Analysis
-
max time kernel
5s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
7e146a8964ade2a861204eea5ac4509a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7e146a8964ade2a861204eea5ac4509a.exe
Resource
win10v2004-20240730-en
General
-
Target
7e146a8964ade2a861204eea5ac4509a.exe
-
Size
1.2MB
-
MD5
7e146a8964ade2a861204eea5ac4509a
-
SHA1
0c6030aed6da66d216139ca34762b966c70ba1d2
-
SHA256
b8e3afde9262d7794928cd98641716bb21d6cab385d7be84eabe60e06c80b365
-
SHA512
41edd84b90ce6bf207195a9fcef3d3db042f8c95671ef4b2a56b9110ab5aa2cd304cdc3f2c86c5002360733790353d93535fa0834eaf0bcaa25c4dc909d6e4af
-
SSDEEP
24576:j69RrEts4E59IrYnjtscr/dMYry/Zn1lTCvoKFmrj9G7yZlra2ST:j6A+9I6tssMYo/OvoNGqxavT
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 4100 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 4496 XP-0EE37CC5.EXE -
Loads dropped DLL 64 IoCs
pid Process 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 4496 XP-0EE37CC5.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 9 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 7e146a8964ade2a861204eea5ac4509a.exe File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\XP-0EE37CC5.EXE 7e146a8964ade2a861204eea5ac4509a.exe File opened for modification C:\Windows\SysWOW64\XP-0EE37CC5.EXE 7e146a8964ade2a861204eea5ac4509a.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e146a8964ade2a861204eea5ac4509a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-857544305-989156968-2929034274-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1852 explorer.exe 372 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 1400 7e146a8964ade2a861204eea5ac4509a.exe 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 4100 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 1844 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 4116 XP-0EE37CC5.EXE 1852 explorer.exe 1852 explorer.exe 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 2092 XP-0EE37CC5.EXE 372 explorer.exe 372 explorer.exe 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 4280 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 3536 XP-0EE37CC5.EXE 1864 explorer.exe 1864 explorer.exe 3536 XP-0EE37CC5.EXE 1224 explorer.exe 1224 explorer.exe 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 4144 XP-0EE37CC5.EXE 3592 explorer.exe 3592 explorer.exe 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE 3612 XP-0EE37CC5.EXE -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1400 wrote to memory of 228 1400 7e146a8964ade2a861204eea5ac4509a.exe 85 PID 1400 wrote to memory of 228 1400 7e146a8964ade2a861204eea5ac4509a.exe 85 PID 1400 wrote to memory of 228 1400 7e146a8964ade2a861204eea5ac4509a.exe 85 PID 1400 wrote to memory of 4100 1400 7e146a8964ade2a861204eea5ac4509a.exe 87 PID 1400 wrote to memory of 4100 1400 7e146a8964ade2a861204eea5ac4509a.exe 87 PID 1400 wrote to memory of 4100 1400 7e146a8964ade2a861204eea5ac4509a.exe 87 PID 4100 wrote to memory of 1536 4100 XP-0EE37CC5.EXE 88 PID 4100 wrote to memory of 1536 4100 XP-0EE37CC5.EXE 88 PID 4100 wrote to memory of 1536 4100 XP-0EE37CC5.EXE 88 PID 4100 wrote to memory of 1844 4100 XP-0EE37CC5.EXE 155 PID 4100 wrote to memory of 1844 4100 XP-0EE37CC5.EXE 155 PID 4100 wrote to memory of 1844 4100 XP-0EE37CC5.EXE 155 PID 1844 wrote to memory of 3100 1844 XP-0EE37CC5.EXE 92 PID 1844 wrote to memory of 3100 1844 XP-0EE37CC5.EXE 92 PID 1844 wrote to memory of 3100 1844 XP-0EE37CC5.EXE 92 PID 1844 wrote to memory of 4116 1844 XP-0EE37CC5.EXE 93 PID 1844 wrote to memory of 4116 1844 XP-0EE37CC5.EXE 93 PID 1844 wrote to memory of 4116 1844 XP-0EE37CC5.EXE 93 PID 4116 wrote to memory of 1820 4116 XP-0EE37CC5.EXE 95 PID 4116 wrote to memory of 1820 4116 XP-0EE37CC5.EXE 95 PID 4116 wrote to memory of 1820 4116 XP-0EE37CC5.EXE 95 PID 4116 wrote to memory of 2092 4116 XP-0EE37CC5.EXE 96 PID 4116 wrote to memory of 2092 4116 XP-0EE37CC5.EXE 96 PID 4116 wrote to memory of 2092 4116 XP-0EE37CC5.EXE 96 PID 2092 wrote to memory of 4208 2092 XP-0EE37CC5.EXE 98 PID 2092 wrote to memory of 4208 2092 XP-0EE37CC5.EXE 98 PID 2092 wrote to memory of 4208 2092 XP-0EE37CC5.EXE 98 PID 2092 wrote to memory of 4280 2092 XP-0EE37CC5.EXE 147 PID 2092 wrote to memory of 4280 2092 XP-0EE37CC5.EXE 147 PID 2092 wrote to memory of 4280 2092 XP-0EE37CC5.EXE 147 PID 4280 wrote to memory of 2308 4280 XP-0EE37CC5.EXE 186 PID 4280 wrote to memory of 2308 4280 XP-0EE37CC5.EXE 186 PID 4280 wrote to memory of 2308 4280 XP-0EE37CC5.EXE 186 PID 4280 wrote to memory of 3536 4280 XP-0EE37CC5.EXE 102 PID 4280 wrote to memory of 3536 4280 XP-0EE37CC5.EXE 102 PID 4280 wrote to memory of 3536 4280 XP-0EE37CC5.EXE 102 PID 3536 wrote to memory of 4408 3536 XP-0EE37CC5.EXE 104 PID 3536 wrote to memory of 4408 3536 XP-0EE37CC5.EXE 104 PID 3536 wrote to memory of 4408 3536 XP-0EE37CC5.EXE 104 PID 3536 wrote to memory of 4144 3536 XP-0EE37CC5.EXE 153 PID 3536 wrote to memory of 4144 3536 XP-0EE37CC5.EXE 153 PID 3536 wrote to memory of 4144 3536 XP-0EE37CC5.EXE 153 PID 4144 wrote to memory of 2364 4144 XP-0EE37CC5.EXE 107 PID 4144 wrote to memory of 2364 4144 XP-0EE37CC5.EXE 107 PID 4144 wrote to memory of 2364 4144 XP-0EE37CC5.EXE 107 PID 4144 wrote to memory of 3612 4144 XP-0EE37CC5.EXE 108 PID 4144 wrote to memory of 3612 4144 XP-0EE37CC5.EXE 108 PID 4144 wrote to memory of 3612 4144 XP-0EE37CC5.EXE 108 PID 3612 wrote to memory of 4488 3612 XP-0EE37CC5.EXE 110 PID 3612 wrote to memory of 4488 3612 XP-0EE37CC5.EXE 110 PID 3612 wrote to memory of 4488 3612 XP-0EE37CC5.EXE 110 PID 3612 wrote to memory of 4496 3612 XP-0EE37CC5.EXE 185 PID 3612 wrote to memory of 4496 3612 XP-0EE37CC5.EXE 185 PID 3612 wrote to memory of 4496 3612 XP-0EE37CC5.EXE 185
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e146a8964ade2a861204eea5ac4509a.exe"C:\Users\Admin\AppData\Local\Temp\7e146a8964ade2a861204eea5ac4509a.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\7e146a8964ade2a861204eea5ac4509a2⤵
- System Location Discovery: System Language Discovery
PID:228
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC53⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC54⤵
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC55⤵
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC56⤵
- System Location Discovery: System Language Discovery
PID:4208
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC57⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC58⤵
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC59⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC510⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC511⤵PID:4436
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE11⤵PID:2956
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC512⤵PID:1344
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE12⤵PID:4024
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC513⤵PID:844
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE13⤵PID:4772
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC514⤵PID:2236
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE14⤵PID:4188
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC515⤵PID:4688
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE15⤵PID:1844
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC516⤵PID:2772
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE16⤵PID:2812
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC517⤵PID:2156
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE17⤵PID:384
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC518⤵PID:4856
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE18⤵PID:4144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC519⤵PID:1452
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE19⤵PID:1632
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC520⤵PID:2756
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE20⤵PID:5008
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC521⤵PID:3868
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE21⤵PID:1532
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC522⤵PID:812
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE22⤵PID:4280
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC523⤵PID:3632
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE23⤵PID:4856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC524⤵PID:3312
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE24⤵PID:2600
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC525⤵PID:1844
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE25⤵PID:2976
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC526⤵PID:3608
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE26⤵PID:2756
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC527⤵PID:3580
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE27⤵PID:2308
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC528⤵PID:548
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE28⤵PID:4952
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC529⤵PID:5224
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE29⤵PID:5272
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC530⤵PID:5400
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE30⤵PID:5456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC531⤵PID:5608
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE31⤵PID:5644
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC532⤵PID:5764
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE32⤵PID:5808
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC533⤵PID:5964
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE33⤵PID:6016
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC534⤵PID:5176
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE34⤵PID:4296
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC535⤵PID:5248
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE35⤵PID:5712
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC536⤵PID:5920
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE36⤵PID:5728
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC537⤵PID:5972
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE37⤵PID:5812
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC538⤵PID:6016
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE38⤵PID:6056
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC539⤵PID:5052
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE39⤵PID:5848
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC540⤵PID:4524
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE40⤵PID:5528
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC541⤵PID:4952
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE41⤵PID:6148
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC542⤵PID:6260
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE42⤵PID:6296
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC543⤵PID:6420
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE43⤵PID:6456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC544⤵PID:6572
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE44⤵PID:6632
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC545⤵PID:6780
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE45⤵PID:6824
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC546⤵PID:6960
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE46⤵PID:7004
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC547⤵PID:7124
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE47⤵PID:7164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC548⤵PID:6328
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE48⤵PID:5608
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC549⤵PID:6568
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE49⤵PID:3692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC550⤵PID:6600
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE50⤵PID:6856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC551⤵PID:7116
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE51⤵PID:6984
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC552⤵PID:6284
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE52⤵PID:332
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC553⤵PID:5276
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE53⤵PID:6168
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC554⤵PID:5404
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE54⤵PID:3816
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC555⤵PID:3160
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE55⤵PID:3948
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC556⤵PID:7008
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE56⤵PID:7128
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC557⤵PID:4332
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE57⤵PID:1140
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC558⤵PID:7272
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE58⤵PID:7300
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC559⤵PID:7420
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE59⤵PID:7468
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC560⤵PID:7608
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE60⤵PID:7688
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC561⤵PID:7800
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE61⤵PID:7856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC562⤵PID:7972
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE62⤵PID:8012
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC563⤵PID:8136
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE63⤵PID:3896
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC564⤵PID:6960
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE64⤵PID:4112
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC565⤵PID:3364
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE65⤵PID:5960
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC566⤵PID:2864
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE66⤵PID:7916
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC567⤵PID:7808
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE67⤵PID:1856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC568⤵PID:6192
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE68⤵PID:7952
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC569⤵PID:8092
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE69⤵PID:7720
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC570⤵PID:7628
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE70⤵PID:7840
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC571⤵PID:7320
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE71⤵PID:7992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC572⤵PID:7192
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE72⤵PID:7936
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC573⤵PID:1896
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE73⤵PID:1420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC574⤵PID:5456
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE74⤵PID:468
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC575⤵PID:1568
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE75⤵PID:8164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC576⤵PID:8092
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE76⤵PID:5848
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC577⤵PID:6700
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE77⤵PID:7604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC578⤵PID:5960
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE78⤵PID:8200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC579⤵PID:8364
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE79⤵PID:8420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC580⤵PID:8544
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE80⤵PID:8584
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC581⤵PID:8708
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE81⤵PID:8764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC582⤵PID:8900
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE82⤵PID:8952
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC583⤵PID:9092
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE83⤵PID:9144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC584⤵PID:7288
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE84⤵PID:5960
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC585⤵PID:8496
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE85⤵PID:5516
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC586⤵PID:8212
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE86⤵PID:8808
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC587⤵PID:6776
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE87⤵PID:8684
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC588⤵PID:8904
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE88⤵PID:8764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC589⤵PID:5532
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE89⤵PID:7288
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC590⤵PID:8568
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE90⤵PID:9048
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC591⤵PID:5308
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE91⤵PID:8808
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC592⤵PID:8688
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE92⤵PID:8960
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC593⤵PID:8696
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE93⤵PID:5984
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC594⤵PID:7900
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE94⤵PID:5036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC595⤵PID:9180
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE95⤵PID:208
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC596⤵PID:5532
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE96⤵PID:8688
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC597⤵PID:5872
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE97⤵PID:4508
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC598⤵PID:9320
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE98⤵PID:9364
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC599⤵PID:9508
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE99⤵PID:9548
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5100⤵PID:9672
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE100⤵PID:9752
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5101⤵PID:9880
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE101⤵PID:9924
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5102⤵PID:10064
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE102⤵PID:10104
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5103⤵PID:9236
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE103⤵PID:5532
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5104⤵PID:8
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE104⤵PID:8476
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5105⤵PID:9704
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE105⤵PID:9508
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5106⤵PID:9596
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE106⤵PID:10120
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5107⤵PID:8408
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE107⤵PID:9232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5108⤵PID:3684
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE108⤵PID:9180
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5109⤵PID:2952
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE109⤵PID:9904
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5110⤵PID:10060
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE110⤵PID:10044
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5111⤵PID:9516
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE111⤵PID:1116
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5112⤵PID:1144
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE112⤵PID:7604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5113⤵PID:9904
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE113⤵PID:9648
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5114⤵PID:8632
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE114⤵PID:7972
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5115⤵PID:1116
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE115⤵PID:10124
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5116⤵PID:3628
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE116⤵PID:696
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5117⤵PID:3708
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE117⤵PID:5308
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5118⤵PID:3184
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE118⤵PID:7972
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5119⤵PID:3340
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE119⤵PID:708
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5120⤵PID:6856
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE120⤵PID:3184
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5121⤵PID:3572
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE121⤵PID:4088
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC5122⤵PID:2080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-