Analysis
-
max time kernel
114s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 05:12
Behavioral task
behavioral1
Sample
c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe
Resource
win7-20240708-en
10 signatures
150 seconds
General
-
Target
c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe
-
Size
68KB
-
MD5
c259e839c3bf1643faad6755dbb4a45b
-
SHA1
75fd37e261d3c8d515a2744f40b5eadf9971b630
-
SHA256
0d5c5897275433b4daba75341d4d31f09c864704b24a285d61120b1f89fa5073
-
SHA512
d3e07764f1add49ba6a26c78e010e1ec2ce55e546b476ad88301f34fa5dc362769b755b80e3e7c7d3656495f7201a023074e1a61bad69e3957ae5e3ad39d0d28
-
SSDEEP
1536:CzX1z1RieG2bPWjjlAn+3hlG8aLIARvvoDNI6gDWgAee9YB/PvQ:CzX11IeG24C+3h/oIAR3MIVeOPvQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3600 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2724 EXPL0RER.EXE 496 EXPL0RER.EXE 2652 EXPL0RER.EXE 572 EXPL0RER.EXE 2228 EXPL0RER.EXE 1060 EXPL0RER.EXE 308 EXPL0RER.EXE 1860 EXPL0RER.EXE 1944 EXPL0RER.EXE 2960 EXPL0RER.EXE 1624 EXPL0RER.EXE 2216 EXPL0RER.EXE 1956 EXPL0RER.EXE 940 EXPL0RER.EXE 2012 EXPL0RER.EXE 2520 EXPL0RER.EXE 2432 EXPL0RER.EXE 868 EXPL0RER.EXE 2720 EXPL0RER.EXE 2824 EXPL0RER.EXE 2832 EXPL0RER.EXE 2588 EXPL0RER.EXE 1656 EXPL0RER.EXE 296 EXPL0RER.EXE 2188 EXPL0RER.EXE 2272 EXPL0RER.EXE 1976 EXPL0RER.EXE 1420 EXPL0RER.EXE 1792 EXPL0RER.EXE 1968 EXPL0RER.EXE 2412 EXPL0RER.EXE 2360 EXPL0RER.EXE 2232 EXPL0RER.EXE 1364 EXPL0RER.EXE 1728 EXPL0RER.EXE 568 EXPL0RER.EXE 2964 EXPL0RER.EXE 1804 EXPL0RER.EXE 2072 EXPL0RER.EXE 2612 EXPL0RER.EXE 2828 EXPL0RER.EXE 376 EXPL0RER.EXE 580 EXPL0RER.EXE 1832 EXPL0RER.EXE 2328 EXPL0RER.EXE 1760 EXPL0RER.EXE 3032 EXPL0RER.EXE 2756 EXPL0RER.EXE 1212 EXPL0RER.EXE 624 EXPL0RER.EXE 1752 EXPL0RER.EXE 1724 EXPL0RER.EXE 1540 EXPL0RER.EXE 2504 EXPL0RER.EXE 1592 EXPL0RER.EXE 2604 EXPL0RER.EXE 2624 EXPL0RER.EXE 1652 EXPL0RER.EXE 2420 EXPL0RER.EXE 1648 EXPL0RER.EXE 1768 EXPL0RER.EXE 2140 EXPL0RER.EXE 2480 EXPL0RER.EXE 2284 EXPL0RER.EXE -
Loads dropped DLL 64 IoCs
pid Process 2824 regsvr32.exe 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 2600 regsvr32.exe 2724 EXPL0RER.EXE 2724 EXPL0RER.EXE 2608 regsvr32.exe 496 EXPL0RER.EXE 496 EXPL0RER.EXE 1652 regsvr32.exe 2652 EXPL0RER.EXE 2652 EXPL0RER.EXE 3004 regsvr32.exe 572 EXPL0RER.EXE 572 EXPL0RER.EXE 2176 regsvr32.exe 2228 EXPL0RER.EXE 2228 EXPL0RER.EXE 2564 regsvr32.exe 1060 EXPL0RER.EXE 1060 EXPL0RER.EXE 2880 regsvr32.exe 308 EXPL0RER.EXE 308 EXPL0RER.EXE 1452 regsvr32.exe 1860 EXPL0RER.EXE 1860 EXPL0RER.EXE 2220 regsvr32.exe 1944 EXPL0RER.EXE 1944 EXPL0RER.EXE 2360 regsvr32.exe 2960 EXPL0RER.EXE 2960 EXPL0RER.EXE 624 regsvr32.exe 1624 EXPL0RER.EXE 1624 EXPL0RER.EXE 872 regsvr32.exe 2216 EXPL0RER.EXE 2216 EXPL0RER.EXE 1612 regsvr32.exe 1956 EXPL0RER.EXE 1956 EXPL0RER.EXE 1228 regsvr32.exe 940 EXPL0RER.EXE 940 EXPL0RER.EXE 2972 regsvr32.exe 2012 EXPL0RER.EXE 2012 EXPL0RER.EXE 2040 regsvr32.exe 2520 EXPL0RER.EXE 2520 EXPL0RER.EXE 1804 regsvr32.exe 2432 EXPL0RER.EXE 2432 EXPL0RER.EXE 2468 regsvr32.exe 868 EXPL0RER.EXE 868 EXPL0RER.EXE 2788 regsvr32.exe 2720 EXPL0RER.EXE 2720 EXPL0RER.EXE 2604 regsvr32.exe 2824 EXPL0RER.EXE 2824 EXPL0RER.EXE 2576 regsvr32.exe -
resource yara_rule behavioral1/memory/1508-12-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/files/0x00080000000164b1-5.dat upx behavioral1/memory/2724-30-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/496-45-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/496-56-0x0000000000340000-0x0000000000373000-memory.dmp upx behavioral1/memory/2652-60-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1508-76-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2724-96-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/496-112-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2652-131-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/308-129-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/572-152-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1860-151-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2228-164-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1060-177-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/308-186-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2960-185-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1624-198-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1860-210-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1956-226-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1944-225-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2960-234-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1624-247-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/940-246-0x00000000001B0000-0x00000000001E3000-memory.dmp upx behavioral1/memory/2216-264-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2520-263-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1956-271-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/940-284-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2012-296-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2824-313-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2520-308-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2432-321-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2588-339-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1656-349-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/868-347-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/296-360-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2720-359-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2824-373-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2832-384-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2588-390-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1656-404-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1976-403-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/296-412-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2188-424-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2272-437-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2272-449-0x0000000000220000-0x0000000000253000-memory.dmp upx behavioral1/memory/1976-450-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1420-464-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1792-477-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1968-501-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1728-514-0x0000000000440000-0x0000000000473000-memory.dmp upx behavioral1/memory/2412-513-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2360-527-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2232-528-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1804-545-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1364-543-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1728-552-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/568-567-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2964-581-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/1804-594-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral1/memory/2072-598-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 4556 2624 WerFault.exe 143 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2824 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2824 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2824 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2824 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2824 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2824 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2824 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 30 PID 1508 wrote to memory of 2724 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2724 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2724 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2724 1508 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 31 PID 2724 wrote to memory of 2600 2724 EXPL0RER.EXE 32 PID 2724 wrote to memory of 2600 2724 EXPL0RER.EXE 32 PID 2724 wrote to memory of 2600 2724 EXPL0RER.EXE 32 PID 2724 wrote to memory of 2600 2724 EXPL0RER.EXE 32 PID 2724 wrote to memory of 2600 2724 EXPL0RER.EXE 32 PID 2724 wrote to memory of 2600 2724 EXPL0RER.EXE 32 PID 2724 wrote to memory of 2600 2724 EXPL0RER.EXE 32 PID 2724 wrote to memory of 496 2724 EXPL0RER.EXE 33 PID 2724 wrote to memory of 496 2724 EXPL0RER.EXE 33 PID 2724 wrote to memory of 496 2724 EXPL0RER.EXE 33 PID 2724 wrote to memory of 496 2724 EXPL0RER.EXE 33 PID 496 wrote to memory of 2608 496 EXPL0RER.EXE 34 PID 496 wrote to memory of 2608 496 EXPL0RER.EXE 34 PID 496 wrote to memory of 2608 496 EXPL0RER.EXE 34 PID 496 wrote to memory of 2608 496 EXPL0RER.EXE 34 PID 496 wrote to memory of 2608 496 EXPL0RER.EXE 34 PID 496 wrote to memory of 2608 496 EXPL0RER.EXE 34 PID 496 wrote to memory of 2608 496 EXPL0RER.EXE 34 PID 496 wrote to memory of 2652 496 EXPL0RER.EXE 35 PID 496 wrote to memory of 2652 496 EXPL0RER.EXE 35 PID 496 wrote to memory of 2652 496 EXPL0RER.EXE 35 PID 496 wrote to memory of 2652 496 EXPL0RER.EXE 35 PID 2652 wrote to memory of 1652 2652 EXPL0RER.EXE 36 PID 2652 wrote to memory of 1652 2652 EXPL0RER.EXE 36 PID 2652 wrote to memory of 1652 2652 EXPL0RER.EXE 36 PID 2652 wrote to memory of 1652 2652 EXPL0RER.EXE 36 PID 2652 wrote to memory of 1652 2652 EXPL0RER.EXE 36 PID 2652 wrote to memory of 1652 2652 EXPL0RER.EXE 36 PID 2652 wrote to memory of 1652 2652 EXPL0RER.EXE 36 PID 2652 wrote to memory of 572 2652 EXPL0RER.EXE 37 PID 2652 wrote to memory of 572 2652 EXPL0RER.EXE 37 PID 2652 wrote to memory of 572 2652 EXPL0RER.EXE 37 PID 2652 wrote to memory of 572 2652 EXPL0RER.EXE 37 PID 572 wrote to memory of 3004 572 EXPL0RER.EXE 38 PID 572 wrote to memory of 3004 572 EXPL0RER.EXE 38 PID 572 wrote to memory of 3004 572 EXPL0RER.EXE 38 PID 572 wrote to memory of 3004 572 EXPL0RER.EXE 38 PID 572 wrote to memory of 3004 572 EXPL0RER.EXE 38 PID 572 wrote to memory of 3004 572 EXPL0RER.EXE 38 PID 572 wrote to memory of 3004 572 EXPL0RER.EXE 38 PID 572 wrote to memory of 2228 572 EXPL0RER.EXE 39 PID 572 wrote to memory of 2228 572 EXPL0RER.EXE 39 PID 572 wrote to memory of 2228 572 EXPL0RER.EXE 39 PID 572 wrote to memory of 2228 572 EXPL0RER.EXE 39 PID 2228 wrote to memory of 2176 2228 EXPL0RER.EXE 40 PID 2228 wrote to memory of 2176 2228 EXPL0RER.EXE 40 PID 2228 wrote to memory of 2176 2228 EXPL0RER.EXE 40 PID 2228 wrote to memory of 2176 2228 EXPL0RER.EXE 40 PID 2228 wrote to memory of 2176 2228 EXPL0RER.EXE 40 PID 2228 wrote to memory of 2176 2228 EXPL0RER.EXE 40 PID 2228 wrote to memory of 2176 2228 EXPL0RER.EXE 40 PID 2228 wrote to memory of 1060 2228 EXPL0RER.EXE 41 PID 2228 wrote to memory of 1060 2228 EXPL0RER.EXE 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL2⤵
- Loads dropped DLL
- Modifies registry class
PID:2824
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL3⤵
- Loads dropped DLL
PID:2600
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL4⤵
- Loads dropped DLL
PID:2608
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL5⤵
- Loads dropped DLL
PID:1652
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL7⤵
- Loads dropped DLL
PID:2176
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1060 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL8⤵
- Loads dropped DLL
PID:2564
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:308 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL9⤵
- Loads dropped DLL
PID:2880
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1860 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL10⤵
- Loads dropped DLL
PID:1452
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL11⤵
- Loads dropped DLL
PID:2220
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL12⤵
- Loads dropped DLL
PID:2360
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:624
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL14⤵
- Loads dropped DLL
PID:872
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL15⤵
- Loads dropped DLL
PID:1612
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL16⤵
- Loads dropped DLL
- Modifies registry class
PID:1228
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2012 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL17⤵
- Loads dropped DLL
PID:2972
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2520 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL18⤵
- Loads dropped DLL
PID:2040
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2432 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL19⤵
- Loads dropped DLL
PID:1804
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:868 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL20⤵
- Loads dropped DLL
PID:2468
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:2720 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL21⤵
- Loads dropped DLL
- Modifies registry class
PID:2788
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL22⤵
- Loads dropped DLL
PID:2604
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE22⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL23⤵
- Loads dropped DLL
PID:2576
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2588 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL24⤵
- Modifies registry class
PID:2056
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE24⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL25⤵PID:548
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:296 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL26⤵
- Modifies registry class
PID:3028
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE26⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL27⤵PID:2184
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2272 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL28⤵
- Modifies registry class
PID:2800
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE28⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL29⤵PID:2120
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE29⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL30⤵PID:2908
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE30⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL31⤵PID:1940
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE31⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL32⤵PID:2452
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2412 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL33⤵
- Modifies registry class
PID:1352
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE33⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL34⤵PID:624
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE34⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL35⤵PID:976
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE35⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL36⤵PID:1740
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL37⤵
- Modifies registry class
PID:896
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE37⤵
- Executes dropped EXE
PID:568 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL38⤵PID:1540
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE38⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL39⤵PID:2860
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1804 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL40⤵PID:2468
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE40⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL41⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE41⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL42⤵PID:2748
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL43⤵PID:2608
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:376 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL44⤵PID:548
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE44⤵
- Executes dropped EXE
PID:580 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL45⤵PID:2672
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE45⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL46⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL47⤵PID:2112
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE47⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL48⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL49⤵PID:2944
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE49⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL50⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE50⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL51⤵PID:2456
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:624 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL52⤵
- Modifies registry class
PID:328
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1752 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL53⤵PID:1324
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1724 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL54⤵PID:2348
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE54⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL55⤵PID:2396
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL56⤵
- Modifies registry class
PID:1588
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1592 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL57⤵PID:2896
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE57⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL58⤵PID:2772
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL59⤵PID:2336
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL60⤵PID:3004
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE60⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL61⤵PID:1644
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE61⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL62⤵PID:2884
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1768 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL63⤵PID:1452
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE63⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL64⤵PID:2220
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE64⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL65⤵PID:604
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2284 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL66⤵PID:1720
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE66⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:976 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL67⤵PID:1712
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE67⤵
- Drops file in System32 directory
PID:1324 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL68⤵PID:1488
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE68⤵PID:1200
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL69⤵PID:2684
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE69⤵
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL70⤵PID:2836
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE70⤵
- Drops file in Windows directory
PID:2788 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL71⤵
- Modifies registry class
PID:2740
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE71⤵PID:2632
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL72⤵PID:3060
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE72⤵PID:484
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL73⤵PID:2292
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE73⤵PID:3004
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL74⤵PID:1644
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE74⤵PID:2800
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL75⤵PID:2880
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE75⤵
- Drops file in Windows directory
PID:2676 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL76⤵
- Modifies registry class
PID:1980
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE76⤵PID:2944
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL77⤵
- Modifies registry class
PID:1352
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE77⤵PID:856
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL78⤵PID:1732
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE78⤵PID:1140
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL79⤵PID:1668
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE79⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1532 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL80⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE80⤵PID:2660
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL81⤵PID:2860
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE81⤵
- Drops file in Windows directory
PID:2396 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL82⤵
- Modifies registry class
PID:2836
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE82⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL83⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2812
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE83⤵PID:2772
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL84⤵
- Modifies registry class
PID:3012
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE84⤵PID:536
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL85⤵PID:2104
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE85⤵PID:2184
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL86⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE86⤵PID:1232
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL87⤵
- Modifies registry class
PID:2908
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE87⤵PID:1708
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL88⤵PID:792
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE88⤵PID:2220
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL89⤵PID:448
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE89⤵
- Drops file in System32 directory
PID:3068 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL90⤵
- Modifies registry class
PID:1740
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE90⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1716 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL91⤵PID:2348
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE91⤵PID:1488
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL92⤵PID:1672
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE92⤵PID:1688
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL93⤵PID:2580
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE93⤵
- Drops file in System32 directory
PID:2640 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL94⤵
- System Location Discovery: System Language Discovery
PID:548
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE94⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1492 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL95⤵PID:2768
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE95⤵
- Drops file in Windows directory
PID:1776 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL96⤵PID:2876
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE96⤵PID:3000
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL97⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2304
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE97⤵PID:1980
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL98⤵
- Modifies registry class
PID:1788
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE98⤵
- Drops file in System32 directory
PID:1216 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL99⤵PID:2280
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE99⤵PID:328
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL100⤵PID:3040
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE100⤵PID:2488
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL101⤵
- Modifies registry class
PID:2680
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE101⤵PID:2704
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL102⤵PID:2904
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE102⤵PID:2708
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL103⤵
- Modifies registry class
PID:2844
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE103⤵PID:3012
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL104⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1440
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE104⤵
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL105⤵PID:2876
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE105⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL106⤵PID:2352
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE106⤵PID:1880
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL107⤵PID:2436
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE107⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1720 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL108⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE108⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL109⤵
- Modifies registry class
PID:2804
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE109⤵PID:2680
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL110⤵PID:2760
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE110⤵PID:2812
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL111⤵PID:3020
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE111⤵PID:2668
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL112⤵PID:2672
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE112⤵PID:1952
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL113⤵PID:2884
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE113⤵PID:2876
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL114⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2464
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE114⤵
- Drops file in Windows directory
PID:948 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL115⤵PID:3048
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE115⤵
- Drops file in Windows directory
PID:1392 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL116⤵
- Modifies registry class
PID:2524
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE116⤵PID:1800
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL117⤵
- Modifies registry class
PID:2928
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE117⤵PID:2168
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL118⤵PID:2608
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE118⤵PID:1256
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL119⤵PID:1164
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE119⤵
- Drops file in Windows directory
PID:2236 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL120⤵
- Modifies registry class
PID:2564
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE120⤵PID:1128
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL121⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE121⤵PID:2224
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL122⤵PID:2436
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-