Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe
-
Size
171KB
-
MD5
ad95d1d7aa0dd86d915cb3bfe13aff69
-
SHA1
da87234fb0a568f3c4cb956fcad614a4db3dda0f
-
SHA256
432cc2ae26082f2fc2d96c1a981ac5c2402191432124e0fe12a9d89cf75881f4
-
SHA512
ef93a4b89b756dc89b7f5cc3f12e5eda4a32625851d93822eef5e355ea7199cdce6aaf043e16e48dc8e4cbe96eda04f4ce6c01862bd239a8310d4978b14cbf33
-
SSDEEP
3072:kQ47gL3eTh4KvJ9Lbcra1BJPDgWrIH3E1SQYDeLHb/an3RzzanSyVmnkmc/GeI:kQ47g7eio1bcra1B5rxSFDQU3RzzfcY
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral2/memory/4300-11-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4300-35-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4300-62-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/1452-78-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/1452-118-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat -
Modifies firewall policy service 3 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" win23.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\win23.exe restart" win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\win23.exe restart" win23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} win23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\win23.exe restart" win23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\win23.exe restart" win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\win23.exe restart" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\win23.exe restart" win23.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} win23.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" win23.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" win23.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" win23.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" win23.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" win23.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation win23.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation win23.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation win23.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation win23.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1452 win23.exe -
Executes dropped EXE 10 IoCs
pid Process 1716 win23.exe 1452 win23.exe 4352 win23.exe 3776 win23.exe 2732 win23.exe 2960 win23.exe 1512 win23.exe 2772 win23.exe 3332 win23.exe 4392 win23.exe -
resource yara_rule behavioral2/memory/4300-3-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4300-5-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4300-8-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4300-9-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4300-11-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4300-16-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-14-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-15-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-13-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-17-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-21-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-23-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-24-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-25-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-29-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-30-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-31-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-32-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-33-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-35-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4300-36-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-47-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/4300-62-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/1452-69-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/1452-70-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/1452-71-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/1452-78-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/1452-81-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-75-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-74-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-72-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-77-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-80-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-82-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-91-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-89-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-88-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-93-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-92-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-94-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-95-0x00000000022C0000-0x000000000334E000-memory.dmp upx behavioral2/memory/1452-118-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/1452-119-0x00000000022C0000-0x000000000334E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" win23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" win23.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\win23.exe" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\win23.exe" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\win23.exe" win23.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\win23.exe" win23.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: win23.exe File opened (read-only) \??\E: win23.exe File opened (read-only) \??\E: win23.exe File opened (read-only) \??\E: win23.exe File opened (read-only) \??\E: ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe File opened (read-only) \??\E: win23.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 812 set thread context of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 set thread context of 0 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe PID 1716 set thread context of 1452 1716 win23.exe 101 PID 1716 set thread context of 0 1716 win23.exe PID 4352 set thread context of 3776 4352 win23.exe 114 PID 4352 set thread context of 0 4352 win23.exe PID 2732 set thread context of 2960 2732 win23.exe 213 PID 2732 set thread context of 0 2732 win23.exe PID 1512 set thread context of 2772 1512 win23.exe 136 PID 1512 set thread context of 0 1512 win23.exe PID 3332 set thread context of 4392 3332 win23.exe 189 PID 3332 set thread context of 0 3332 win23.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\InstallDir\win23.exe ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe File opened for modification C:\Windows\SYSTEM.INI ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\win23.exe ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win23.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 1452 win23.exe 1452 win23.exe 1452 win23.exe 1452 win23.exe 3776 win23.exe 3776 win23.exe 2960 win23.exe 2960 win23.exe 2772 win23.exe 2772 win23.exe 4392 win23.exe 4392 win23.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Token: SeDebugPrivilege 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 1716 win23.exe 4352 win23.exe 2732 win23.exe 1512 win23.exe 3332 win23.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 812 wrote to memory of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 wrote to memory of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 wrote to memory of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 wrote to memory of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 wrote to memory of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 wrote to memory of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 wrote to memory of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 wrote to memory of 4300 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 85 PID 812 wrote to memory of 0 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe PID 812 wrote to memory of 0 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe PID 812 wrote to memory of 0 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe PID 812 wrote to memory of 0 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe PID 812 wrote to memory of 0 812 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe PID 4300 wrote to memory of 788 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 8 PID 4300 wrote to memory of 792 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 9 PID 4300 wrote to memory of 336 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 13 PID 4300 wrote to memory of 2468 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 42 PID 4300 wrote to memory of 2488 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 43 PID 4300 wrote to memory of 2900 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 52 PID 4300 wrote to memory of 3488 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 56 PID 4300 wrote to memory of 3664 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 57 PID 4300 wrote to memory of 3852 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 58 PID 4300 wrote to memory of 3948 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 59 PID 4300 wrote to memory of 4012 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 60 PID 4300 wrote to memory of 408 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 61 PID 4300 wrote to memory of 3556 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 62 PID 4300 wrote to memory of 4292 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 64 PID 4300 wrote to memory of 3708 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 76 PID 4300 wrote to memory of 3944 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 81 PID 4300 wrote to memory of 2444 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 82 PID 4300 wrote to memory of 2544 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 84 PID 4300 wrote to memory of 1784 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 86 PID 4300 wrote to memory of 1784 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 86 PID 4300 wrote to memory of 1784 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 86 PID 4300 wrote to memory of 3960 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 89 PID 4300 wrote to memory of 3960 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 89 PID 4300 wrote to memory of 3960 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 89 PID 4300 wrote to memory of 4092 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 90 PID 4300 wrote to memory of 4092 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 90 PID 4300 wrote to memory of 4092 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 90 PID 4300 wrote to memory of 3324 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 91 PID 4300 wrote to memory of 3324 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 91 PID 4300 wrote to memory of 3324 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 91 PID 4300 wrote to memory of 208 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 94 PID 4300 wrote to memory of 208 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 94 PID 4300 wrote to memory of 208 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 94 PID 4300 wrote to memory of 1504 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 95 PID 4300 wrote to memory of 1504 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 95 PID 4300 wrote to memory of 788 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 8 PID 4300 wrote to memory of 792 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 9 PID 4300 wrote to memory of 336 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 13 PID 4300 wrote to memory of 2468 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 42 PID 4300 wrote to memory of 2488 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 43 PID 4300 wrote to memory of 2900 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 52 PID 4300 wrote to memory of 3488 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 56 PID 4300 wrote to memory of 3664 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 57 PID 4300 wrote to memory of 3852 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 58 PID 4300 wrote to memory of 3948 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 59 PID 4300 wrote to memory of 4012 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 60 PID 4300 wrote to memory of 408 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 61 PID 4300 wrote to memory of 3556 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 62 PID 4300 wrote to memory of 4292 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 64 PID 4300 wrote to memory of 3708 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 76 PID 4300 wrote to memory of 3944 4300 ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe 81 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win23.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:336
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2488
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2900
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad95d1d7aa0dd86d915cb3bfe13aff69_JaffaCakes118.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Checks computer location settings
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:4844
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"5⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3672
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4352 -
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"7⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:3776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1960
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"9⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3956
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"11⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1532
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3332 -
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"13⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:2084
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"14⤵PID:2664
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"15⤵PID:5020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:3868
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"16⤵PID:3984
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"17⤵PID:2124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:3732
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"18⤵PID:4300
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"19⤵PID:1296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:4352
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"20⤵PID:4356
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"21⤵PID:4692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"22⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"22⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"22⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"22⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"22⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"22⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"22⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"22⤵PID:1760
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"22⤵PID:3640
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"23⤵PID:2236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"24⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"24⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"24⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"24⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"24⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"24⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"24⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"24⤵PID:4396
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"24⤵PID:4984
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"25⤵PID:1436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"26⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"26⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"26⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"26⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"26⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"26⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"26⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"26⤵PID:1612
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"26⤵PID:1264
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"27⤵PID:2232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"28⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"28⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"28⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"28⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"28⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"28⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"28⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"28⤵PID:1480
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"28⤵PID:4432
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"29⤵PID:4944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"30⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"30⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"30⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"30⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"30⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"30⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"30⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"30⤵PID:4764
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"30⤵PID:4044
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"31⤵PID:1880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"32⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"32⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"32⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"32⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"32⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"32⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"32⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"32⤵PID:4340
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"32⤵PID:2928
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"33⤵PID:4828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"34⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"34⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"34⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"34⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"34⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"34⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"34⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"34⤵PID:2120
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"34⤵PID:1708
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"35⤵PID:464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"36⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"36⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"36⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"36⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"36⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"36⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"36⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"36⤵PID:2460
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"36⤵PID:2952
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"37⤵PID:212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"38⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"38⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"38⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"38⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"38⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"38⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"38⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"38⤵PID:4208
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"38⤵PID:4008
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"39⤵PID:3804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"40⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"40⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"40⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"40⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"40⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"40⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"40⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"40⤵PID:1432
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"40⤵PID:4584
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"41⤵PID:3684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"42⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"42⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"42⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"42⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"42⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"42⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"42⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"42⤵PID:5036
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"42⤵PID:3220
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"43⤵PID:5196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"44⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"44⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"44⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"44⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"44⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"44⤵PID:5512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"44⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"44⤵PID:5540
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"44⤵PID:5576
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"45⤵PID:5680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"46⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"46⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"46⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"46⤵PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"46⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"46⤵PID:5936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"46⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"46⤵PID:5964
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"46⤵PID:5988
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"47⤵PID:6076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"48⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"48⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"48⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"48⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"48⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"48⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"48⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"48⤵PID:5260
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"48⤵PID:3220
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"49⤵PID:436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"50⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"50⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"50⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"50⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"50⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"50⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"50⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"50⤵PID:5564
-
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"50⤵PID:5644
-
C:\Windows\InstallDir\win23.exe"C:\Windows\InstallDir\win23.exe"51⤵PID:5732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"52⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"52⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"52⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"52⤵PID:2920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3664
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3852
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3948
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4012
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:408
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3556
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4292
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3708
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:3944
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:2444
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider1⤵PID:2544
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2580
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b43e8c8fd8e3648a290097f4bca6a58b
SHA19c919be562a14a6bf66c934172040563dc1d8ac8
SHA256ed30ef88c6c97969557f4e0a88e12c6087365635e117380b75893c7513de9acb
SHA512a86c680eefd61b9fdcbf38d07d02901268957853910700280cb03eb6c107dc3a0fa1fcb6d7031e6e2a79ac331c70943fe7e8135b6d39d2be4cc0849374a3a2a3
-
Filesize
171KB
MD5ad95d1d7aa0dd86d915cb3bfe13aff69
SHA1da87234fb0a568f3c4cb956fcad614a4db3dda0f
SHA256432cc2ae26082f2fc2d96c1a981ac5c2402191432124e0fe12a9d89cf75881f4
SHA512ef93a4b89b756dc89b7f5cc3f12e5eda4a32625851d93822eef5e355ea7199cdce6aaf043e16e48dc8e4cbe96eda04f4ce6c01862bd239a8310d4978b14cbf33
-
Filesize
257B
MD55ebeaf51699d1fceee1c9e728cb74b08
SHA1e73e89b64055e257dcdf3c06aeddac1a112fd398
SHA25630a32ca1bc0670d04838396b1b45472a275868efcdb5a8daba2d786c999261a5
SHA51288fc23f54828b4f74e83f6d025e49eef5c2c7268cc56ebb8eade52e4a85fb344ace2c737e224df0a271d84c2386ff3cf7deab78cc173b88c6427f11fa7f97f46