Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 10:29
Behavioral task
behavioral1
Sample
95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe
-
Size
67KB
-
MD5
95b6aee2ae326e6b9e44f488ead509ac
-
SHA1
1cd1989ffcc2483d308bf1b40456ef2e00061b09
-
SHA256
9e4ef8952b6627b7b869feca6fe4cc5dddf9d5cf064724d6b8f2bd328d5324be
-
SHA512
5e206ec1b0cae838b04a5f4d747ba8c615f02a933182d105293d167c2f6bfa9a4df99682f5c05f97ff47b24f17da7cef6bf17d56f62ff3528befd729693e59d1
-
SSDEEP
1536:NrpRA997SzHmcAnUNcYo92zlzD1YX+P/uWKmqEx5P/II:Nr7ANnUtfzlf17/uW7qF
Malware Config
Signatures
-
Drops file in Drivers directory 50 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File opened for modification C:\Windows\SysWOW64\drivers\expllorer.exe 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe File created C:\Windows\SysWOW64\drivers\expllorer.exe expllorer.exe -
Executes dropped EXE 49 IoCs
pid Process 4632 expllorer.exe 2200 expllorer.exe 672 expllorer.exe 1912 expllorer.exe 3608 expllorer.exe 544 expllorer.exe 2228 expllorer.exe 1256 expllorer.exe 3008 expllorer.exe 3532 expllorer.exe 408 expllorer.exe 1640 expllorer.exe 2624 expllorer.exe 2876 expllorer.exe 4256 expllorer.exe 2960 expllorer.exe 2948 expllorer.exe 1544 expllorer.exe 3608 expllorer.exe 1008 expllorer.exe 5344 expllorer.exe 5540 expllorer.exe 5808 expllorer.exe 5940 expllorer.exe 6084 expllorer.exe 5436 expllorer.exe 4148 expllorer.exe 5580 expllorer.exe 5900 expllorer.exe 6060 expllorer.exe 5424 expllorer.exe 5472 expllorer.exe 6084 expllorer.exe 5988 expllorer.exe 5540 expllorer.exe 5584 expllorer.exe 5152 expllorer.exe 5452 expllorer.exe 5440 expllorer.exe 5520 expllorer.exe 3016 expllorer.exe 5184 expllorer.exe 2704 expllorer.exe 1044 expllorer.exe 5696 expllorer.exe 3016 expllorer.exe 2312 expllorer.exe 5728 expllorer.exe 4280 expllorer.exe -
resource yara_rule behavioral2/memory/3392-0-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x000b000000023429-3.dat upx behavioral2/memory/3392-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2200-13-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4632-15-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/672-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2200-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1912-30-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/672-32-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3608-39-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1912-41-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/544-48-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3608-50-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2228-57-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/544-59-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1256-66-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2228-67-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3008-74-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1256-76-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3532-83-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3008-85-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/408-92-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3532-94-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3532-93-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1640-109-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/408-111-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2624-118-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1640-120-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2876-127-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2624-129-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4256-136-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2876-138-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2960-145-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4256-147-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2948-154-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2960-155-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1544-162-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2948-164-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3608-171-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1544-173-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1008-180-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3608-181-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1008-189-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5540-196-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5344-198-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5540-216-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5940-223-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5808-225-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/6084-232-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5940-234-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/6084-241-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4148-248-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5436-250-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5580-257-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4148-259-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5900-266-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5580-268-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/6060-275-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5900-276-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5424-283-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/6060-285-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5472-292-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5424-294-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5472-302-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Windows directory 50 IoCs
description ioc Process File created C:\Windows\8142024103122.exe expllorer.exe File created C:\Windows\8142024103137.exe expllorer.exe File created C:\Windows\8142024102954.exe expllorer.exe File created C:\Windows\8142024103036.exe expllorer.exe File created C:\Windows\8142024103204.exe expllorer.exe File created C:\Windows\8142024103045.exe expllorer.exe File created C:\Windows\8142024103116.exe expllorer.exe File created C:\Windows\8142024103155.exe expllorer.exe File created C:\Windows\8142024102957.exe expllorer.exe File created C:\Windows\8142024103009.exe expllorer.exe File created C:\Windows\8142024103024.exe expllorer.exe File created C:\Windows\8142024103048.exe expllorer.exe File created C:\Windows\8142024103110.exe expllorer.exe File created C:\Windows\8142024102945.exe expllorer.exe File created C:\Windows\8142024103039.exe expllorer.exe File created C:\Windows\8142024103100.exe expllorer.exe File created C:\Windows\8142024103113.exe expllorer.exe File created C:\Windows\8142024103201.exe expllorer.exe File created C:\Windows\8142024103134.exe expllorer.exe File created C:\Windows\8142024103146.exe expllorer.exe File created C:\Windows\8142024102948.exe expllorer.exe File created C:\Windows\8142024103006.exe expllorer.exe File created C:\Windows\8142024103128.exe expllorer.exe File created C:\Windows\8142024103140.exe expllorer.exe File created C:\Windows\8142024103143.exe expllorer.exe File created C:\Windows\8142024102939.exe expllorer.exe File created C:\Windows\8142024102942.exe expllorer.exe File created C:\Windows\8142024103000.exe expllorer.exe File created C:\Windows\8142024103012.exe expllorer.exe File created C:\Windows\8142024102951.exe expllorer.exe File created C:\Windows\8142024103015.exe expllorer.exe File created C:\Windows\8142024103103.exe expllorer.exe File created C:\Windows\8142024103003.exe expllorer.exe File created C:\Windows\8142024103158.exe expllorer.exe File created C:\Windows\8142024103021.exe expllorer.exe File created C:\Windows\8142024103027.exe expllorer.exe File created C:\Windows\8142024103033.exe expllorer.exe File created C:\Windows\8142024103051.exe expllorer.exe File created C:\Windows\8142024103106.exe expllorer.exe File created C:\Windows\8142024103131.exe expllorer.exe File created C:\Windows\8142024103018.exe expllorer.exe File created C:\Windows\8142024103030.exe expllorer.exe File created C:\Windows\8142024103125.exe expllorer.exe File created C:\Windows\8142024103149.exe expllorer.exe File created C:\Windows\8142024103152.exe expllorer.exe File created C:\Windows\8142024103042.exe expllorer.exe File created C:\Windows\8142024103119.exe expllorer.exe File created C:\Windows\8142024102936.exe 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe File created C:\Windows\8142024103054.exe expllorer.exe File created C:\Windows\8142024103057.exe expllorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expllorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503dc71435eeda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7010f8f034eeda01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500af01935eeda01 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff1a0000001a000000a00400007f020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b10000000002000000000010660000000100002000000059d37d5d48b559a6011d88d0235aa4e4dd47cc2f8913142f70a1790e0e462084000000000e8000000002000020000000a6153b196bf10bd811f041743caac81dd590d9b40346cf48fbb9719978610564200000004147fe8b2a66d5dcbbbf97e56a2120854ea06de35cc00a87dc0d9d84bc29eb634000000049b76024364f3cace29eba1ec6173687024e46a45825a8ddaf14de7b40095d605d286837236569a01373ab6c04bc3b1ab15ea5fc608154405a739acbdfce7cf3 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603b352a35eeda01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09bace734eeda01 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4242168240" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b1000000000200000000001066000000010000200000002272853bad6e6fe2c83f217bc8012bf91ac980a6d9143cecebcbf5bc923df4c7000000000e80000000020000200000009dfeb7f96c0c1e1068f23e2ba60b301dadb1e4ba66c0eb641cd2a066c3ee25b520000000c849d4645923e68fc9204fe478f108c2a504ece53d7a57360b6d70c5d573130a4000000013e33a3f91b4a87db19faa5d735320580796ed8e2339de8f1db9f4e3e45236dbf93a8e18d0cf9199a355c25958a8f87b3efe19a1205acf7cc46ea9fb8defcecc IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308c732f35eeda01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3400000034000000ba04000099020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125044" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b1000000000200000000001066000000010000200000007a64ce756e2113f730ad174b2346fe1f7ecc1e4b56f11a48c0efb4cd6fe9c782000000000e800000000200002000000094242f87984025e2c38a6f670c300ebb16740873f17c3311c68234ddbf341dfa2000000080d792f09e17664192e83455a3dc7502823c00d9be639d42c798528f19b8508340000000eb58e5254b0237362480d36f9bbe2c73af215eace4461ea6df46d7004f7871fa14822fc7c390893f237bd88ed1b75e6f1206d485fa1b14850c0b8e8a186d3a52 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104701e434eeda01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000ba0da011f8777da6983018c08949623dd5e1cc08592edcd510dbbb791875b754000000000e80000000020000200000004f88d42c285b1d3be29b03754f8d36daf1aa3e53a3a459500c810838b2080b9c2000000080292f7a7a927d6181c0bb7f25f1c18e466c93406dcd69511480c4bef4395d4d40000000571fb92df0dd4d5b19c986d47649bd10ffc23e377d6c1e7e1352a9d68e8bba46ecf375d2f23edf83b964987315999f6e4914a1789fd40a7457cd5690cbb6cd8c IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "6575712" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307e1e0635eeda01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000ae073d3051a33bfdd6f18ca0b75105e8dc55a9a0eac5ec16daae3a9a1576f92d000000000e8000000002000020000000b53b396beb30e7dbe7c40d2dc4528b15d3d4cbb26b959207b8ffa5c246d92ea12000000041628457aa0d48a8406e6b38b89a5980ff8dfa898a667b7c18d91195b1b402ce40000000c9cef8e5b95aedef70d905135033291701e9b185df2b82fa041adb255909f923b654e9e445625b5485d7755b62c09b48d4ba4bea3fd890c8a4d4bfc36a4c8080 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00690ff34eeda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125044" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9093671f35eeda01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bf49eb34eeda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125044" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202b2a2135eeda01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b10000000002000000000010660000000100002000000025c32dbe46cd0a1b5f0e587d110af92e173766464765018e3debdae5eb9faae7000000000e8000000002000020000000f4974ca70359b2b353f4e470f932b4b453a5376661dee442aec952bd308e4bc920000000dd04fd74d88fcffaad6924feabdceba56ade471a64bdf1e222bf73de63025618400000000ec62f24b996586100351b85879daaec05b941821de736c5ab2002b83dc66afb64b993e3ac79571bbf3a7f5488535a7cecb402cb991767967443b1345fba43a5 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000086ccd165a85c56bf0f1b6b55e10214adaa58d9a7404cd5b3a421192b21d4c62000000000e80000000020000200000005fc7d5e445ef5447239447dd299426b274214353ea761b11abce0a28c9a8dc1720000000c754e229d58c12b09e457379114c55ff2c1b138b4afc3e925730456eb47bf00d400000005cf5b3d543b845ee200bb56e385b40413e42de4a3da20115027026dbf5a3ae75e505255004e37069e7635f8db0feeda2174f3ee6684c2c5a52c70d2f09c5a1d7 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ae9bf234eeda01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff4e00000000000000d404000065020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000643192bd433029716f6308c4bd5c5f55008e413ce55619ecadea247b8586ae30000000000e800000000200002000000059e5637ca581913faa64c70af6183145f613bfb74d2e6600e5b46f6d753f91e72000000008e424ca3bba9e3408ec221c96cdc08ebf49373a3c282d60c42107ead7b12e7540000000612f76b1fdad4476c4c58bf22893739285b64cd36f3f63e4fb74b33fee7eeececfa017af0ee4a62dfb5335cd282f7eacd65ff1f6675ca9c454afa6a8c2700d18 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b1000000000200000000001066000000010000200000008adb6687622344132d2189d6acfb70f60d8a7fd37af494fad108cfa50fb6cea5000000000e8000000002000020000000bc2da22cc4290beef7acfa8477311930ca3588cbd5f0df65cd5994e4af2f218f2000000099e002e69bcbf7ba07594791c99ae8ce2971f68060e3f93815c8dc9ce18b1f5740000000319e659bf5721658eee56a6b0f789a9ff109120ca6c7c2a451ba8495a82e04bee8d313eb076768213e07c3905135ecdcc893cbb87a1314f9552d45f65f159c9b IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000ede2eb703057918f60368553490d3fc4b224dd5303fe1726c151e6082dec257c000000000e80000000020000200000003d2bbe2143cbe04b1ddc709ab546424c21b8c628ae260b1d791fe5669e7cbaf9200000005c4c8128604173a7d77d6a8987ceb992fed90817a4c15c29326734756907964d40000000d35a630f960ec529b48bcc938dc557d3682a44104cc76b782ffd3065b46cdee5f1cbb759dfa35431dcf864896e5816b117e41c9f1578f17c90dfb7e3dde277b6 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dec42435eeda01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000fbe049eed0b99c328d9e4fa10d37290492b2861840044d6ae08c8e1de18d9549000000000e8000000002000020000000f5e42374520edea80bf1810901f506d309be3709749d18384e683a1a8c63e769200000002a12e8034fce8f512bebe52c6b42d89b6ea30d73730622ba1a49c87385c60339400000004e633c6220a004669ba620fa6d44c24e56b3f87140d7c018eac0e3448b4e34e64fa94f887c26d0cc3150a50ebd2c9ee164a185d78ecb7ccad8ac1b160dd0b477 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b1000000000200000000001066000000010000200000001c70b8bfdc7d42ba8871cda1b9a023aef0b605a7085c0ee8534aee7c17b8d19c000000000e800000000200002000000064772993c897a20231670a6d7da1037b4dc0d21cf73f38006d4731760de70b48200000005fb09efc0310cde86012b7dd5d93055e73ba188574a17b7368b7fe0c5d9aa61d40000000cf7fabd5537e32acc14b708971797331ff80ea6f9f9237c7292bd1ea82436e4251fbc3fd4824e8c510d47f13981a75602125d15ba948ac6311978fb70816f8ca IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b10000000002000000000010660000000100002000000047fb7b523e44a32f4102b56c263da4911c98baba8ebe11c214f6a6c45304e003000000000e80000000020000200000005b29fe0842c343761a35b23798c1f1e85fb615620ce5b0322e003cd6f389730820000000863326ec3816d8816b84a3772657cee2ac1f22550a4e4ffc2cb1e1ba6031eb7240000000483a37b14697f3ab6693797c32de4b89c9c4024d1395b7144d6468a40cdc2f5fe25581d5ebd30a8bc6cd07dff7bfa6bfa972f6cd18300db7803a4310dec0e090 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 3572 IEXPLORE.EXE 3572 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 3456 IEXPLORE.EXE 3456 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 3456 IEXPLORE.EXE 3456 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 3832 IEXPLORE.EXE 3832 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 724 IEXPLORE.EXE 724 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 3832 IEXPLORE.EXE 3832 IEXPLORE.EXE 4044 IEXPLORE.EXE 4044 IEXPLORE.EXE 3100 IEXPLORE.EXE 3100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3392 wrote to memory of 4632 3392 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe 90 PID 3392 wrote to memory of 4632 3392 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe 90 PID 3392 wrote to memory of 4632 3392 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe 90 PID 3392 wrote to memory of 1528 3392 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe 91 PID 3392 wrote to memory of 1528 3392 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe 91 PID 3392 wrote to memory of 1528 3392 95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe 91 PID 1528 wrote to memory of 4044 1528 iexplore.exe 92 PID 1528 wrote to memory of 4044 1528 iexplore.exe 92 PID 4044 wrote to memory of 3572 4044 IEXPLORE.EXE 93 PID 4044 wrote to memory of 3572 4044 IEXPLORE.EXE 93 PID 4044 wrote to memory of 3572 4044 IEXPLORE.EXE 93 PID 4632 wrote to memory of 2200 4632 expllorer.exe 96 PID 4632 wrote to memory of 2200 4632 expllorer.exe 96 PID 4632 wrote to memory of 2200 4632 expllorer.exe 96 PID 4632 wrote to memory of 2228 4632 expllorer.exe 97 PID 4632 wrote to memory of 2228 4632 expllorer.exe 97 PID 4632 wrote to memory of 2228 4632 expllorer.exe 97 PID 2228 wrote to memory of 5104 2228 iexplore.exe 98 PID 2228 wrote to memory of 5104 2228 iexplore.exe 98 PID 4044 wrote to memory of 3456 4044 IEXPLORE.EXE 99 PID 4044 wrote to memory of 3456 4044 IEXPLORE.EXE 99 PID 4044 wrote to memory of 3456 4044 IEXPLORE.EXE 99 PID 2200 wrote to memory of 672 2200 expllorer.exe 101 PID 2200 wrote to memory of 672 2200 expllorer.exe 101 PID 2200 wrote to memory of 672 2200 expllorer.exe 101 PID 2200 wrote to memory of 4992 2200 expllorer.exe 102 PID 2200 wrote to memory of 4992 2200 expllorer.exe 102 PID 2200 wrote to memory of 4992 2200 expllorer.exe 102 PID 4992 wrote to memory of 2572 4992 iexplore.exe 103 PID 4992 wrote to memory of 2572 4992 iexplore.exe 103 PID 4044 wrote to memory of 2868 4044 IEXPLORE.EXE 104 PID 4044 wrote to memory of 2868 4044 IEXPLORE.EXE 104 PID 4044 wrote to memory of 2868 4044 IEXPLORE.EXE 104 PID 672 wrote to memory of 1912 672 expllorer.exe 106 PID 672 wrote to memory of 1912 672 expllorer.exe 106 PID 672 wrote to memory of 1912 672 expllorer.exe 106 PID 672 wrote to memory of 4296 672 expllorer.exe 107 PID 672 wrote to memory of 4296 672 expllorer.exe 107 PID 672 wrote to memory of 4296 672 expllorer.exe 107 PID 4296 wrote to memory of 4488 4296 iexplore.exe 108 PID 4296 wrote to memory of 4488 4296 iexplore.exe 108 PID 4044 wrote to memory of 1160 4044 IEXPLORE.EXE 109 PID 4044 wrote to memory of 1160 4044 IEXPLORE.EXE 109 PID 4044 wrote to memory of 1160 4044 IEXPLORE.EXE 109 PID 1912 wrote to memory of 3608 1912 expllorer.exe 111 PID 1912 wrote to memory of 3608 1912 expllorer.exe 111 PID 1912 wrote to memory of 3608 1912 expllorer.exe 111 PID 1912 wrote to memory of 3672 1912 expllorer.exe 112 PID 1912 wrote to memory of 3672 1912 expllorer.exe 112 PID 1912 wrote to memory of 3672 1912 expllorer.exe 112 PID 3672 wrote to memory of 3096 3672 iexplore.exe 113 PID 3672 wrote to memory of 3096 3672 iexplore.exe 113 PID 3608 wrote to memory of 544 3608 expllorer.exe 114 PID 3608 wrote to memory of 544 3608 expllorer.exe 114 PID 3608 wrote to memory of 544 3608 expllorer.exe 114 PID 3608 wrote to memory of 4256 3608 expllorer.exe 115 PID 3608 wrote to memory of 4256 3608 expllorer.exe 115 PID 3608 wrote to memory of 4256 3608 expllorer.exe 115 PID 4256 wrote to memory of 1216 4256 iexplore.exe 116 PID 4256 wrote to memory of 1216 4256 iexplore.exe 116 PID 4044 wrote to memory of 2292 4044 IEXPLORE.EXE 117 PID 4044 wrote to memory of 2292 4044 IEXPLORE.EXE 117 PID 4044 wrote to memory of 2292 4044 IEXPLORE.EXE 117 PID 544 wrote to memory of 2228 544 expllorer.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95b6aee2ae326e6b9e44f488ead509ac_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe6⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe7⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe8⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:2228 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe9⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe10⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:3008 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe11⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:3532 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe12⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe13⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe14⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe15⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe16⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4256 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe17⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:2960 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe18⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:2948 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe19⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe20⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe21⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:1008 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe22⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:5344 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe23⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5540 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe24⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5808 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe25⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5940 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe26⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:6084 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe27⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:5436 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe28⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:4148 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe29⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5580 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe30⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5900 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe31⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:6060 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe32⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5424 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe33⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5472 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe34⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6084 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe35⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5988 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe36⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5540 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe37⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5584 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe38⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:5152 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe39⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:5452 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe40⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5440 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe41⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:5520 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe42⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:3016 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe43⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5184 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe44⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:2704 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe45⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe46⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5696 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe47⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe48⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
PID:2312 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe49⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5728 -
C:\Windows\SysWOW64\drivers\expllorer.exeC:\Windows\system32\drivers\expllorer.exe50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4280
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg50⤵
- System Location Discovery: System Language Discovery
PID:180 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg51⤵PID:672
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg49⤵
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg50⤵
- Modifies Internet Explorer settings
PID:5696
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg48⤵
- System Location Discovery: System Language Discovery
PID:5256 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg49⤵PID:180
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg47⤵PID:180
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg48⤵PID:4140
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg46⤵
- System Location Discovery: System Language Discovery
PID:5728 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg47⤵PID:3464
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg45⤵
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg46⤵PID:3012
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg44⤵PID:3056
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg45⤵
- Modifies Internet Explorer settings
PID:5328
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg43⤵
- System Location Discovery: System Language Discovery
PID:5476 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg44⤵PID:2584
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg42⤵
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg43⤵PID:5704
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg41⤵
- System Location Discovery: System Language Discovery
PID:3632 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg42⤵PID:6076
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg40⤵PID:5736
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg41⤵PID:1268
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg39⤵
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg40⤵
- Modifies Internet Explorer settings
PID:5252
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg38⤵PID:2836
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg39⤵
- Modifies Internet Explorer settings
PID:5456
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg37⤵PID:5860
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg38⤵PID:2704
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg36⤵
- System Location Discovery: System Language Discovery
PID:5176 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg37⤵PID:4376
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg35⤵PID:5900
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg36⤵PID:5776
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg34⤵
- System Location Discovery: System Language Discovery
PID:6088 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg35⤵PID:1656
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg33⤵PID:5292
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg34⤵PID:5836
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg32⤵PID:5296
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg33⤵
- Modifies Internet Explorer settings
PID:5404
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg31⤵
- System Location Discovery: System Language Discovery
PID:6024 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg32⤵PID:5064
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg30⤵PID:5908
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg31⤵PID:5932
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg29⤵
- System Location Discovery: System Language Discovery
PID:5700 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg30⤵PID:5664
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg28⤵PID:5132
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg29⤵
- Modifies Internet Explorer settings
PID:5464
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg27⤵PID:5432
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg28⤵
- Modifies Internet Explorer settings
PID:5400
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg26⤵
- System Location Discovery: System Language Discovery
PID:6096 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg27⤵PID:6120
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg25⤵
- System Location Discovery: System Language Discovery
PID:5952 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg26⤵
- Modifies Internet Explorer settings
PID:5980
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg24⤵
- System Location Discovery: System Language Discovery
PID:5820 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg25⤵PID:5840
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg23⤵PID:5552
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg24⤵PID:5580
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg22⤵
- System Location Discovery: System Language Discovery
PID:5356 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg23⤵PID:5384
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg21⤵
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg22⤵PID:1656
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg20⤵
- System Location Discovery: System Language Discovery
PID:4308 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg21⤵
- Modifies Internet Explorer settings
PID:1656
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg19⤵PID:4540
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg20⤵
- Modifies Internet Explorer settings
PID:2980
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg18⤵
- System Location Discovery: System Language Discovery
PID:3908 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg19⤵PID:4308
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg17⤵
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg18⤵
- Modifies Internet Explorer settings
PID:2176
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg16⤵PID:4664
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg17⤵PID:4812
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg15⤵PID:3776
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg16⤵PID:1544
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg14⤵
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg15⤵
- Modifies Internet Explorer settings
PID:2704
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg13⤵PID:4860
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg14⤵PID:1528
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg12⤵PID:3772
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg13⤵PID:2980
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg11⤵
- System Location Discovery: System Language Discovery
PID:724 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg12⤵PID:864
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg10⤵
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg11⤵PID:796
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg9⤵
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg10⤵PID:448
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg8⤵
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg9⤵PID:1148
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg7⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg8⤵PID:1216
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg7⤵
- Modifies Internet Explorer settings
PID:3096
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg5⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg6⤵PID:4488
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg5⤵PID:2572
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg3⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg4⤵PID:5104
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://s69.flogao.com.br/2008/09/08/72/127010932.jpg3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3572
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:82950 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3456
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:82956 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:82962 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1160
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:82972 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:82982 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:82992 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3832
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83002 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:724
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83012 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83022 /prefetch:24⤵
- Suspicious use of SetWindowsHookEx
PID:3100
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83036 /prefetch:24⤵PID:552
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83050 /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5620
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83064 /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1364
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83078 /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5288
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83092 /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:5412
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:83110 /prefetch:24⤵PID:6132
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
4KB
MD5d65ec06f21c379c87040b83cc1abac6b
SHA1208d0a0bb775661758394be7e4afb18357e46c8b
SHA256a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f
SHA5128a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
11KB
MD59234071287e637f85d721463c488704c
SHA1cca09b1e0fba38ba29d3972ed8dcecefdef8c152
SHA25665cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649
SHA51287d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384
-
Filesize
2KB
MD52dc61eb461da1436f5d22bce51425660
SHA1e1b79bcab0f073868079d807faec669596dc46c1
SHA256acdeb4966289b6ce46ecc879531f85e9c6f94b718aab521d38e2e00f7f7f7993
SHA512a88becb4fbddc5afc55e4dc0135af714a3eec4a63810ae5a989f2cecb824a686165d3cedb8cbd8f35c7e5b9f4136c29dea32736aabb451fe8088b978b493ac6d
-
Filesize
748B
MD5c4f558c4c8b56858f15c09037cd6625a
SHA1ee497cc061d6a7a59bb66defea65f9a8145ba240
SHA25639e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781
SHA512d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44
-
Filesize
1KB
MD5dfeabde84792228093a5a270352395b6
SHA1e41258c9576721025926326f76063c2305586f76
SHA25677b138ab5d0a90ff04648c26addd5e414cc178165e3b54a4cb3739da0f58e075
SHA512e256f603e67335151bb709294749794e2e3085f4063c623461a0b3decbcca8e620807b707ec9bcbe36dcd7d639c55753da0495be85b4ae5fb6bfc52ab4b284fd
-
Filesize
67KB
MD595b6aee2ae326e6b9e44f488ead509ac
SHA11cd1989ffcc2483d308bf1b40456ef2e00061b09
SHA2569e4ef8952b6627b7b869feca6fe4cc5dddf9d5cf064724d6b8f2bd328d5324be
SHA5125e206ec1b0cae838b04a5f4d747ba8c615f02a933182d105293d167c2f6bfa9a4df99682f5c05f97ff47b24f17da7cef6bf17d56f62ff3528befd729693e59d1