD.EXE 91 PID 4320 wrote to memory of 4316 4320 A29FDD.EXE 91 PID 4316 wrote to memory of 3592 4316 A29FDD.EXE 93 PID 4316 wrote to memory of 3592 4316 A29FDD.EXE 93 PID 4316 wrote to memory of 3592 4316 A29FDD.EXE 93 PID 4316 wrote to memory of 3964 4316 A29FDD.EXE 95 PID 4316 wrote to memory of 3964 4316 A29FDD.EXE 95 PID 4316 wrote to memory of 3964 4316 A29FDD.EXE 95 PID 3964 wrote to memory of 1612 3964 A29FDD.EXE 122 PID 3964 wrote to memory of 1612 3964 A29FDD.EXE 122 PID 3964 wrote to memory of 1612 3964 A29FDD.EXE 122 PID 3964 wrote to memory of 4084 3964 A29FDD.EXE 129 PID 3964 wrote to memory of 4084 3964 A29FDD.EXE 129 PID 3964 wrote to memory of 4084 3964 A29FDD.EXE 129 PID 4084 wrote to memory of 4772 4084 A29FDD.EXE 99 PID 4084 wrote to memory of 4772 4084 A29FDD.EXE 99 PID 4084 wrote to memory of 4772 4084 A29FDD.EXE 99 PID 4084 wrote to memory of 568 4084 A29FDD.EXE 101 PID 4084 wrote to memory of 568 4084 A29FDD.EXE 101 PID 4084 wrote to memory of 568 4084 A29FDD.EXE 101 PID 568 wrote to memory of 1484 568 A29FDD.EXE 102 PID 568 wrote to memory of 1484 568 A29FDD.EXE 102 PID 568 wrote to memory of 1484 568 A29FDD.EXE 102 PID 568 wrote to memory of 2452 568 A29FDD.EXE 104 PID 568 wrote to memory of 2452 568 A29FDD.EXE 104 PID 568 wrote to memory of 2452 568 A29FDD.EXE 104 PID 2452 wrote to memory of 3732 2452 A29FDD.EXE 105 PID 2452 wrote to memory of 3732 2452 A29FDD.EXE 105 PID 2452 wrote to memory of 3732 2452 A29FDD.EXE 105 PID 2452 wrote to memory of 4260 2452 A29FDD.EXE 106 PID 2452 wrote to memory of 4260 2452 A29FDD.EXE 106 PID 2452 wrote to memory of 4260 2452 A29FDD.EXE 106 PID 4260 wrote to memory of 4276 4260 A29FDD.EXE 108 PID 4260 wrote to memory of 4276 4260 A29FDD.EXE 108 PID 4260 wrote to memory of 4276 4260 A29FDD.EXE 108 PID 4260 wrote to memory of 2252 4260 A29FDD.EXE 109 PID 4260 wrote to memory of 2252 4260 A29FDD.EXE 109 PID 4260 wrote to memory of 2252 4260 A29FDD.EXE 109 PID 2252 wrote to memory of 4924 2252 A29FDD.EXE 149 PID 2252 wrote to memory of 4924 2252 A29FDD.EXE 149 PID 2252 wrote to memory of 4924 2252 A29FDD.EXE 149 PID 2252 wrote to memory of 3596 2252 A29FDD.EXE 112 PID 2252 wrote to memory of 3596 2252 A29FDD.EXE 112 PID 2252 wrote to memory of 3596 2252 A29FDD.EXE 112 PID 3596 wrote to memory of 4816 3596 A29FDD.EXE 116 PID 3596 wrote to memory of 4816 3596 A29FDD.EXE 116 PID 3596 wrote to memory of 4816 3596 A29FDD.EXE 116 PID 3596 wrote to memory of 4600 3596 A29FDD.EXE 117 PID 3596 wrote to memory of 4600 3596 A29FDD.EXE 117 PID 3596 wrote to memory of 4600 3596 A29FDD.EXE 117 PID 4600 wrote to memory of 1140 4600 A29FDD.EXE 119 PID 4600 wrote to memory of 1140 4600 A29FDD.EXE 119 PID 4600 wrote to memory of 1140 4600 A29FDD.EXE 119 PID 4600 wrote to memory of 532 4600 A29FDD.EXE 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73e3898ded99d9f062cfb167d5b57635_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\73e3898ded99d9f062cfb167d5b57635_JaffaCakes1182⤵
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD3⤵
- System Location Discovery: System Language Discovery
PID:804
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD4⤵
- System Location Discovery: System Language Discovery
PID:3592
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD5⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD6⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD7⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD8⤵
- System Location Discovery: System Language Discovery
PID:3732
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD9⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE9⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD10⤵
- System Location Discovery: System Language Discovery
PID:4924
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE10⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD11⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD12⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD13⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD14⤵PID:32
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE14⤵PID:956
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD15⤵PID:4912
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE15⤵PID:1412
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD16⤵PID:4036
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE16⤵PID:4420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD17⤵PID:3888
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE17⤵PID:1628
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD18⤵PID:3344
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE18⤵PID:1596
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD19⤵PID:3436
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE19⤵PID:1220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD20⤵PID:5068
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE20⤵PID:3116
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD21⤵PID:4924
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE21⤵PID:4464
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD22⤵PID:5124
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE22⤵PID:5236
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD23⤵PID:5396
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE23⤵PID:5480
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD24⤵PID:5580
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE24⤵PID:5644
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD25⤵PID:5760
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE25⤵PID:5808
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD26⤵PID:5908
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE26⤵PID:5972
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD27⤵PID:6080
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE27⤵PID:6140
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD28⤵PID:4420
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE28⤵PID:5512
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD29⤵PID:3960
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE29⤵PID:5616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD30⤵PID:5796
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE30⤵PID:5480
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD31⤵PID:5468
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE31⤵PID:6084
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD32⤵PID:4356
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE32⤵PID:5972
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD33⤵PID:5644
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE33⤵PID:5696
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD34⤵PID:5280
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE34⤵PID:348
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD35⤵PID:5420
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE35⤵PID:5996
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD36⤵PID:5888
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE36⤵PID:6204
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD37⤵PID:6360
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE37⤵PID:6428
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD38⤵PID:6560
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE38⤵PID:6620
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD39⤵PID:6760
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE39⤵PID:6820
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD40⤵PID:6932
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE40⤵PID:6988
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD41⤵PID:7120
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE41⤵PID:6188
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD42⤵PID:6040
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE42⤵PID:6492
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD43⤵PID:6400
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE43⤵PID:6804
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD44⤵PID:6548
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE44⤵PID:6780
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD45⤵PID:6968
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE45⤵PID:6224
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD46⤵PID:7008
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE46⤵PID:7104
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD47⤵PID:5928
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE47⤵PID:6400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD48⤵PID:4848
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE48⤵PID:6664
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD49⤵PID:6616
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE49⤵PID:6964
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD50⤵PID:5744
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE50⤵PID:6772
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD51⤵PID:4300
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE51⤵PID:6188
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD52⤵PID:6676
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE52⤵PID:6560
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD53⤵PID:7260
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE53⤵PID:7296
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD54⤵PID:7388
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE54⤵PID:7432
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD55⤵PID:7564
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE55⤵PID:7592
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD56⤵PID:7696
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE56⤵PID:7744
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD57⤵PID:7860
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE57⤵PID:7892
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD58⤵PID:7996
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE58⤵PID:8048
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD59⤵PID:8156
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE59⤵PID:7044
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD60⤵PID:1840
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE60⤵PID:7456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD61⤵PID:6744
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE61⤵PID:7660
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD62⤵PID:7716
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE62⤵PID:7876
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD63⤵PID:7996
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE63⤵PID:7828
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD64⤵PID:7932
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE64⤵PID:7532
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD65⤵PID:7252
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE65⤵PID:4212
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD66⤵PID:7456
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE66⤵PID:7324
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD67⤵PID:6116
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE67⤵PID:8012
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD68⤵PID:7628
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE68⤵PID:8156
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD69⤵PID:7772
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE69⤵PID:6244
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD70⤵PID:3768
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE70⤵PID:6064
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD71⤵PID:7876
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE71⤵PID:6408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD72⤵PID:8264
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE72⤵PID:8324
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD73⤵PID:8456
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE73⤵PID:8492
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD74⤵PID:8620
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE74⤵PID:8696
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD75⤵PID:8828
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE75⤵PID:8868
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD76⤵PID:8984
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE76⤵PID:9060
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD77⤵PID:9200
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE77⤵PID:8208
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD78⤵PID:6516
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE78⤵PID:8308
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD79⤵PID:8560
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE79⤵PID:8472
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD80⤵PID:8436
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE80⤵PID:8660
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD81⤵PID:8856
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE81⤵PID:9112
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD82⤵PID:8980
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE82⤵PID:4932
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD83⤵PID:8328
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE83⤵PID:3640
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD84⤵PID:472
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE84⤵PID:640
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD85⤵PID:1704
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE85⤵PID:7896
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD86⤵PID:5864
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE86⤵PID:6032
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD87⤵PID:800
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE87⤵PID:9112
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD88⤵PID:7252
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE88⤵PID:8028
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD89⤵PID:9236
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE89⤵PID:9272
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD90⤵PID:9360
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE90⤵PID:9396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD91⤵PID:9528
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE91⤵PID:9588
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD92⤵PID:9816
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE92⤵PID:9860
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD93⤵PID:9968
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE93⤵PID:10032
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD94⤵PID:10140
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE94⤵PID:10220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD95⤵PID:5108
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE95⤵PID:9616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD96⤵PID:9296
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE96⤵PID:8052
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD97⤵PID:9736
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE97⤵PID:10080
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD98⤵PID:1004
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE98⤵PID:9864
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD99⤵PID:8308
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE99⤵PID:9400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD100⤵PID:9972
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE100⤵PID:9852
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD101⤵PID:8432
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE101⤵PID:4428
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD102⤵PID:9980
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE102⤵PID:10036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD103⤵PID:4504
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE103⤵PID:4916
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD104⤵PID:7024
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE104⤵PID:3448
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD105⤵PID:4324
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE105⤵PID:2724
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD106⤵PID:10332
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE106⤵PID:10388
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD107⤵PID:10512
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE107⤵PID:10564
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD108⤵PID:10656
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE108⤵PID:10708
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD109⤵PID:10800
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE109⤵PID:10844
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD110⤵PID:10968
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE110⤵PID:11016
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD111⤵PID:11124
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE111⤵PID:11164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD112⤵PID:9936
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE112⤵PID:9352
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD113⤵PID:6000
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE113⤵PID:7940
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD114⤵PID:10888
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE114⤵PID:10424
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD115⤵PID:10920
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE115⤵PID:10728
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD116⤵PID:11132
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE116⤵PID:11088
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD117⤵PID:180
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE117⤵PID:11192
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD118⤵PID:10988
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE118⤵PID:6496
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD119⤵PID:11132
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE119⤵PID:6000
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD120⤵PID:10920
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE120⤵PID:8660
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD121⤵PID:456
-
-
C:\Windows\SysWOW64\E9804A\A29FDD.EXEC:\Windows\system32\E9804A\A29FDD.EXE121⤵PID:9856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\E9804A\A29FDD122⤵PID:876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-