Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:06

General

  • Target

    ead1127bd0bb34c58c8307ee206970ec_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    ead1127bd0bb34c58c8307ee206970ec

  • SHA1

    4af8a23f8b0bbbd41fdb3aaba1d91ad689ed6373

  • SHA256

    c96843b605bccb7c7846ba2c156dea3154f6764a391e20ad5b3bc3ba43408909

  • SHA512

    cf963a2cfeac176ce5dbb91201c7fc3f1080fd8879e690608a498b08c904a0d2dab32b360a3f2369d66fba7e0bc62744c8dfc0613f7135c67d2cbcc212d47864

  • SSDEEP

    768:HtpegE1E1F3EIFtNagS0NvU1iwO8LJADzIdlNdZ55MaF3u8wQR/nge/JODS3:HtpluE11t4gSOvPwO8LnlJdVBjMS3

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 46 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead1127bd0bb34c58c8307ee206970ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ead1127bd0bb34c58c8307ee206970ec_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3312
    • C:\Users\Admin\AppData\Local\Temp\ead1127bd0bb34c58c8307ee206970ec_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ead1127bd0bb34c58c8307ee206970ec_JaffaCakes118.exe
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:3324
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4856
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:3724
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3724 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4500
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3636
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4136
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4136 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3520
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3596
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3544
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3544 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:5104
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3544 CREDAT:17414 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1728
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3544 CREDAT:82946 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4644
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3544 CREDAT:148482 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1052
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4092
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:4192
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4192 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:464
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          4⤵
            PID:3276
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1472
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
            4⤵
            • Modifies Internet Explorer settings
            PID:3952
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
            4⤵
            • Modifies Internet Explorer settings
            PID:524
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
            4⤵
            • Modifies Internet Explorer settings
            PID:1492
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:880
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
            4⤵
              PID:2792
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3088
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
              4⤵
                PID:4792
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
              3⤵
                PID:3584
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                  4⤵
                  • Modifies Internet Explorer settings
                  PID:3064
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4580
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                  4⤵
                    PID:1416
                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3932
                  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                    4⤵
                      PID:4740
                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                    "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:816
                    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                      4⤵
                        PID:2128
                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:796
                      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                        4⤵
                        • Modifies Internet Explorer settings
                        PID:4400
                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2944
                      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                        4⤵
                          PID:2688
                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4848
                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                          4⤵
                          • Modifies Internet Explorer settings
                          PID:2684
                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3772
                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                          4⤵
                          • Modifies Internet Explorer settings
                          PID:2660
                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:1908
                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                          4⤵
                            PID:384
                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2516
                          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                            4⤵
                            • Modifies Internet Explorer settings
                            PID:4008
                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:764
                          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                            4⤵
                              PID:2220
                          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                            "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3800
                            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                              "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                              4⤵
                                PID:2536
                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3804
                              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                4⤵
                                • Modifies Internet Explorer settings
                                PID:3776
                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3620
                              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                4⤵
                                  PID:4588
                              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3536
                                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                  4⤵
                                    PID:2484
                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:184
                                  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                    "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                    4⤵
                                    • Modifies Internet Explorer settings
                                    PID:4984
                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3572
                                  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                    "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                    4⤵
                                      PID:4592
                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                    "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1508
                                    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                      4⤵
                                        PID:4864
                                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1028
                                      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                        4⤵
                                          PID:1440
                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3220
                                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                          4⤵
                                            PID:116
                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4880
                                          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                            4⤵
                                            • Modifies Internet Explorer settings
                                            PID:4420
                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1776
                                          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                            4⤵
                                              PID:892
                                          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2912
                                            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                              "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                              4⤵
                                                PID:1140
                                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:560
                                              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                4⤵
                                                  PID:4516
                                              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4088
                                                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                  4⤵
                                                    PID:4448
                                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4048
                                                  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                    4⤵
                                                      PID:3596
                                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                    "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5016
                                                    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                      4⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:4628
                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4628 CREDAT:17410 /prefetch:2
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1500
                                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                    "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1488
                                                    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                      4⤵
                                                        PID:2928
                                                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2496
                                                      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                        4⤵
                                                          PID:2964
                                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1188
                                                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                          4⤵
                                                          • Modifies Internet Explorer settings
                                                          PID:764
                                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2256
                                                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                          4⤵
                                                          • Modifies Internet Explorer settings
                                                          PID:4416
                                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4432
                                                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                          4⤵
                                                            PID:2076
                                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4084
                                                          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                            4⤵
                                                              PID:4556
                                                          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                            "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1036
                                                            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                              "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                              4⤵
                                                                PID:4008
                                                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                              3⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4668
                                                              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                4⤵
                                                                  PID:3304
                                                              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3252
                                                                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                  4⤵
                                                                    PID:3064
                                                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                  3⤵
                                                                    PID:2416
                                                                    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                      4⤵
                                                                      • Modifies Internet Explorer settings
                                                                      PID:1840
                                                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                    "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2508
                                                                    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                      4⤵
                                                                        PID:5068
                                                                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4912
                                                                      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                        4⤵
                                                                          PID:3112
                                                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2336
                                                                        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                          4⤵
                                                                            PID:1472
                                                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3660
                                                                          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                            4⤵
                                                                            • Modifies Internet Explorer settings
                                                                            PID:3312
                                                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4212
                                                                          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                            4⤵
                                                                            • Modifies Internet Explorer settings
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:4592
                                                                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4592 CREDAT:17410 /prefetch:2
                                                                              5⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies Internet Explorer settings
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:5016
                                                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3100
                                                                          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                            4⤵
                                                                              PID:560
                                                                          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                            "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                            3⤵
                                                                              PID:4088
                                                                              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                                "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                                4⤵
                                                                                • Modifies Internet Explorer settings
                                                                                PID:1096
                                                                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:4308
                                                                              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                                "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                                4⤵
                                                                                • Modifies Internet Explorer settings
                                                                                PID:4412
                                                                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:4520
                                                                              • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                                                                                "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpv.onlinelivesearch.com/cpv.jsp?p=113890&aid=10036145&partnerMin=0.00&ron=on&ronMin=0.00&url=&context=&default=http://cpvback.ols30.tv
                                                                                4⤵
                                                                                  PID:1488
                                                                          • C:\Windows\System32\Conhost.exe
                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            1⤵
                                                                              PID:1188

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                              Filesize

                                                                              471B

                                                                              MD5

                                                                              33bac9325241193616461afd5a0deb0c

                                                                              SHA1

                                                                              e78ed72996568bc9616f4d6b20403749252b4859

                                                                              SHA256

                                                                              cb0b78d15b774b91ab6f6ef315a14f301b85b40122a72622818753212538f5b7

                                                                              SHA512

                                                                              3054cbd1551e36a747fc4c7086d3cc484530ea13d44279b4f5f92d462d91d7e3322bb240edeedd517751c00949a6264b50322464e446290726fde18ac4eb2e2e

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                              Filesize

                                                                              404B

                                                                              MD5

                                                                              6dcaa9a90055d735e937c3166f09df7a

                                                                              SHA1

                                                                              18604ee5267c54078593678533d7fa4035bedc47

                                                                              SHA256

                                                                              ec569fbba4eea4beb91d17c75a422d775b888e677dc3d2b7df707f17523832b1

                                                                              SHA512

                                                                              b6650f57ebc98d01f158e734c0e9fa0a0bb37f4c3dce7a797bf79669e019e4e16de451e621c91dad5be8dba854e21b93a250c1eb2c5faa2b925c3c23b47cbddb

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                              Filesize

                                                                              404B

                                                                              MD5

                                                                              ada39c274198ae9900feb9e192c3b1a3

                                                                              SHA1

                                                                              b13d61722e41d03774fa5e44a21b2f41107b959a

                                                                              SHA256

                                                                              8f8e0e5e134b23ea4b46f174176831c284256b32cbcb31bd7751b7691ab6728e

                                                                              SHA512

                                                                              0711a01df8a0902a7af959776a08d13f05b35a0633d9cc8530a797784961305cd1aab0cc250213346536ab400c0f6a68bae326794a85886f64b5d5143b812e19

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                              Filesize

                                                                              404B

                                                                              MD5

                                                                              2d1e56048e463e37d7f25445008916be

                                                                              SHA1

                                                                              fe948a1ea22ea883279189eb680eb264a89d2b39

                                                                              SHA256

                                                                              140e29f7b26ffca1d67cf8afc0ba16ddb9f2ad9f7c4e8c5bd55c89bc5485c07d

                                                                              SHA512

                                                                              402daf1f550ad020381c485aaacb164bfe83c9e10c39b7c79a24315a7c800f3cf4b9fd5ce105a24a716d192d3b7834a93098aee9c44130bb68a293b215ab5dbd

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B858DAC3-7655-11EF-9A03-DEB7298358C0}.dat

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              d494d5cbf8cc09da3f3f019c71696387

                                                                              SHA1

                                                                              bd8832d806432c5c86445f0534717bacbfcf18b3

                                                                              SHA256

                                                                              946a39e84ee84c367ad2ef0697b52d8ad4693ced3a8a3f08300bf228b8c77360

                                                                              SHA512

                                                                              076971ea56c3e477c2dcfa2400ae3e2ebff6875cef218b08a87b27ab8191d2959a867ba1257958a973753948cdd6bbe6ad7fee96b8efebf01dd44fbddb546fde

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B85901D3-7655-11EF-9A03-DEB7298358C0}.dat

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              988cc4be76472734b988d3ba55b28ed3

                                                                              SHA1

                                                                              bb4dfcab0b0ce24339351c47450dd441abc28f28

                                                                              SHA256

                                                                              ee79824067de003663cf4e0224e43ca605334261adf6e764208d4d9d32c0f32f

                                                                              SHA512

                                                                              dc3b2e012dcb23293a63beb53ad988437301d5357e2a19872ab81fbea3536627f17d8d2689c6e6aedc3f422e7267cf8b93e6801e8d6dbefc297e16d757ee48c2

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B85B3D07-7655-11EF-9A03-DEB7298358C0}.dat

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              ad94ba440c350a45b24f33aa7bd31359

                                                                              SHA1

                                                                              88366a0f7bd1abaaeb64e2fb0f6dd8fbe2f812c5

                                                                              SHA256

                                                                              555f1e8b5dcc496c5dff18100218e02e80ad48fddefe47bfecf751b34209d54a

                                                                              SHA512

                                                                              8f412bb97290c79271d4e9dee14b12bcb6a0e2891f19fe002496ff19ac0d3049332286d0fccf2679a4616ef681998f46956030287d777657a17b8562bae3e558

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B85B3D07-7655-11EF-9A03-DEB7298358C0}.dat

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              f10a27682d5a045a18ffaed3fe1b6251

                                                                              SHA1

                                                                              bcabee347be1b7293700bb24405002ea1daf4023

                                                                              SHA256

                                                                              fe186df99d1360a289e27acd3bed716043daecdcc3e72e7c0cef8fdc2e3d0745

                                                                              SHA512

                                                                              96879a4f17459f971d65b94a98d0b515f799df7e588037353e6f531bc6a8662b9b6b8e3283ed595d67ffc9ce6d3439c7e92d52848b45362de00492e031a2a086

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B85DC601-7655-11EF-9A03-DEB7298358C0}.dat

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              b375a0e54c2ec9877e2aaf4f031feefb

                                                                              SHA1

                                                                              8b9227dbe368635af252173e1e74f55ceec849f9

                                                                              SHA256

                                                                              dbbfe3af2ac2bdf7650964df00e6e6581fb180f074d12e05a1692d399af57176

                                                                              SHA512

                                                                              6e22b87f6231fa6ba0f534831bb405d0644f957a3dbee608efd398199075b8f5bb97f84efd29b5f6c5240a2d2bfb4a70d76875d27629b0ef618abf5604fd8f12

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BA609BF6-7655-11EF-9A03-DEB7298358C0}.dat

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              990d8a7e1d5cab288bc86bb6591d1b2c

                                                                              SHA1

                                                                              a2637e68c0b5cbfb76243cdf36567e7e0dc2829d

                                                                              SHA256

                                                                              bc45c76d88ad0244b7fbe66b63be1f4cdabe3784333f0c73d98b884512ad0c89

                                                                              SHA512

                                                                              9892dcc90cab4b074bde3a84d0602ea22669f8c321983662d3d6dc978e1a9438eb7c4444397e589f178a08399aff864048218073dcde573365d6c5b0d8658bc0

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

                                                                              Filesize

                                                                              15KB

                                                                              MD5

                                                                              1a545d0052b581fbb2ab4c52133846bc

                                                                              SHA1

                                                                              62f3266a9b9925cd6d98658b92adec673cbe3dd3

                                                                              SHA256

                                                                              557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                                                                              SHA512

                                                                              bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7TBBQW6D\NewErrorPageTemplate[2]

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              dfeabde84792228093a5a270352395b6

                                                                              SHA1

                                                                              e41258c9576721025926326f76063c2305586f76

                                                                              SHA256

                                                                              77b138ab5d0a90ff04648c26addd5e414cc178165e3b54a4cb3739da0f58e075

                                                                              SHA512

                                                                              e256f603e67335151bb709294749794e2e3085f4063c623461a0b3decbcca8e620807b707ec9bcbe36dcd7d639c55753da0495be85b4ae5fb6bfc52ab4b284fd

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7TBBQW6D\dnserror[2]

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              2dc61eb461da1436f5d22bce51425660

                                                                              SHA1

                                                                              e1b79bcab0f073868079d807faec669596dc46c1

                                                                              SHA256

                                                                              acdeb4966289b6ce46ecc879531f85e9c6f94b718aab521d38e2e00f7f7f7993

                                                                              SHA512

                                                                              a88becb4fbddc5afc55e4dc0135af714a3eec4a63810ae5a989f2cecb824a686165d3cedb8cbd8f35c7e5b9f4136c29dea32736aabb451fe8088b978b493ac6d

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7TBBQW6D\httpErrorPagesScripts[1]

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              9234071287e637f85d721463c488704c

                                                                              SHA1

                                                                              cca09b1e0fba38ba29d3972ed8dcecefdef8c152

                                                                              SHA256

                                                                              65cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649

                                                                              SHA512

                                                                              87d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7TBBQW6D\suggestions[1].en-US

                                                                              Filesize

                                                                              17KB

                                                                              MD5

                                                                              5a34cb996293fde2cb7a4ac89587393a

                                                                              SHA1

                                                                              3c96c993500690d1a77873cd62bc639b3a10653f

                                                                              SHA256

                                                                              c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                              SHA512

                                                                              e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FGWUB7UN\down[1]

                                                                              Filesize

                                                                              748B

                                                                              MD5

                                                                              c4f558c4c8b56858f15c09037cd6625a

                                                                              SHA1

                                                                              ee497cc061d6a7a59bb66defea65f9a8145ba240

                                                                              SHA256

                                                                              39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781

                                                                              SHA512

                                                                              d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LI43KEDR\errorPageStrings[1]

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              d65ec06f21c379c87040b83cc1abac6b

                                                                              SHA1

                                                                              208d0a0bb775661758394be7e4afb18357e46c8b

                                                                              SHA256

                                                                              a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f

                                                                              SHA512

                                                                              8a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e

                                                                            • memory/3312-0-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/3312-3-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/3324-4-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/3324-1-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/3324-5-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/3324-70-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB