Analysis
-
max time kernel
45s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 03:10
Behavioral task
behavioral1
Sample
82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe
Resource
win7-20240704-en
9 signatures
150 seconds
General
-
Target
82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe
-
Size
68KB
-
MD5
82d2f1ccf7ac7c751bfec8b771f7db0d
-
SHA1
91911867fddc68a7abd5cd4ead7c21be74df0e1a
-
SHA256
496aa3e4a9d5e40c665fab0c26fcced1907d08ac0be99dcf7f86af11bd23a281
-
SHA512
44b048e5cfafe6966ac0ce5b168242ac2a0fd22687ca38494908ab1793a89ee2fccfb18fc1f878a604628b5cb527b6dccbf9643265dee23cc01fa72e07e865af
-
SSDEEP
1536:2zX1z1RieG2bPWRBSfxeGqES51P4TWf1zjRiXAANE8T8sb5:2zX11IeG2QKeGDS5dm6R8NX5
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 380 EXPL0RER.EXE 4316 EXPL0RER.EXE 1940 EXPL0RER.EXE 1596 EXPL0RER.EXE 4144 EXPL0RER.EXE 3320 EXPL0RER.EXE 4604 EXPL0RER.EXE 3504 EXPL0RER.EXE 3288 EXPL0RER.EXE 2232 EXPL0RER.EXE 4916 EXPL0RER.EXE 2256 EXPL0RER.EXE 5076 EXPL0RER.EXE 2540 EXPL0RER.EXE 1988 EXPL0RER.EXE 4596 EXPL0RER.EXE 2016 EXPL0RER.EXE 536 EXPL0RER.EXE 3276 EXPL0RER.EXE 3224 EXPL0RER.EXE 4920 EXPL0RER.EXE 3612 EXPL0RER.EXE 4832 EXPL0RER.EXE 4172 EXPL0RER.EXE 2612 EXPL0RER.EXE 4580 EXPL0RER.EXE 4052 EXPL0RER.EXE 4844 EXPL0RER.EXE 4912 EXPL0RER.EXE 2052 EXPL0RER.EXE 3032 EXPL0RER.EXE 2460 EXPL0RER.EXE 3152 EXPL0RER.EXE 3576 EXPL0RER.EXE 4980 EXPL0RER.EXE 2624 EXPL0RER.EXE 2868 EXPL0RER.EXE 1056 EXPL0RER.EXE 3280 EXPL0RER.EXE 4216 EXPL0RER.EXE 932 EXPL0RER.EXE 384 EXPL0RER.EXE 4616 EXPL0RER.EXE 636 EXPL0RER.EXE 2264 EXPL0RER.EXE 1564 EXPL0RER.EXE 2504 EXPL0RER.EXE 2076 EXPL0RER.EXE 2984 EXPL0RER.EXE 1792 EXPL0RER.EXE 3440 EXPL0RER.EXE 208 EXPL0RER.EXE 3536 EXPL0RER.EXE 2832 EXPL0RER.EXE 1932 EXPL0RER.EXE 2784 EXPL0RER.EXE 620 EXPL0RER.EXE 3244 EXPL0RER.EXE 1584 EXPL0RER.EXE 4680 EXPL0RER.EXE 3128 EXPL0RER.EXE 1476 EXPL0RER.EXE 3696 EXPL0RER.EXE 3968 EXPL0RER.EXE -
Loads dropped DLL 64 IoCs
pid Process 3124 regsvr32.exe 2224 regsvr32.exe 1240 regsvr32.exe 1240 regsvr32.exe 1520 regsvr32.exe 1520 regsvr32.exe 1604 regsvr32.exe 1232 regsvr32.exe 1232 regsvr32.exe 3316 regsvr32.exe 5028 regsvr32.exe 5028 regsvr32.exe 2356 regsvr32.exe 4268 regsvr32.exe 4048 regsvr32.exe 2592 regsvr32.exe 1608 regsvr32.exe 1584 regsvr32.exe 2396 regsvr32.exe 2396 regsvr32.exe 1372 regsvr32.exe 1372 regsvr32.exe 3960 regsvr32.exe 3960 regsvr32.exe 3608 regsvr32.exe 4036 regsvr32.exe 4036 regsvr32.exe 4184 regsvr32.exe 1912 regsvr32.exe 3772 regsvr32.exe 4724 regsvr32.exe 1932 regsvr32.exe 1932 regsvr32.exe 3052 regsvr32.exe 4056 regsvr32.exe 4056 regsvr32.exe 3896 regsvr32.exe 4048 regsvr32.exe 2264 regsvr32.exe 3136 regsvr32.exe 3832 regsvr32.exe 3832 regsvr32.exe 4688 regsvr32.exe 1372 regsvr32.exe 1240 regsvr32.exe 1240 regsvr32.exe 2436 regsvr32.exe 2436 regsvr32.exe 2340 regsvr32.exe 1084 regsvr32.exe 1088 regsvr32.exe 3984 regsvr32.exe 4904 regsvr32.exe 3828 regsvr32.exe 3828 regsvr32.exe 3548 regsvr32.exe 4260 regsvr32.exe 868 regsvr32.exe 2352 regsvr32.exe 3136 regsvr32.exe 4264 regsvr32.exe 448 regsvr32.exe 4248 regsvr32.exe 1072 regsvr32.exe -
resource yara_rule behavioral2/memory/4448-0-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/files/0x0008000000023478-6.dat upx behavioral2/memory/4316-37-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1940-55-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1596-69-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4144-89-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4448-165-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/380-181-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4316-197-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1940-213-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/5076-214-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1596-221-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4144-233-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3320-245-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4604-257-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2016-262-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3504-269-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/536-274-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3288-282-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3224-298-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2232-297-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4920-309-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4916-305-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2256-317-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4832-333-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/5076-328-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2540-341-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4172-346-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1988-353-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4596-365-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2016-376-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/536-387-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3276-398-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3224-409-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4920-421-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3612-432-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4832-443-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4172-455-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2612-467-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4580-478-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4052-489-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4844-500-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4912-511-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2052-522-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3032-534-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2460-545-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3152-556-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3576-567-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4980-578-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2624-589-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2868-600-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1056-611-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3280-622-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4216-633-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/932-645-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/384-656-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4616-668-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/636-679-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2264-690-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1564-701-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/620-713-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2504-712-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2076-724-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2984-735-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE -
Program crash 64 IoCs
pid pid_target Process procid_target 8036 4616 WerFault.exe 171 8044 636 WerFault.exe 173 2216 3324 WerFault.exe 277 3200 220 WerFault.exe 279 4924 4264 WerFault.exe 281 10308 3556 WerFault.exe 283 10544 2544 WerFault.exe 285 10672 2704 WerFault.exe 287 10812 1088 WerFault.exe 289 10936 4908 WerFault.exe 291 11012 5136 WerFault.exe 293 11232 5216 WerFault.exe 295 11256 5292 WerFault.exe 297 4924 5368 WerFault.exe 299 10640 5452 WerFault.exe 301 10788 5528 WerFault.exe 303 10672 5604 WerFault.exe 305 11120 5684 WerFault.exe 307 4724 5756 WerFault.exe 309 10364 5836 WerFault.exe 311 10512 5920 WerFault.exe 313 10624 6012 WerFault.exe 315 10904 6092 WerFault.exe 317 11028 5124 WerFault.exe 319 11108 5236 WerFault.exe 321 11060 5332 WerFault.exe 323 5244 5440 WerFault.exe 325 10764 5660 WerFault.exe 329 5936 5748 WerFault.exe 331 10744 5860 WerFault.exe 333 11136 6076 WerFault.exe 337 10552 5280 WerFault.exe 341 10308 5324 WerFault.exe 343 5680 5536 WerFault.exe 345 5936 5708 WerFault.exe 347 5724 5812 WerFault.exe 349 3584 5832 WerFault.exe 351 5384 6056 WerFault.exe 353 10512 5180 WerFault.exe 355 10716 5320 WerFault.exe 357 5768 5480 WerFault.exe 359 11040 5636 WerFault.exe 361 6104 5788 WerFault.exe 363 10744 5952 WerFault.exe 365 10292 6128 WerFault.exe 367 10772 5196 WerFault.exe 369 5936 5484 WerFault.exe 371 10924 5584 WerFault.exe 373 5644 5824 WerFault.exe 375 6104 6052 WerFault.exe 377 10896 5200 WerFault.exe 379 11072 5404 WerFault.exe 381 10528 1756 WerFault.exe 383 10592 5732 WerFault.exe 385 5364 5396 WerFault.exe 389 10840 5804 WerFault.exe 391 6104 6060 WerFault.exe 393 5912 1472 WerFault.exe 395 11208 5928 WerFault.exe 397 5780 6136 WerFault.exe 399 5936 5568 WerFault.exe 401 4820 5276 WerFault.exe 405 10252 5908 WerFault.exe 407 6316 5412 WerFault.exe 409 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3124 4448 82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe 84 PID 4448 wrote to memory of 3124 4448 82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe 84 PID 4448 wrote to memory of 3124 4448 82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe 84 PID 4448 wrote to memory of 380 4448 82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe 85 PID 4448 wrote to memory of 380 4448 82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe 85 PID 4448 wrote to memory of 380 4448 82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe 85 PID 380 wrote to memory of 2224 380 EXPL0RER.EXE 87 PID 380 wrote to memory of 2224 380 EXPL0RER.EXE 87 PID 380 wrote to memory of 2224 380 EXPL0RER.EXE 87 PID 380 wrote to memory of 4316 380 EXPL0RER.EXE 88 PID 380 wrote to memory of 4316 380 EXPL0RER.EXE 88 PID 380 wrote to memory of 4316 380 EXPL0RER.EXE 88 PID 4316 wrote to memory of 1240 4316 EXPL0RER.EXE 89 PID 4316 wrote to memory of 1240 4316 EXPL0RER.EXE 89 PID 4316 wrote to memory of 1240 4316 EXPL0RER.EXE 89 PID 4316 wrote to memory of 1940 4316 EXPL0RER.EXE 90 PID 4316 wrote to memory of 1940 4316 EXPL0RER.EXE 90 PID 4316 wrote to memory of 1940 4316 EXPL0RER.EXE 90 PID 1940 wrote to memory of 1520 1940 EXPL0RER.EXE 92 PID 1940 wrote to memory of 1520 1940 EXPL0RER.EXE 92 PID 1940 wrote to memory of 1520 1940 EXPL0RER.EXE 92 PID 1940 wrote to memory of 1596 1940 EXPL0RER.EXE 93 PID 1940 wrote to memory of 1596 1940 EXPL0RER.EXE 93 PID 1940 wrote to memory of 1596 1940 EXPL0RER.EXE 93 PID 1596 wrote to memory of 1604 1596 EXPL0RER.EXE 94 PID 1596 wrote to memory of 1604 1596 EXPL0RER.EXE 94 PID 1596 wrote to memory of 1604 1596 EXPL0RER.EXE 94 PID 1596 wrote to memory of 4144 1596 EXPL0RER.EXE 95 PID 1596 wrote to memory of 4144 1596 EXPL0RER.EXE 95 PID 1596 wrote to memory of 4144 1596 EXPL0RER.EXE 95 PID 4144 wrote to memory of 1232 4144 EXPL0RER.EXE 96 PID 4144 wrote to memory of 1232 4144 EXPL0RER.EXE 96 PID 4144 wrote to memory of 1232 4144 EXPL0RER.EXE 96 PID 4144 wrote to memory of 3320 4144 EXPL0RER.EXE 97 PID 4144 wrote to memory of 3320 4144 EXPL0RER.EXE 97 PID 4144 wrote to memory of 3320 4144 EXPL0RER.EXE 97 PID 3320 wrote to memory of 3316 3320 EXPL0RER.EXE 98 PID 3320 wrote to memory of 3316 3320 EXPL0RER.EXE 98 PID 3320 wrote to memory of 3316 3320 EXPL0RER.EXE 98 PID 3320 wrote to memory of 4604 3320 EXPL0RER.EXE 99 PID 3320 wrote to memory of 4604 3320 EXPL0RER.EXE 99 PID 3320 wrote to memory of 4604 3320 EXPL0RER.EXE 99 PID 4604 wrote to memory of 5028 4604 EXPL0RER.EXE 100 PID 4604 wrote to memory of 5028 4604 EXPL0RER.EXE 100 PID 4604 wrote to memory of 5028 4604 EXPL0RER.EXE 100 PID 4604 wrote to memory of 3504 4604 EXPL0RER.EXE 101 PID 4604 wrote to memory of 3504 4604 EXPL0RER.EXE 101 PID 4604 wrote to memory of 3504 4604 EXPL0RER.EXE 101 PID 3504 wrote to memory of 2356 3504 EXPL0RER.EXE 102 PID 3504 wrote to memory of 2356 3504 EXPL0RER.EXE 102 PID 3504 wrote to memory of 2356 3504 EXPL0RER.EXE 102 PID 3504 wrote to memory of 3288 3504 EXPL0RER.EXE 103 PID 3504 wrote to memory of 3288 3504 EXPL0RER.EXE 103 PID 3504 wrote to memory of 3288 3504 EXPL0RER.EXE 103 PID 3288 wrote to memory of 4268 3288 EXPL0RER.EXE 104 PID 3288 wrote to memory of 4268 3288 EXPL0RER.EXE 104 PID 3288 wrote to memory of 4268 3288 EXPL0RER.EXE 104 PID 3288 wrote to memory of 2232 3288 EXPL0RER.EXE 105 PID 3288 wrote to memory of 2232 3288 EXPL0RER.EXE 105 PID 3288 wrote to memory of 2232 3288 EXPL0RER.EXE 105 PID 2232 wrote to memory of 4048 2232 EXPL0RER.EXE 140 PID 2232 wrote to memory of 4048 2232 EXPL0RER.EXE 140 PID 2232 wrote to memory of 4048 2232 EXPL0RER.EXE 140 PID 2232 wrote to memory of 4916 2232 EXPL0RER.EXE 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82d2f1ccf7ac7c751bfec8b771f7db0d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL2⤵
- Loads dropped DLL
- Modifies registry class
PID:3124
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL3⤵
- Loads dropped DLL
PID:2224
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL4⤵
- Loads dropped DLL
PID:1240
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL5⤵
- Loads dropped DLL
PID:1520
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL6⤵
- Loads dropped DLL
PID:1604
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL7⤵
- Loads dropped DLL
PID:1232
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3316
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL9⤵
- Loads dropped DLL
- Modifies registry class
PID:5028
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL10⤵
- Loads dropped DLL
PID:2356
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL11⤵
- Loads dropped DLL
PID:4268
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL12⤵
- Loads dropped DLL
PID:4048
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE12⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL13⤵
- Loads dropped DLL
PID:2592
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE13⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL14⤵
- Loads dropped DLL
- Modifies registry class
PID:1608
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE14⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL15⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1584
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE15⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL16⤵
- Loads dropped DLL
PID:2396
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE16⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL17⤵
- Loads dropped DLL
PID:1372
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE17⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL18⤵
- Loads dropped DLL
PID:3960
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2016 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL19⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3608
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE19⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:536 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL20⤵
- Loads dropped DLL
PID:4036
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE20⤵
- Executes dropped EXE
PID:3276 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL21⤵
- Loads dropped DLL
PID:4184
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE21⤵
- Executes dropped EXE
PID:3224 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL22⤵
- Loads dropped DLL
PID:1912
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4920 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL23⤵
- Loads dropped DLL
PID:3772
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE23⤵
- Executes dropped EXE
PID:3612 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL24⤵
- Loads dropped DLL
PID:4724
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4832 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL25⤵
- Loads dropped DLL
PID:1932
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4172 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL26⤵
- Loads dropped DLL
PID:3052
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE26⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL27⤵
- Loads dropped DLL
PID:4056
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE27⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL28⤵
- Loads dropped DLL
PID:3896
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4052 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL29⤵
- Loads dropped DLL
PID:4048
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE29⤵
- Executes dropped EXE
PID:4844 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL30⤵
- Loads dropped DLL
PID:2264
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE30⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL31⤵
- Loads dropped DLL
PID:3136
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE31⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL32⤵
- Loads dropped DLL
- Modifies registry class
PID:3832
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL33⤵
- Loads dropped DLL
PID:4688
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE33⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL34⤵
- Loads dropped DLL
PID:1372
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE34⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL35⤵
- Loads dropped DLL
PID:1240
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL36⤵
- Loads dropped DLL
PID:2436
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4980 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL37⤵
- Loads dropped DLL
PID:2340
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2624 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL38⤵
- Loads dropped DLL
PID:1084
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE38⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL39⤵
- Loads dropped DLL
PID:1088
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE39⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL40⤵
- Loads dropped DLL
PID:3984
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3280 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL41⤵
- Loads dropped DLL
PID:4904
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE41⤵
- Executes dropped EXE
PID:4216 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL42⤵
- Loads dropped DLL
PID:3828
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE42⤵
- Executes dropped EXE
PID:932 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL43⤵
- Loads dropped DLL
PID:3548
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE43⤵
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL44⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4616 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL45⤵
- Loads dropped DLL
- Modifies registry class
PID:868
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:636 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL46⤵
- Loads dropped DLL
PID:2352
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE46⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL47⤵
- Loads dropped DLL
PID:3136
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL48⤵
- Loads dropped DLL
PID:4264
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE48⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL49⤵
- Loads dropped DLL
- Modifies registry class
PID:448
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE49⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL50⤵
- Loads dropped DLL
PID:4248
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE50⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL51⤵
- Loads dropped DLL
PID:1072
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE51⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL52⤵PID:3104
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE52⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL53⤵PID:1452
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE53⤵
- Executes dropped EXE
PID:208 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL54⤵PID:1084
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE54⤵
- Executes dropped EXE
PID:3536 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL55⤵
- Modifies registry class
PID:1540
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL56⤵PID:1832
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1932 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL57⤵PID:3828
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE57⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL58⤵PID:4884
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:620 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL59⤵
- Modifies registry class
PID:3468
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3244 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL60⤵
- Modifies registry class
PID:2352
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE60⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL61⤵PID:4264
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4680 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL62⤵
- Modifies registry class
PID:1908
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE62⤵
- Executes dropped EXE
PID:3128 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL63⤵PID:4304
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE63⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL64⤵PID:708
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3696 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL65⤵
- Modifies registry class
PID:4548
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3968 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL66⤵PID:4940
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE66⤵PID:4468
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL67⤵PID:2736
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE67⤵PID:3580
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL68⤵
- Modifies registry class
PID:2020
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE68⤵
- Drops file in Windows directory
PID:3896 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL69⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE69⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL70⤵
- Modifies registry class
PID:3116
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE70⤵PID:1676
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL71⤵PID:3860
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE71⤵PID:448
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL72⤵PID:4692
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE72⤵PID:3880
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL73⤵PID:1412
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE73⤵PID:1488
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL74⤵PID:3316
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE74⤵PID:1012
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL75⤵
- Modifies registry class
PID:3820
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE75⤵
- Drops file in Windows directory
PID:3052 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL76⤵
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE76⤵PID:1480
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL77⤵PID:1852
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE77⤵PID:3468
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL78⤵PID:2704
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE78⤵
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL79⤵PID:4248
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE79⤵
- Drops file in System32 directory
PID:1560 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL80⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1604
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE80⤵PID:1944
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL81⤵PID:4940
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE81⤵
- Drops file in System32 directory
PID:4540 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL82⤵PID:3828
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE82⤵
- Drops file in Windows directory
PID:5036 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL83⤵
- Modifies registry class
PID:1460
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE83⤵
- Drops file in Windows directory
PID:3832 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL84⤵PID:2004
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE84⤵PID:2216
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL85⤵PID:3248
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE85⤵
- Drops file in System32 directory
PID:3640 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL86⤵PID:1412
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE86⤵PID:3964
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL87⤵
- Modifies registry class
PID:2328
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE87⤵PID:2408
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL88⤵PID:4260
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE88⤵
- Drops file in Windows directory
PID:2352 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL89⤵PID:2388
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE89⤵PID:3860
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL90⤵PID:3424
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE90⤵
- Drops file in Windows directory
PID:3428 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL91⤵PID:4820
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE91⤵
- Drops file in Windows directory
PID:4880 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL92⤵PID:4588
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE92⤵PID:5100
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL93⤵PID:2004
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE93⤵PID:1020
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL94⤵PID:4424
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE94⤵PID:3740
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL95⤵PID:2936
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE95⤵PID:1612
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL96⤵PID:4184
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE96⤵
- Drops file in Windows directory
PID:4924 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL97⤵PID:2544
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE97⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3324 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL98⤵PID:4588
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE98⤵PID:220
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL99⤵PID:4620
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE99⤵PID:4264
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL100⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE100⤵PID:3556
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL101⤵PID:4688
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE101⤵
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL102⤵PID:4184
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE102⤵
- Drops file in Windows directory
PID:2704 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL103⤵PID:4688
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE103⤵
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL104⤵PID:4688
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE104⤵PID:4908
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL105⤵PID:4060
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE105⤵PID:5136
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL106⤵PID:5196
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE106⤵
- Drops file in Windows directory
PID:5216 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL107⤵PID:5276
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE107⤵
- Drops file in Windows directory
PID:5292 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL108⤵
- Modifies registry class
PID:5356
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE108⤵PID:5368
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL109⤵PID:5436
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE109⤵PID:5452
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL110⤵
- Modifies registry class
PID:5512
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE110⤵PID:5528
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL111⤵PID:5588
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE111⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5604 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL112⤵PID:5668
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE112⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:5684 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL113⤵PID:5744
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE113⤵PID:5756
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL114⤵PID:5820
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE114⤵
- Drops file in System32 directory
PID:5836 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL115⤵PID:5900
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE115⤵
- System Location Discovery: System Language Discovery
PID:5920 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL116⤵PID:5980
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE116⤵
- Drops file in System32 directory
PID:6012 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL117⤵
- Modifies registry class
PID:6072
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE117⤵PID:6092
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL118⤵PID:1736
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE118⤵
- Drops file in System32 directory
PID:5124 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL119⤵PID:5212
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE119⤵PID:5236
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL120⤵PID:5324
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE120⤵PID:5332
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL121⤵PID:5428
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE121⤵
- Drops file in System32 directory
PID:5440 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL122⤵PID:5524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-