Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 11:08
General
-
Target
Dispam.exe
-
Size
12.1MB
-
MD5
61aa26439a0e4cbd13d4f531e58eac20
-
SHA1
d685cd48ce1e81ae574a3467628341140354573e
-
SHA256
fa17bf64d800d3af2abbd959a45ece4d0e4c6c7831b9e148f41bca3aab424491
-
SHA512
d7eaf0e99464987490ee1d97bcc532b18673054aacc706a74f180a47be0faf29065491d3d61818ad0fc49cbce3b6a8fb2ec77b55e682ef7b5b3caaab3dd30506
-
SSDEEP
393216:zGV2CSQhZ2YsHFUK2Jn1+TtIiFQS2NXNsI8VbTToP:mYQZ2YwUlJn1QtIm28IKzo
Malware Config
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
http://master-x.com/index.php
http://kaspersky.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://kaspersky.ru/index.htm
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Extracted
xworm
20.ip.gl.ply.gg:55257
-
Install_directory
%AppData%
-
install_file
SolaraBootstrapper.exe
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exeDdcqedkk.exeGpfjma32.exeGgpbjkpl.exe240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exeAjhniccb.exeDdcqedkk.exeFdkpma32.exeGkgeoklj.exeAcgolj32.exeBqfoamfj.exeCffmfadl.exe240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exeDgejpd32.exeDfhjkabi.exeDpnbog32.exeGkdhjknm.exeAijnep32.exeAflaie32.exe240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exeBjodjb32.exeBgpgng32.exe240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exeAgbkmijg.exe240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exeCpihcgoa.exeDpckjfgg.exeDdcqedkk.exeAgiamhdo.exe240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exeGmeakf32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddcqedkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gpfjma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggpbjkpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajhniccb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddcqedkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fdkpma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkgeoklj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ggpbjkpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acgolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bqfoamfj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cffmfadl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdkpma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dgejpd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfhjkabi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajhniccb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpnbog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkdhjknm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aijnep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aflaie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acgolj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjodjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bgpgng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgejpd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddcqedkk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpfjma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aijnep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Agbkmijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgpgng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpihcgoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpckjfgg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddcqedkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Agiamhdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddcqedkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddcqedkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpnbog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gkgeoklj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agbkmijg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agiamhdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cpihcgoa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gkdhjknm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmeakf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gmeakf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe -
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2964-764-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1196-853-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon -
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/536-529-0x00000000000D0000-0x00000000000EA000-memory.dmp family_xworm -
Detects MyDoom family 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3360-414-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\BJ.exe family_gh0strat -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\ntos.exe," 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 5 IoCs
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\Downloads\240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe = "C:\\Users\\Admin\\Downloads\\240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe:*:enabled:@shell32.dll,-1" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exe -
Processes:
240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe -
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe -
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/3552-194-0x0000000000400000-0x0000000000425000-memory.dmp modiloader_stage2 behavioral1/memory/3552-333-0x0000000000400000-0x0000000000425000-memory.dmp modiloader_stage2 behavioral1/memory/3956-290-0x0000000000400000-0x0000000000425000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\wrdrive32.exe" 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
-
Drops file in Drivers directory 1 IoCs
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\system32\DRIVERS\ETC\HOSTS 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe -
Executes dropped EXE 57 IoCs
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exe240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exe240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exeAgbkmijg.exe240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exeAcgolj32.exe240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exeAgiamhdo.exeAflaie32.exeAjhniccb.exeow.exeAijnep32.exe240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exeservices.exeBqfoamfj.exeBgpgng32.exeBjodjb32.exe240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe240919-mznkesvgkneb2f9fbb40409da751e7bbcc02662de8_JaffaCakes118.exe240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exeCpihcgoa.exeCffmfadl.exe240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exeDpnbog32.exe240919-m6wvdawaqmXClient.exeDgejpd32.exeDfhjkabi.exeDpckjfgg.exe240919-m4hvqsvhpqeb31fc881712d0e371ae0277adb1ba75_JaffaCakes118.exe240919-m5kqqawakkeb32a2aea1dc041b5e168b9d81ce2d56_JaffaCakes118.exeDdcqedkk.exeDdcqedkk.exeDdcqedkk.exe240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exeFdkpma32.exeGkdhjknm.exe240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exeGkgeoklj.exeGmeakf32.exeGpfjma32.exeGgpbjkpl.exe240919-mr2r3svdnj7d7792651f54421faabced6b26a50cf2cbfcfe5c3205cbb27fb3d78137449ca8N.exe240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exepid process 4156 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe 4720 240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exe 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe 464 240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exe 3388 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe 2456 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe 3892 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe 3360 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe 3544 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe 3628 240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe 1632 Agbkmijg.exe 3552 240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe 4912 Acgolj32.exe 2540 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 1132 Agiamhdo.exe 3264 Aflaie32.exe 4252 Ajhniccb.exe 3956 ow.exe 2780 Aijnep32.exe 756 240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe 1500 services.exe 316 Bqfoamfj.exe 2656 Bgpgng32.exe 1808 Bjodjb32.exe 5064 240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe 324 240919-mznkesvgkneb2f9fbb40409da751e7bbcc02662de8_JaffaCakes118.exe 2200 240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe 1644 240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe 5052 240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe 2312 240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe 1148 Cpihcgoa.exe 384 Cffmfadl.exe 3772 240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe 2640 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe 3096 Dpnbog32.exe 536 240919-m6wvdawaqmXClient.exe 4408 Dgejpd32.exe 2192 Dfhjkabi.exe 3316 Dpckjfgg.exe 4040 240919-m4hvqsvhpqeb31fc881712d0e371ae0277adb1ba75_JaffaCakes118.exe 2028 240919-m5kqqawakkeb32a2aea1dc041b5e168b9d81ce2d56_JaffaCakes118.exe 2836 Ddcqedkk.exe 3640 Ddcqedkk.exe 684 Ddcqedkk.exe 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe 2496 240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exe 5060 Fdkpma32.exe 4756 Gkdhjknm.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe 3192 Gkgeoklj.exe 1056 Gmeakf32.exe 452 Gpfjma32.exe 2656 Ggpbjkpl.exe 1836 240919-mr2r3svdnj7d7792651f54421faabced6b26a50cf2cbfcfe5c3205cbb27fb3d78137449ca8N.exe 1484 240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe 3540 240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe -
Loads dropped DLL 30 IoCs
Processes:
Dispam.exeow.exe240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exepid process 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 4428 Dispam.exe 3956 ow.exe 3956 ow.exe 4156 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe 5052 240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe 5052 240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe 3628 240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/464-163-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/4636-167-0x00000000021C0000-0x00000000031E6000-memory.dmp upx behavioral1/memory/3360-182-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/4636-162-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1500-293-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/4040-511-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2496-616-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/4040-717-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2496-787-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1196-784-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2964-764-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1500-508-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/3360-414-0x0000000000500000-0x0000000000510000-memory.dmp upx C:\vpjdd.exe upx C:\Users\Admin\Downloads\240919-mxw4savarce12a64c0ebf24e1f63bb83600b9274c81bdad7ef7841d51289f4ff674ba2e1cdN.exe upx behavioral1/memory/1196-853-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/4572-816-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/464-328-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/4636-327-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/4636-237-0x00000000021C0000-0x00000000031E6000-memory.dmp upx behavioral1/memory/4636-186-0x00000000021C0000-0x00000000031E6000-memory.dmp upx C:\backup.exe upx C:\tnbttt.exe upx C:\Windows\BJ.exe upx -
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\wrdrive32.exe" 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Processes:
240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 305 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\Downloads\240919-mz8wcsvgmjeb300ae33ebd5d77c122e698c1e76962_JaffaCakes118.exe autoit_exe -
Drops file in System32 directory 64 IoCs
Processes:
240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exeAflaie32.exeBjodjb32.exe240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exeAjhniccb.exeDdcqedkk.exeAcgolj32.exe240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exeDpckjfgg.exe240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exeGgpbjkpl.exeDfhjkabi.exeAgbkmijg.exe240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exeAijnep32.exeDdcqedkk.exeBqfoamfj.exeCffmfadl.exeCpihcgoa.exeGpfjma32.exeAgiamhdo.exeGkgeoklj.exeDdcqedkk.exeDpnbog32.exeGkdhjknm.exeDgejpd32.exe240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exeFdkpma32.exedescription ioc process File created C:\Windows\SysWOW64\Agbkmijg.exe 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe File opened for modification C:\Windows\SysWOW64\Aflaie32.exe 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe File opened for modification C:\Windows\SysWOW64\Cceddf32.exe Aflaie32.exe File created C:\Windows\SysWOW64\Cpihcgoa.exe Bjodjb32.exe File opened for modification C:\Windows\SysWOW64\Agbkmijg.exe 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe File opened for modification C:\Windows\SysWOW64\Plgkkjnn.dll 240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe File opened for modification C:\Windows\SysWOW64\Bgpgng32.exe Ajhniccb.exe File created C:\Windows\SysWOW64\Cceddf32.exe Aflaie32.exe File created C:\Windows\SysWOW64\Gkdhjknm.exe Ddcqedkk.exe File opened for modification C:\Windows\SysWOW64\Aijnep32.exe Acgolj32.exe File created C:\Windows\SysWOW64\Ffpcchkn.dll Ajhniccb.exe File created C:\Windows\SysWOW64\Dgejpd32.exe 240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe File created C:\Windows\SysWOW64\Dpckjfgg.exe 240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe File opened for modification C:\Windows\SysWOW64\Ddcqedkk.exe 240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe File opened for modification C:\Windows\SysWOW64\Bfhnegmc.dll Dpckjfgg.exe File opened for modification C:\Windows\SysWOW64\Cpihcgoa.exe 240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe File opened for modification C:\Windows\SysWOW64\Dfhjkabi.exe 240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe File created C:\Windows\SysWOW64\Kamqij32.dll 240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe File opened for modification C:\Windows\SysWOW64\ntos.exe 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe File created C:\Windows\SysWOW64\Hjchaf32.exe Ggpbjkpl.exe File created C:\Windows\SysWOW64\Jajpge32.dll 240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe File created C:\Windows\SysWOW64\Ddcqedkk.exe Dfhjkabi.exe File opened for modification C:\Windows\SysWOW64\Agiamhdo.exe Agbkmijg.exe File created C:\Windows\SysWOW64\Ddcqedkk.exe Dpckjfgg.exe File created C:\Windows\SysWOW64\Plgkkjnn.dll 240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe File created C:\Windows\SysWOW64\Leckbi32.dll 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe File created C:\Windows\SysWOW64\Agiamhdo.exe Agbkmijg.exe File created C:\Windows\SysWOW64\Bjodjb32.exe Aijnep32.exe File created C:\Windows\SysWOW64\Idqionfg.dll Aijnep32.exe File opened for modification C:\Windows\SysWOW64\Fdkpma32.exe Ddcqedkk.exe File created C:\Windows\SysWOW64\Cpihcgoa.exe Bqfoamfj.exe File opened for modification C:\Windows\SysWOW64\Dpnbog32.exe Cffmfadl.exe File created C:\Windows\SysWOW64\ntos.exe 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe File created C:\Windows\SysWOW64\Ofdljpcg.dll Ddcqedkk.exe File created C:\Windows\SysWOW64\Cffmfadl.exe Cpihcgoa.exe File created C:\Windows\SysWOW64\Hjchaf32.exe Gpfjma32.exe File created C:\Windows\SysWOW64\Bqfoamfj.exe Agiamhdo.exe File opened for modification C:\Windows\SysWOW64\Bqfoamfj.exe Agiamhdo.exe File created C:\Windows\SysWOW64\Bfhnegmc.dll 240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe File created C:\Windows\SysWOW64\Henjapmn.dll Gkgeoklj.exe File created C:\Windows\SysWOW64\Djfkblnn.dll Gpfjma32.exe File opened for modification C:\Windows\SysWOW64\Hnfjbdmk.exe 240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe File opened for modification C:\Windows\SysWOW64\Gpfjma32.exe Gkgeoklj.exe File created C:\Windows\SysWOW64\Eiobodkp.dll 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe File opened for modification C:\Windows\SysWOW64\Akcfbeoc.dll Bjodjb32.exe File created C:\Windows\SysWOW64\Dpnbog32.exe Cffmfadl.exe File opened for modification C:\Windows\SysWOW64\Pqfkck32.dll Ddcqedkk.exe File created C:\Windows\SysWOW64\Lhkpkhab.dll Dpnbog32.exe File opened for modification C:\Windows\SysWOW64\Gmeakf32.exe Gkdhjknm.exe File created C:\Windows\SysWOW64\Fmliok32.dll 240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe File created C:\Windows\SysWOW64\Ddcqedkk.exe Dgejpd32.exe File created C:\Windows\SysWOW64\Ionqbdem.dll 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe File opened for modification C:\Windows\SysWOW64\Ajhniccb.exe 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe File created C:\Windows\SysWOW64\Cpihcgoa.exe 240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe File created C:\Windows\SysWOW64\Qknhhh32.dll Aflaie32.exe File created C:\Windows\SysWOW64\Dfhjkabi.exe 240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe File created C:\Windows\SysWOW64\Pqfkck32.dll Ddcqedkk.exe File created C:\Windows\SysWOW64\Pikcfnkf.dll Fdkpma32.exe File created C:\Windows\SysWOW64\Gmeakf32.exe Gkdhjknm.exe File created C:\Windows\SysWOW64\Ploija32.dll Agbkmijg.exe File opened for modification C:\Windows\SysWOW64\Bjodjb32.exe Aijnep32.exe File created C:\Windows\SysWOW64\Ddcqedkk.exe 240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe File opened for modification C:\Windows\SysWOW64\Fdkpma32.exe Ddcqedkk.exe File opened for modification C:\Windows\SysWOW64\Djfkblnn.dll Ggpbjkpl.exe -
Drops file in Windows directory 7 IoCs
Processes:
240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exedescription ioc process File created C:\Windows\services.exe 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe File opened for modification C:\Windows\java.exe 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe File created C:\Windows\java.exe 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe File created C:\Windows\wrdrive32.exe 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe File opened for modification C:\Windows\wrdrive32.exe 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe File opened for modification C:\WINDOWS\WRDRIVE32.EXE 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe File opened for modification C:\Windows\SYSTEM.INI 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3236 756 WerFault.exe 240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe 752 2028 WerFault.exe 1388 4040 WerFault.exe 15552 7052 WerFault.exe 240919-m2gjwsvgqreb30c8e30eea8cb153fe1d07b2beadb1_JaffaCakes118.exe 9800 5600 WerFault.exe 240919-mqrkqatgka7498547ab318ea7faa635f6f340eb70e2893b6ff3700535b99746e47761514f4N.exe 8588 6356 WerFault.exe 240919-mvlv2avepn2e7292627983196f07ae2cc0268196ebbf4b35784aca35dda9e282bf86f0ba11N.exe 7916 6332 WerFault.exe rxlllll.exe 15124 15964 WerFault.exe 240919-mqsg1stgkbeb2959ca0c5353aa319c46202a4892dd_JaffaCakes118.exe 13976 12648 WerFault.exe Diqnjl32.exe 10180 7140 5900 5256 240919-mvpa6athraeb2c4044f81e2d15fa0916364701e772_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 55 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exeDdcqedkk.exe240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exeFdkpma32.exe240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exeDpnbog32.exe240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exeDfhjkabi.exeGgpbjkpl.exe240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe240919-mr2r3svdnj7d7792651f54421faabced6b26a50cf2cbfcfe5c3205cbb27fb3d78137449ca8N.exe240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exeow.exeAjhniccb.exeBqfoamfj.exe240919-mznkesvgkneb2f9fbb40409da751e7bbcc02662de8_JaffaCakes118.exe240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exeAcgolj32.exeAflaie32.exeGmeakf32.exe240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exeservices.exe240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exeGkgeoklj.exeGpfjma32.exe240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exeDgejpd32.exe240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exeAgiamhdo.exeDpckjfgg.exeDdcqedkk.exe240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exeBgpgng32.exeDdcqedkk.exeGkdhjknm.exe240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exeAgbkmijg.exeAijnep32.exeCpihcgoa.exeCffmfadl.exeBjodjb32.exe240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe240919-m5kqqawakkeb32a2aea1dc041b5e168b9d81ce2d56_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddcqedkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdkpma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpnbog32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfhjkabi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ggpbjkpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mr2r3svdnj7d7792651f54421faabced6b26a50cf2cbfcfe5c3205cbb27fb3d78137449ca8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ajhniccb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bqfoamfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mznkesvgkneb2f9fbb40409da751e7bbcc02662de8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acgolj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aflaie32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gmeakf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkgeoklj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gpfjma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgejpd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agiamhdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpckjfgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddcqedkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgpgng32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddcqedkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gkdhjknm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agbkmijg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aijnep32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpihcgoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cffmfadl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjodjb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240919-m5kqqawakkeb32a2aea1dc041b5e168b9d81ce2d56_JaffaCakes118.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe -
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Bar = "http://www.google.com/ie" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://www.google.com/ie" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe -
Modifies registry class 64 IoCs
Processes:
Gpfjma32.exeBjodjb32.exe240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exeAgiamhdo.exeCpihcgoa.exeDpnbog32.exeDdcqedkk.exe240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exeDdcqedkk.exeAgbkmijg.exeBgpgng32.exe240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exeAijnep32.exeGkdhjknm.exeDdcqedkk.exeAcgolj32.exeAflaie32.exe240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exeDpckjfgg.exe240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exeDgejpd32.exeGmeakf32.exeCffmfadl.exeAjhniccb.exeBqfoamfj.exeDfhjkabi.exeFdkpma32.exe240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djfkblnn.dll" Gpfjma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akcfbeoc.dll" Bjodjb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfhnegmc.dll" 240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gilmfhhk.dll" Agiamhdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cpihcgoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhkpkhab.dll" Dpnbog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddcqedkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cpihcgoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddcqedkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Agbkmijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bgpgng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odnknc32.dll" Cpihcgoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Agbkmijg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Agiamhdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aijnep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqfkck32.dll" Ddcqedkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcjeeaho.dll" 240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gkdhjknm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddcqedkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acgolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qknhhh32.dll" Aflaie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kamqij32.dll" 240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfhnegmc.dll" Dpckjfgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dpckjfgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcpbgckp.dll" Dgejpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dpckjfgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gmeakf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plgkkjnn.dll" 240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aflaie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cffmfadl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gpfjma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ajhniccb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlcagc32.dll" Gmeakf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akcfbeoc.dll" Bqfoamfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bqfoamfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cffmfadl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfhnegmc.dll" Dfhjkabi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acgolj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dgejpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfhjkabi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gkdhjknm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oodneg32.dll" Gkdhjknm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gpfjma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjodjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pikcfnkf.dll" Fdkpma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aplpihjd.dll" 240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffpcchkn.dll" Ajhniccb.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exepid process 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 2640 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe 2640 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe 2640 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe 2640 240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exepid process 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4544 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Token: SeDebugPrivilege 4636 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exepid process 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exepid process 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe 4988 240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe 4380 240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exeow.exe240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe240919-mznkesvgkneb2f9fbb40409da751e7bbcc02662de8_JaffaCakes118.exe240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exepid process 464 240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exe 3956 ow.exe 5052 240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe 324 240919-mznkesvgkneb2f9fbb40409da751e7bbcc02662de8_JaffaCakes118.exe 2496 240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Dispam.exeDispam.exe240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exeAgbkmijg.exe240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exeAcgolj32.exedescription pid process target process PID 1228 wrote to memory of 4428 1228 Dispam.exe Dispam.exe PID 1228 wrote to memory of 4428 1228 Dispam.exe Dispam.exe PID 4428 wrote to memory of 2636 4428 Dispam.exe cmd.exe PID 4428 wrote to memory of 2636 4428 Dispam.exe cmd.exe PID 4428 wrote to memory of 4156 4428 Dispam.exe 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe PID 4428 wrote to memory of 4156 4428 Dispam.exe 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe PID 4428 wrote to memory of 4156 4428 Dispam.exe 240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe PID 4428 wrote to memory of 3388 4428 Dispam.exe 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe PID 4428 wrote to memory of 3388 4428 Dispam.exe 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe PID 4428 wrote to memory of 3388 4428 Dispam.exe 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe PID 4428 wrote to memory of 4720 4428 Dispam.exe 240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exe PID 4428 wrote to memory of 4720 4428 Dispam.exe 240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exe PID 4428 wrote to memory of 4720 4428 Dispam.exe 240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exe PID 4428 wrote to memory of 4636 4428 Dispam.exe 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe PID 4428 wrote to memory of 4636 4428 Dispam.exe 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe PID 4428 wrote to memory of 4636 4428 Dispam.exe 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe PID 4428 wrote to memory of 464 4428 Dispam.exe 240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exe PID 4428 wrote to memory of 464 4428 Dispam.exe 240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exe PID 4428 wrote to memory of 464 4428 Dispam.exe 240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exe PID 4428 wrote to memory of 2456 4428 Dispam.exe 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe PID 4428 wrote to memory of 2456 4428 Dispam.exe 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe PID 4428 wrote to memory of 2456 4428 Dispam.exe 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe PID 4428 wrote to memory of 3892 4428 Dispam.exe 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe PID 4428 wrote to memory of 3892 4428 Dispam.exe 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe PID 4428 wrote to memory of 3892 4428 Dispam.exe 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe PID 4428 wrote to memory of 3544 4428 Dispam.exe 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe PID 4428 wrote to memory of 3544 4428 Dispam.exe 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe PID 4428 wrote to memory of 3544 4428 Dispam.exe 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe PID 4428 wrote to memory of 3360 4428 Dispam.exe 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe PID 4428 wrote to memory of 3360 4428 Dispam.exe 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe PID 4428 wrote to memory of 3360 4428 Dispam.exe 240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe PID 4428 wrote to memory of 3628 4428 Dispam.exe 240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe PID 4428 wrote to memory of 3628 4428 Dispam.exe 240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe PID 4428 wrote to memory of 3628 4428 Dispam.exe 240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe PID 4428 wrote to memory of 3552 4428 Dispam.exe 240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe PID 4428 wrote to memory of 3552 4428 Dispam.exe 240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe PID 4428 wrote to memory of 3552 4428 Dispam.exe 240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe PID 2456 wrote to memory of 1632 2456 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe Agbkmijg.exe PID 2456 wrote to memory of 1632 2456 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe Agbkmijg.exe PID 2456 wrote to memory of 1632 2456 240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe Agbkmijg.exe PID 4428 wrote to memory of 4544 4428 Dispam.exe 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe PID 4428 wrote to memory of 4544 4428 Dispam.exe 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe PID 4428 wrote to memory of 4544 4428 Dispam.exe 240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe PID 3388 wrote to memory of 4912 3388 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe WerFault.exe PID 3388 wrote to memory of 4912 3388 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe WerFault.exe PID 3388 wrote to memory of 4912 3388 240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe WerFault.exe PID 4428 wrote to memory of 2540 4428 Dispam.exe 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe PID 4428 wrote to memory of 2540 4428 Dispam.exe 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe PID 4428 wrote to memory of 2540 4428 Dispam.exe 240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe PID 1632 wrote to memory of 1132 1632 Agbkmijg.exe Agiamhdo.exe PID 1632 wrote to memory of 1132 1632 Agbkmijg.exe Agiamhdo.exe PID 1632 wrote to memory of 1132 1632 Agbkmijg.exe Agiamhdo.exe PID 3544 wrote to memory of 3264 3544 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe Geoapenf.exe PID 3544 wrote to memory of 3264 3544 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe Geoapenf.exe PID 3544 wrote to memory of 3264 3544 240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe Geoapenf.exe PID 3892 wrote to memory of 4252 3892 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe Ajhniccb.exe PID 3892 wrote to memory of 4252 3892 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe Ajhniccb.exe PID 3892 wrote to memory of 4252 3892 240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe Ajhniccb.exe PID 3552 wrote to memory of 3956 3552 240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe ow.exe PID 3552 wrote to memory of 3956 3552 240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe ow.exe PID 3552 wrote to memory of 3956 3552 240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe ow.exe PID 4912 wrote to memory of 2780 4912 Acgolj32.exe Aijnep32.exe PID 4912 wrote to memory of 2780 4912 Acgolj32.exe Aijnep32.exe PID 4912 wrote to memory of 2780 4912 Acgolj32.exe Aijnep32.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exe240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:772
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1012
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2972
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3776
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3868
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4020
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4104
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4364
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3504
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:3976
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3100
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}2⤵PID:384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1072
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1160
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1400
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1504
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1652
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1788
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2008
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2136
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2672
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:1872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3368
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\Dispam.exe"C:\Users\Admin\AppData\Local\Temp\Dispam.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\Dispam.exe"C:\Users\Admin\AppData\Local\Temp\Dispam.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:2636
-
C:\Users\Admin\Downloads\240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m5l9jsvdpgeb32af97413f9686d4cfcdabe9d79cd6_JaffaCakes118.exe4⤵
- Modifies firewall policy service
- Windows security bypass
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:4156 -
C:\Users\Admin\Downloads\240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exeC:\Users\Admin\Downloads\240919-m2me5svcnfa027616ff2de7653729742acc471fd3e503dd1d2e0a579aa3237fe6db2297f95N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\Acgolj32.exeC:\Windows\system32\Acgolj32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\Aijnep32.exeC:\Windows\system32\Aijnep32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\Bjodjb32.exeC:\Windows\system32\Bjodjb32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1808 -
C:\Users\Admin\Downloads\240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exeC:\Users\Admin\Downloads\240919-m436nsvhrp9247059aa0fc08a7fadb608a15a053eca565fc8c68c1eb6004851e3af1395309N.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4720 -
C:\Users\Admin\Downloads\240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mz4awavglqeb2ff3df4f10e0e04db2c83bcdbe8b6c_JaffaCakes118.exe4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4636 -
C:\Users\Admin\Downloads\240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exeC:\Users\Admin\Downloads\240919-m46a2avhrq9ab03a0ccc538f631b3a2a48635996be8f5e58bc1b0762516876c424951d2c28N.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:464 -
C:\Users\Admin\Downloads\240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exeC:\Users\Admin\Downloads\240919-m1na2svcjhe36b2a9d50ec96e89c26ffa1046cc6cf934cda66d1b2aaa8cdcb4a9af86049a7N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Agbkmijg.exeC:\Windows\system32\Agbkmijg.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\Agiamhdo.exeC:\Windows\system32\Agiamhdo.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\Bqfoamfj.exeC:\Windows\system32\Bqfoamfj.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:316 -
C:\Users\Admin\Downloads\240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exeC:\Users\Admin\Downloads\240919-m7vnpsvenb07dbbe6f72fe6b69e4ac7683356e9696d84fda95df67c02c54c2d7a025a9649fN.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\Ajhniccb.exeC:\Windows\system32\Ajhniccb.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4252 -
C:\Windows\SysWOW64\Bgpgng32.exeC:\Windows\system32\Bgpgng32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2656 -
C:\Windows\SysWOW64\Cpihcgoa.exeC:\Windows\system32\Cpihcgoa.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\Cffmfadl.exeC:\Windows\system32\Cffmfadl.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:384 -
C:\Windows\SysWOW64\Dpnbog32.exeC:\Windows\system32\Dpnbog32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3096 -
C:\Users\Admin\Downloads\240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exeC:\Users\Admin\Downloads\240919-m6vmbawaqka3b193fe3ac23181b590110fcf893493a21b24ac2c3b7f3f6edac2e63e9a9adaN.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\Aflaie32.exeC:\Windows\system32\Aflaie32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3264 -
C:\Users\Admin\Downloads\240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mx3assvbjaeb2e450890e85af629d976fab13ac908_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3360 -
C:\Windows\services.exe"C:\Windows\services.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Users\Admin\Downloads\240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exeC:\Users\Admin\Downloads\240919-mxgzvsvflr55eeaa7c696c0c4055bee9b8b50c9be9110d6b9cdc60c953b34fb2f94ced4d21N.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Users\Admin\Downloads\240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m52z1avdraeb33251c5bb482504bd24560d5277695_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\RECYCLER\ow.exeC:\RECYCLER\ow.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3956 -
C:\Users\Admin\Downloads\240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-myfs7avfpmeb2ebc9fa1a51622698bed6431925cfd_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Users\Admin\Downloads\240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m1lgfsvcjfeb3044f2a5f2e8c23324dbf4f9e233f5_JaffaCakes118.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Users\Admin\Downloads\240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exeC:\Users\Admin\Downloads\240919-mzhdeavgkk09f25edbcf05a4f05b71fee2e46519fadbf758205c45e44f8aa39ae1fb73eb71N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 4565⤵
- Program crash
PID:3236 -
C:\Users\Admin\Downloads\240919-mznkesvgkneb2f9fbb40409da751e7bbcc02662de8_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mznkesvgkneb2f9fbb40409da751e7bbcc02662de8_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\jeoomo.exe"C:\Users\Admin\jeoomo.exe"5⤵PID:9412
-
C:\Users\Admin\Downloads\240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exeC:\Users\Admin\Downloads\240919-mxe59svapa82a375a35ed1f38ca92260a9b95a7b3df00929727d8b769279e2bb350548d8d6N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Dfhjkabi.exeC:\Windows\system32\Dfhjkabi.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\Ddcqedkk.exeC:\Windows\system32\Ddcqedkk.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:684 -
C:\Users\Admin\Downloads\240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exeC:\Users\Admin\Downloads\240919-msptxatgqg3a3132f4881aa536ad63897efe42f238d03c1bd68387b5946356bb361c639660N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1644 -
C:\Windows\SysWOW64\Dgejpd32.exeC:\Windows\system32\Dgejpd32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4408 -
C:\Users\Admin\Downloads\240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exeC:\Users\Admin\Downloads\240919-mxtzesvaqg348604381390074bd8580f4b5d71903a9888beb9eae32b3e898408f27767b989N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\Dpckjfgg.exeC:\Windows\system32\Dpckjfgg.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3316 -
C:\Windows\SysWOW64\Ddcqedkk.exeC:\Windows\system32\Ddcqedkk.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3640 -
C:\Windows\SysWOW64\Gkdhjknm.exeC:\Windows\system32\Gkdhjknm.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4756 -
C:\Windows\SysWOW64\Gmeakf32.exeC:\Windows\system32\Gmeakf32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Ggpbjkpl.exeC:\Windows\system32\Ggpbjkpl.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Users\Admin\Downloads\240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exeC:\Users\Admin\Downloads\240919-mzrl3svbpadf240d326eebf3cf60938b118c79f016de2ffeb6a29100ddd2e7bd7665a735d1N.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Users\Admin\Downloads\240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exeC:\Users\Admin\Downloads\240919-m4gmnsvdkh088f40fd4d988c7c9edebea5b9849c9ba4acb2f8cfa0bf537e87cb416c29c2b4N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5064 -
C:\Users\Admin\Downloads\240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mx8sksvbjfeb2e6b69d9b625161a4fe77194e111eb_JaffaCakes118.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Users\Admin\Downloads\240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exeC:\Users\Admin\Downloads\240919-m149kavgpk32da287a7c316837cac50bc2be1e6055fee8f665ad2d43fb1b7d85f73fa23bcaN.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3772 -
C:\Windows\SysWOW64\Ddcqedkk.exeC:\Windows\system32\Ddcqedkk.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\Fdkpma32.exeC:\Windows\system32\Fdkpma32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5060 -
C:\Windows\SysWOW64\Gkgeoklj.exeC:\Windows\system32\Gkgeoklj.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\SysWOW64\Gpfjma32.exeC:\Windows\system32\Gpfjma32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:452 -
C:\Users\Admin\Downloads\240919-m6wvdawaqmXClient.exeC:\Users\Admin\Downloads\240919-m6wvdawaqmXClient.exe4⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\Downloads\240919-m4hvqsvhpqeb31fc881712d0e371ae0277adb1ba75_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m4hvqsvhpqeb31fc881712d0e371ae0277adb1ba75_JaffaCakes118.exe4⤵
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 2605⤵
- Program crash
PID:1388 -
C:\Users\Admin\Downloads\240919-m5kqqawakkeb32a2aea1dc041b5e168b9d81ce2d56_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m5kqqawakkeb32a2aea1dc041b5e168b9d81ce2d56_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 2205⤵
- Program crash
PID:752 -
C:\Users\Admin\Downloads\240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mzzyfsvbpheb2feb00178c77549983904cc24790f9_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4988 -
C:\Users\Admin\Downloads\240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exeC:\Users\Admin\Downloads\240919-m49y8avdne9617e95c652610bde50692cdb5ca720e8718f4272ba57fabf09f50036f32b21dN.exe4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2496 -
C:\backup.exe\backup.exe \5⤵PID:5980
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\6⤵PID:6124
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\6⤵PID:7404
-
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\7⤵PID:9248
-
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\8⤵PID:15356
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\7⤵PID:12064
-
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\8⤵PID:14540
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\8⤵PID:2472
-
C:\Program Files (x86)\update.exe"C:\Program Files (x86)\update.exe" C:\Program Files (x86)\6⤵PID:16044
-
C:\Users\Admin\Downloads\240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m6yzqsvekgeb33bb67d7d88d48897e1e880ed0c6f5_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4380 -
C:\Users\Admin\Downloads\240919-mr2r3svdnj7d7792651f54421faabced6b26a50cf2cbfcfe5c3205cbb27fb3d78137449ca8N.exeC:\Users\Admin\Downloads\240919-mr2r3svdnj7d7792651f54421faabced6b26a50cf2cbfcfe5c3205cbb27fb3d78137449ca8N.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Users\Admin\Downloads\240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exeC:\Users\Admin\Downloads\240919-mzfvksvgjrc78ff5763b0a87f5bd2fafa7e2dff80c14cec784e77dd5a9fef6e49d14770d65N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\Hnfjbdmk.exeC:\Windows\system32\Hnfjbdmk.exe5⤵PID:2192
-
C:\Windows\SysWOW64\Ijogmdqm.exeC:\Windows\system32\Ijogmdqm.exe6⤵PID:5108
-
C:\Windows\SysWOW64\Idkbkl32.exeC:\Windows\system32\Idkbkl32.exe7⤵PID:1116
-
C:\Windows\SysWOW64\Iqbbpm32.exeC:\Windows\system32\Iqbbpm32.exe8⤵PID:1628
-
C:\Windows\SysWOW64\Jjmcnbdm.exeC:\Windows\system32\Jjmcnbdm.exe9⤵PID:3496
-
C:\Windows\SysWOW64\Jdgafjpn.exeC:\Windows\system32\Jdgafjpn.exe10⤵PID:5240
-
C:\Windows\SysWOW64\Kkfcndce.exeC:\Windows\system32\Kkfcndce.exe11⤵PID:5464
-
C:\Windows\SysWOW64\Licfngjd.exeC:\Windows\system32\Licfngjd.exe12⤵PID:5824
-
C:\Windows\SysWOW64\Mngegmbc.exeC:\Windows\system32\Mngegmbc.exe13⤵PID:4320
-
C:\Windows\SysWOW64\Nbnpcj32.exeC:\Windows\system32\Nbnpcj32.exe14⤵PID:6480
-
C:\Windows\SysWOW64\Oehlkc32.exeC:\Windows\system32\Oehlkc32.exe15⤵PID:2288
-
C:\Windows\SysWOW64\Qikgco32.exeC:\Windows\system32\Qikgco32.exe16⤵PID:6948
-
C:\Windows\SysWOW64\Dmalne32.exeC:\Windows\system32\Dmalne32.exe17⤵PID:8036
-
C:\Windows\SysWOW64\Mminhceb.exeC:\Windows\system32\Mminhceb.exe18⤵PID:8668
-
C:\Windows\SysWOW64\Adndoe32.exeC:\Windows\system32\Adndoe32.exe19⤵PID:9028
-
C:\Windows\SysWOW64\Flfkkhid.exeC:\Windows\system32\Flfkkhid.exe20⤵PID:15616
-
C:\Users\Admin\Downloads\240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exeC:\Users\Admin\Downloads\240919-mv2w9avajc4bf030a22794d997e78a9cf44ee1888c1b42612a2e708a584d428d2057810f58N.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3540 -
C:\Users\Admin\Downloads\240919-m1247svgnrb2cb1d673a6faee63c2fdda5d64440e8e3413de40b24955d501ac29ab4b371fdN.exeC:\Users\Admin\Downloads\240919-m1247svgnrb2cb1d673a6faee63c2fdda5d64440e8e3413de40b24955d501ac29ab4b371fdN.exe4⤵PID:2964
-
\??\c:\tnhbnb.exec:\tnhbnb.exe5⤵PID:1196
-
\??\c:\vpjdd.exec:\vpjdd.exe6⤵PID:2236
-
\??\c:\xrrlfxx.exec:\xrrlfxx.exe7⤵PID:5404
-
\??\c:\nhnhtt.exec:\nhnhtt.exe8⤵PID:5780
-
\??\c:\7nnhbh.exec:\7nnhbh.exe9⤵PID:7100
-
\??\c:\rffxxrr.exec:\rffxxrr.exe10⤵PID:7476
-
\??\c:\lfflrfx.exec:\lfflrfx.exe11⤵PID:8128
-
\??\c:\1rlxrlx.exec:\1rlxrlx.exe12⤵PID:8416
-
\??\c:\llffxfx.exec:\llffxfx.exe13⤵PID:8740
-
\??\c:\bhnhhn.exec:\bhnhhn.exe14⤵PID:8928
-
\??\c:\lrxrffx.exec:\lrxrffx.exe15⤵PID:15980
-
C:\Users\Admin\Downloads\240919-mvpa6athrb640087b8f62f6db453e51987d468ec03d4f75218f80a306bec8d5d8a17fdc6e6N.exeC:\Users\Admin\Downloads\240919-mvpa6athrb640087b8f62f6db453e51987d468ec03d4f75218f80a306bec8d5d8a17fdc6e6N.exe4⤵PID:1712
-
C:\Windows\SysWOW64\Jnfcia32.exeC:\Windows\system32\Jnfcia32.exe5⤵PID:5092
-
C:\Windows\SysWOW64\Jkjcbe32.exeC:\Windows\system32\Jkjcbe32.exe6⤵PID:1480
-
C:\Windows\SysWOW64\Jhndljll.exeC:\Windows\system32\Jhndljll.exe7⤵PID:1488
-
C:\Windows\SysWOW64\Jqlefl32.exeC:\Windows\system32\Jqlefl32.exe8⤵PID:5192
-
C:\Users\Admin\Downloads\240919-m1tstsvgnleb3063edd1a4844f219cd881bed4ec14_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m1tstsvgnleb3063edd1a4844f219cd881bed4ec14_JaffaCakes118.exe4⤵PID:1568
-
C:\Windows\SysWOW64\BamSettingsClient\Aokkdnic.exe"C:\Windows\SysWOW64\BamSettingsClient\Aokkdnic.exe"5⤵PID:6160
-
C:\Users\Admin\Downloads\240919-ms6sesthjebec9545e42b510d91c75de036217e253be6a31b18ff4f20537fc3b572e7079fdN.exeC:\Users\Admin\Downloads\240919-ms6sesthjebec9545e42b510d91c75de036217e253be6a31b18ff4f20537fc3b572e7079fdN.exe4⤵PID:996
-
C:\Users\Admin\Downloads\240919-mwqwdavfjp48a8a2ea034d68e57734e5f3de062d5a19d0112388ff86106bc76fbc96965f5aN.exeC:\Users\Admin\Downloads\240919-mwqwdavfjp48a8a2ea034d68e57734e5f3de062d5a19d0112388ff86106bc76fbc96965f5aN.exe4⤵PID:4572
-
C:\Users\Admin\Downloads\240919-mycfrsvbkdeb2e8bf7ffb5835ec54e9c558d3b5650_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mycfrsvbkdeb2e8bf7ffb5835ec54e9c558d3b5650_JaffaCakes118.exe4⤵PID:2596
-
C:\Users\Admin\Downloads\240919-mv6v7svajg37110f823f01a4b3daa2de6055dc9d71c6ce67408546f9833010c11ea2b3a063N.exeC:\Users\Admin\Downloads\240919-mv6v7svajg37110f823f01a4b3daa2de6055dc9d71c6ce67408546f9833010c11ea2b3a063N.exe4⤵PID:860
-
C:\Windows\SysWOW64\Jqiipljg.exeC:\Windows\system32\Jqiipljg.exe5⤵PID:2112
-
C:\Windows\SysWOW64\Jjdjoane.exeC:\Windows\system32\Jjdjoane.exe6⤵PID:5344
-
C:\Windows\SysWOW64\Lbngllob.exeC:\Windows\system32\Lbngllob.exe7⤵PID:5944
-
C:\Windows\SysWOW64\Mahnhhod.exeC:\Windows\system32\Mahnhhod.exe8⤵PID:5896
-
C:\Windows\SysWOW64\Nognnj32.exeC:\Windows\system32\Nognnj32.exe9⤵PID:6808
-
C:\Windows\SysWOW64\Oifeab32.exeC:\Windows\system32\Oifeab32.exe10⤵PID:6332
-
C:\Windows\SysWOW64\Qadoba32.exeC:\Windows\system32\Qadoba32.exe11⤵PID:6876
-
C:\Windows\SysWOW64\Bmabggdm.exeC:\Windows\system32\Bmabggdm.exe12⤵PID:7464
-
C:\Windows\SysWOW64\Ijqmhnko.exeC:\Windows\system32\Ijqmhnko.exe13⤵PID:8356
-
C:\Windows\SysWOW64\Qemhbj32.exeC:\Windows\system32\Qemhbj32.exe14⤵PID:12252
-
C:\Windows\SysWOW64\Anclbkbp.exeC:\Windows\system32\Anclbkbp.exe15⤵PID:8768
-
C:\Windows\SysWOW64\Fpbflg32.exeC:\Windows\system32\Fpbflg32.exe16⤵PID:14776
-
C:\Users\Admin\Downloads\240919-mxv7gsvfnl82b88f1eae485c71c341db4f7997e9377255df07ab4994708adae62c980bf4a9N.exeC:\Users\Admin\Downloads\240919-mxv7gsvfnl82b88f1eae485c71c341db4f7997e9377255df07ab4994708adae62c980bf4a9N.exe4⤵PID:3516
-
C:\Users\Admin\Downloads\240919-msapzstgpg7eef1be89d4943627b4141f792f7f637a91ed72024590d9034388d595aaf0db2N.exeC:\Users\Admin\Downloads\240919-msapzstgpg7eef1be89d4943627b4141f792f7f637a91ed72024590d9034388d595aaf0db2N.exe4⤵PID:3448
-
C:\Users\Admin\Downloads\240919-mr7nbsvdnleb2a62760e82605e02adf7ed5a2002c6_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mr7nbsvdnleb2a62760e82605e02adf7ed5a2002c6_JaffaCakes118.exe4⤵PID:5012
-
C:\Windows\SysWOW64\netprovisionsp\untfs.exe"C:\Windows\SysWOW64\netprovisionsp\untfs.exe"5⤵PID:5976
-
C:\Users\Admin\Downloads\240919-m4mhxsvdle0a43f563167a6d0ce622a2f52b8bc1d2e3d5cbf96128ad31278441dd543e8281N.exeC:\Users\Admin\Downloads\240919-m4mhxsvdle0a43f563167a6d0ce622a2f52b8bc1d2e3d5cbf96128ad31278441dd543e8281N.exe4⤵PID:5268
-
C:\Windows\SysWOW64\Kndojobi.exeC:\Windows\system32\Kndojobi.exe5⤵PID:5524
-
C:\Windows\SysWOW64\Ljdceo32.exeC:\Windows\system32\Ljdceo32.exe6⤵PID:5868
-
C:\Windows\SysWOW64\Milidebi.exeC:\Windows\system32\Milidebi.exe7⤵PID:1784
-
C:\Windows\SysWOW64\Nacmdf32.exeC:\Windows\system32\Nacmdf32.exe8⤵PID:6672
-
C:\Windows\SysWOW64\Ohghgodi.exeC:\Windows\system32\Ohghgodi.exe9⤵PID:5156
-
C:\Windows\SysWOW64\Olijhmgj.exeC:\Windows\system32\Olijhmgj.exe10⤵PID:7028
-
C:\Windows\SysWOW64\Alcfei32.exeC:\Windows\system32\Alcfei32.exe11⤵PID:8012
-
C:\Windows\SysWOW64\Idcepgmg.exeC:\Windows\system32\Idcepgmg.exe12⤵PID:8304
-
C:\Windows\SysWOW64\Anclbkbp.exeC:\Windows\system32\Anclbkbp.exe13⤵PID:8868
-
C:\Users\Admin\Downloads\240919-mrp4aavdlqeb29d2b0254eaf563f302376c76bb78e_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mrp4aavdlqeb29d2b0254eaf563f302376c76bb78e_JaffaCakes118.exe4⤵PID:5276
-
C:\Users\Admin\Downloads\240919-mrp4aavdlqeb29d2b0254eaf563f302376c76bb78e_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mrp4aavdlqeb29d2b0254eaf563f302376c76bb78e_JaffaCakes118.exe5⤵PID:2520
-
C:\Users\Admin\Downloads\240919-mw6ltsvflkeb2d9694231bacb7e13389724c054b5e_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mw6ltsvflkeb2d9694231bacb7e13389724c054b5e_JaffaCakes118.exe4⤵PID:5472
-
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe5⤵PID:5968
-
C:\Windows\services.exeC:\Windows\services.exe -XP6⤵PID:12184
-
C:\Users\Admin\Downloads\240919-mxw4savarce12a64c0ebf24e1f63bb83600b9274c81bdad7ef7841d51289f4ff674ba2e1cdN.exeC:\Users\Admin\Downloads\240919-mxw4savarce12a64c0ebf24e1f63bb83600b9274c81bdad7ef7841d51289f4ff674ba2e1cdN.exe4⤵PID:5484
-
C:\Windows\System\UcraRHv.exeC:\Windows\System\UcraRHv.exe5⤵PID:6436
-
C:\Windows\System\sohDJXj.exeC:\Windows\System\sohDJXj.exe5⤵PID:6456
-
C:\Windows\System\PPwFtsz.exeC:\Windows\System\PPwFtsz.exe5⤵PID:6508
-
C:\Windows\System\VqQvWUY.exeC:\Windows\System\VqQvWUY.exe5⤵PID:6524
-
C:\Windows\System\lcgIjDT.exeC:\Windows\System\lcgIjDT.exe5⤵PID:6544
-
C:\Windows\System\ykKSJwo.exeC:\Windows\System\ykKSJwo.exe5⤵PID:6560
-
C:\Windows\System\vjqskPO.exeC:\Windows\System\vjqskPO.exe5⤵PID:6576
-
C:\Windows\System\PvlPShN.exeC:\Windows\System\PvlPShN.exe5⤵PID:6592
-
C:\Windows\System\ZhwAXFF.exeC:\Windows\System\ZhwAXFF.exe5⤵PID:6628
-
C:\Windows\System\yeuEtrP.exeC:\Windows\System\yeuEtrP.exe5⤵PID:6696
-
C:\Windows\System\ZSSXXSs.exeC:\Windows\System\ZSSXXSs.exe5⤵PID:6784
-
C:\Windows\System\szMrLZt.exeC:\Windows\System\szMrLZt.exe5⤵PID:6828
-
C:\Windows\System\jOUfnyr.exeC:\Windows\System\jOUfnyr.exe5⤵PID:6844
-
C:\Windows\System\dGzkvqk.exeC:\Windows\System\dGzkvqk.exe5⤵PID:6888
-
C:\Windows\System\zdhpUTf.exeC:\Windows\System\zdhpUTf.exe5⤵PID:6904
-
C:\Windows\System\YQaKLiD.exeC:\Windows\System\YQaKLiD.exe5⤵PID:6924
-
C:\Windows\System\wEDnptX.exeC:\Windows\System\wEDnptX.exe5⤵PID:6940
-
C:\Windows\System\rIPpyiW.exeC:\Windows\System\rIPpyiW.exe5⤵PID:6956
-
C:\Windows\System\jBCVDRU.exeC:\Windows\System\jBCVDRU.exe5⤵PID:6972
-
C:\Windows\System\kgTVNcB.exeC:\Windows\System\kgTVNcB.exe5⤵PID:6988
-
C:\Windows\System\AzuaBVL.exeC:\Windows\System\AzuaBVL.exe5⤵PID:7004
-
C:\Windows\System\rzLNiER.exeC:\Windows\System\rzLNiER.exe5⤵PID:7020
-
C:\Windows\System\OwnOpik.exeC:\Windows\System\OwnOpik.exe5⤵PID:7040
-
C:\Windows\System\lvOOvZH.exeC:\Windows\System\lvOOvZH.exe5⤵PID:7068
-
C:\Windows\System\ZksJvfv.exeC:\Windows\System\ZksJvfv.exe5⤵PID:7088
-
C:\Windows\System\JeSRZns.exeC:\Windows\System\JeSRZns.exe5⤵PID:7124
-
C:\Windows\System\xdHTWyY.exeC:\Windows\System\xdHTWyY.exe5⤵PID:7140
-
C:\Windows\System\ZnuRySE.exeC:\Windows\System\ZnuRySE.exe5⤵PID:7160
-
C:\Windows\System\uylobCe.exeC:\Windows\System\uylobCe.exe5⤵PID:5608
-
C:\Windows\System\xyKfbFh.exeC:\Windows\System\xyKfbFh.exe5⤵PID:6068
-
C:\Windows\System\WwvZMGU.exeC:\Windows\System\WwvZMGU.exe5⤵PID:3224
-
C:\Windows\System\eqXGyFp.exeC:\Windows\System\eqXGyFp.exe5⤵PID:5708
-
C:\Windows\System\lWgpjth.exeC:\Windows\System\lWgpjth.exe5⤵PID:5392
-
C:\Windows\System\pmUwmlM.exeC:\Windows\System\pmUwmlM.exe5⤵PID:4836
-
C:\Windows\System\rcOrIhO.exeC:\Windows\System\rcOrIhO.exe5⤵PID:5460
-
C:\Windows\System\jDJnBmH.exeC:\Windows\System\jDJnBmH.exe5⤵PID:5508
-
C:\Windows\System\nVHejXa.exeC:\Windows\System\nVHejXa.exe5⤵PID:5908
-
C:\Windows\System\XChLvqF.exeC:\Windows\System\XChLvqF.exe5⤵PID:5932
-
C:\Windows\System\RVhhyHU.exeC:\Windows\System\RVhhyHU.exe5⤵PID:5536
-
C:\Windows\System\rxcJmPx.exeC:\Windows\System\rxcJmPx.exe5⤵PID:6896
-
C:\Windows\System\gdJlapy.exeC:\Windows\System\gdJlapy.exe5⤵PID:6916
-
C:\Windows\System\DSccjWZ.exeC:\Windows\System\DSccjWZ.exe5⤵PID:6192
-
C:\Windows\System\dlYyqnE.exeC:\Windows\System\dlYyqnE.exe5⤵PID:6208
-
C:\Windows\System\HVSiuUg.exeC:\Windows\System\HVSiuUg.exe5⤵PID:1196
-
C:\Windows\System\HyBvdhx.exeC:\Windows\System\HyBvdhx.exe5⤵PID:5148
-
C:\Windows\System\frpZxXk.exeC:\Windows\System\frpZxXk.exe5⤵PID:3876
-
C:\Windows\System\VvNDwmW.exeC:\Windows\System\VvNDwmW.exe5⤵PID:3512
-
C:\Windows\System\gkXrYud.exeC:\Windows\System\gkXrYud.exe5⤵PID:6248
-
C:\Windows\System\sHHyjTr.exeC:\Windows\System\sHHyjTr.exe5⤵PID:1584
-
C:\Windows\System\EeYFred.exeC:\Windows\System\EeYFred.exe5⤵PID:1368
-
C:\Windows\System\ocomtQd.exeC:\Windows\System\ocomtQd.exe5⤵PID:684
-
C:\Windows\System\BSoutTb.exeC:\Windows\System\BSoutTb.exe5⤵PID:5100
-
C:\Windows\System\ozPJxvu.exeC:\Windows\System\ozPJxvu.exe5⤵PID:6012
-
C:\Windows\System\OaNmwqB.exeC:\Windows\System\OaNmwqB.exe5⤵PID:6048
-
C:\Windows\System\PuZdndU.exeC:\Windows\System\PuZdndU.exe5⤵PID:5296
-
C:\Windows\System\ghUqowM.exeC:\Windows\System\ghUqowM.exe5⤵PID:6444
-
C:\Windows\System\SJOmAgc.exeC:\Windows\System\SJOmAgc.exe5⤵PID:4112
-
C:\Windows\System\hrVgjjR.exeC:\Windows\System\hrVgjjR.exe5⤵PID:5648
-
C:\Windows\System\TBFVNco.exeC:\Windows\System\TBFVNco.exe5⤵PID:5184
-
C:\Windows\System\xWEZfvk.exeC:\Windows\System\xWEZfvk.exe5⤵PID:6792
-
C:\Windows\System\ZmUjaOq.exeC:\Windows\System\ZmUjaOq.exe5⤵PID:6132
-
C:\Windows\System\maTfSVb.exeC:\Windows\System\maTfSVb.exe5⤵PID:6820
-
C:\Windows\System\WbdODTF.exeC:\Windows\System\WbdODTF.exe5⤵PID:6840
-
C:\Windows\System\ZYUSEHj.exeC:\Windows\System\ZYUSEHj.exe5⤵PID:6200
-
C:\Windows\System\oSoNeix.exeC:\Windows\System\oSoNeix.exe5⤵PID:2812
-
C:\Windows\System\CzsauXN.exeC:\Windows\System\CzsauXN.exe5⤵PID:2764
-
C:\Windows\System\hYqibVQ.exeC:\Windows\System\hYqibVQ.exe5⤵PID:6428
-
C:\Windows\System\TBysMSX.exeC:\Windows\System\TBysMSX.exe5⤵PID:6472
-
C:\Windows\System\bpOlMwj.exeC:\Windows\System\bpOlMwj.exe5⤵PID:6520
-
C:\Windows\System\WeaSqZj.exeC:\Windows\System\WeaSqZj.exe5⤵PID:6552
-
C:\Windows\System\zRpqWMi.exeC:\Windows\System\zRpqWMi.exe5⤵PID:6600
-
C:\Windows\System\wqbeHbm.exeC:\Windows\System\wqbeHbm.exe5⤵PID:6680
-
C:\Windows\System\OABQbwN.exeC:\Windows\System\OABQbwN.exe5⤵PID:6708
-
C:\Windows\System\XhsYhcQ.exeC:\Windows\System\XhsYhcQ.exe5⤵PID:6756
-
C:\Windows\System\BBGyoBS.exeC:\Windows\System\BBGyoBS.exe5⤵PID:5940
-
C:\Windows\System\DIxucUf.exeC:\Windows\System\DIxucUf.exe5⤵PID:6920
-
C:\Windows\System\aMrdibr.exeC:\Windows\System\aMrdibr.exe5⤵PID:4560
-
C:\Windows\System\NkidOTS.exeC:\Windows\System\NkidOTS.exe5⤵PID:2836
-
C:\Windows\System\XtlbjeY.exeC:\Windows\System\XtlbjeY.exe5⤵PID:6516
-
C:\Windows\System\hPRBeBU.exeC:\Windows\System\hPRBeBU.exe5⤵PID:3916
-
C:\Windows\System\vyQsEqC.exeC:\Windows\System\vyQsEqC.exe5⤵PID:6228
-
C:\Windows\System\PKIcSPR.exeC:\Windows\System\PKIcSPR.exe5⤵PID:5928
-
C:\Windows\System\AnQyfsv.exeC:\Windows\System\AnQyfsv.exe5⤵PID:1664
-
C:\Windows\System\PAWKrHg.exeC:\Windows\System\PAWKrHg.exe5⤵PID:3364
-
C:\Windows\System\CqVhRIy.exeC:\Windows\System\CqVhRIy.exe5⤵PID:6256
-
C:\Windows\System\OkPzFQT.exeC:\Windows\System\OkPzFQT.exe5⤵PID:7184
-
C:\Windows\System\veOPmMD.exeC:\Windows\System\veOPmMD.exe5⤵PID:7208
-
C:\Windows\System\sNygAHI.exeC:\Windows\System\sNygAHI.exe5⤵PID:7260
-
C:\Windows\System\PLJIhOl.exeC:\Windows\System\PLJIhOl.exe5⤵PID:7568
-
C:\Windows\System\ZKvwepZ.exeC:\Windows\System\ZKvwepZ.exe5⤵PID:7588
-
C:\Windows\System\jBeeYTM.exeC:\Windows\System\jBeeYTM.exe5⤵PID:7612
-
C:\Windows\System\scKvRqR.exeC:\Windows\System\scKvRqR.exe5⤵PID:7632
-
C:\Windows\System\CnClGfP.exeC:\Windows\System\CnClGfP.exe5⤵PID:7656
-
C:\Windows\System\lsZgsaF.exeC:\Windows\System\lsZgsaF.exe5⤵PID:7672
-
C:\Windows\System\lnyRYRf.exeC:\Windows\System\lnyRYRf.exe5⤵PID:7688
-
C:\Windows\System\vbJDzjA.exeC:\Windows\System\vbJDzjA.exe5⤵PID:7704
-
C:\Windows\System\BkyOJEk.exeC:\Windows\System\BkyOJEk.exe5⤵PID:7720
-
C:\Windows\System\QOFHdfF.exeC:\Windows\System\QOFHdfF.exe5⤵PID:7736
-
C:\Windows\System\ueWbYkt.exeC:\Windows\System\ueWbYkt.exe5⤵PID:7752
-
C:\Windows\System\ZSwFokh.exeC:\Windows\System\ZSwFokh.exe5⤵PID:7768
-
C:\Windows\System\QNFxLyy.exeC:\Windows\System\QNFxLyy.exe5⤵PID:7788
-
C:\Windows\System\jIKyyET.exeC:\Windows\System\jIKyyET.exe5⤵PID:8064
-
C:\Windows\System\DFeHubE.exeC:\Windows\System\DFeHubE.exe5⤵PID:8080
-
C:\Windows\System\cVQLxfc.exeC:\Windows\System\cVQLxfc.exe5⤵PID:8096
-
C:\Windows\System\TtkBJua.exeC:\Windows\System\TtkBJua.exe5⤵PID:6028
-
C:\Windows\System\bIitfHi.exeC:\Windows\System\bIitfHi.exe5⤵PID:5176
-
C:\Windows\System\keQGvmT.exeC:\Windows\System\keQGvmT.exe5⤵PID:5136
-
C:\Windows\System\ActiSSt.exeC:\Windows\System\ActiSSt.exe5⤵PID:6384
-
C:\Windows\System\zsiEmQp.exeC:\Windows\System\zsiEmQp.exe5⤵PID:4896
-
C:\Windows\System\RzOnnLV.exeC:\Windows\System\RzOnnLV.exe5⤵PID:7356
-
C:\Windows\System\lvyTQXt.exeC:\Windows\System\lvyTQXt.exe5⤵PID:7288
-
C:\Windows\System\UWUfzoG.exeC:\Windows\System\UWUfzoG.exe5⤵PID:7304
-
C:\Windows\System\LUMtbuw.exeC:\Windows\System\LUMtbuw.exe5⤵PID:7744
-
C:\Windows\System\FJbeuMW.exeC:\Windows\System\FJbeuMW.exe5⤵PID:7348
-
C:\Windows\System\rrLfKdb.exeC:\Windows\System\rrLfKdb.exe5⤵PID:664
-
C:\Windows\System\NmQhkPA.exeC:\Windows\System\NmQhkPA.exe5⤵PID:6496
-
C:\Windows\System\mZZRJCi.exeC:\Windows\System\mZZRJCi.exe5⤵PID:2720
-
C:\Windows\System\JzJsIPk.exeC:\Windows\System\JzJsIPk.exe5⤵PID:4236
-
C:\Windows\System\FFfrmiP.exeC:\Windows\System\FFfrmiP.exe5⤵PID:3040
-
C:\Windows\System\YIdwzkD.exeC:\Windows\System\YIdwzkD.exe5⤵PID:7192
-
C:\Windows\System\xKGeCyX.exeC:\Windows\System\xKGeCyX.exe5⤵PID:7256
-
C:\Windows\System\bSJVMxX.exeC:\Windows\System\bSJVMxX.exe5⤵PID:6640
-
C:\Windows\System\kvEVwFM.exeC:\Windows\System\kvEVwFM.exe5⤵PID:7644
-
C:\Windows\System\GhAohdI.exeC:\Windows\System\GhAohdI.exe5⤵PID:7684
-
C:\Windows\System\ycGfzhi.exeC:\Windows\System\ycGfzhi.exe5⤵PID:7716
-
C:\Windows\System\QOokyBP.exeC:\Windows\System\QOokyBP.exe5⤵PID:1188
-
C:\Windows\System\tmVBEPN.exeC:\Windows\System\tmVBEPN.exe5⤵PID:6868
-
C:\Windows\System\RYrENkf.exeC:\Windows\System\RYrENkf.exe5⤵PID:8612
-
C:\Windows\System\NgjgVKt.exeC:\Windows\System\NgjgVKt.exe5⤵PID:8628
-
C:\Windows\System\iLiRGTY.exeC:\Windows\System\iLiRGTY.exe5⤵PID:8644
-
C:\Windows\System\ZWrOpaW.exeC:\Windows\System\ZWrOpaW.exe5⤵PID:8660
-
C:\Windows\System\hksYFwK.exeC:\Windows\System\hksYFwK.exe5⤵PID:8676
-
C:\Windows\System\XfflRrM.exeC:\Windows\System\XfflRrM.exe5⤵PID:8692
-
C:\Windows\System\uEMMOgj.exeC:\Windows\System\uEMMOgj.exe5⤵PID:8708
-
C:\Windows\System\MqtlCze.exeC:\Windows\System\MqtlCze.exe5⤵PID:8728
-
C:\Windows\System\bPQEQJI.exeC:\Windows\System\bPQEQJI.exe5⤵PID:8744
-
C:\Windows\System\QmTBhws.exeC:\Windows\System\QmTBhws.exe5⤵PID:8760
-
C:\Windows\System\qyRedRN.exeC:\Windows\System\qyRedRN.exe5⤵PID:8776
-
C:\Windows\System\blBbpYC.exeC:\Windows\System\blBbpYC.exe5⤵PID:8792
-
C:\Windows\System\ipyuLpU.exeC:\Windows\System\ipyuLpU.exe5⤵PID:8808
-
C:\Windows\System\jbJJFch.exeC:\Windows\System\jbJJFch.exe5⤵PID:8824
-
C:\Windows\System\ZtWzLpW.exeC:\Windows\System\ZtWzLpW.exe5⤵PID:8840
-
C:\Windows\System\zQSezsg.exeC:\Windows\System\zQSezsg.exe5⤵PID:8856
-
C:\Windows\System\kkWjoXV.exeC:\Windows\System\kkWjoXV.exe5⤵PID:8872
-
C:\Windows\System\nShRdag.exeC:\Windows\System\nShRdag.exe5⤵PID:8888
-
C:\Windows\System\pqctjLV.exeC:\Windows\System\pqctjLV.exe5⤵PID:8904
-
C:\Windows\System\oPtrrXv.exeC:\Windows\System\oPtrrXv.exe5⤵PID:8920
-
C:\Windows\System\iEqLPHf.exeC:\Windows\System\iEqLPHf.exe5⤵PID:8936
-
C:\Windows\System\brObFTn.exeC:\Windows\System\brObFTn.exe5⤵PID:8952
-
C:\Windows\System\cxIXafM.exeC:\Windows\System\cxIXafM.exe5⤵PID:8968
-
C:\Windows\System\nYuVsDl.exeC:\Windows\System\nYuVsDl.exe5⤵PID:8984
-
C:\Windows\System\kJFFplq.exeC:\Windows\System\kJFFplq.exe5⤵PID:9000
-
C:\Windows\System\EFQwSfX.exeC:\Windows\System\EFQwSfX.exe5⤵PID:9016
-
C:\Windows\System\KTfyYiY.exeC:\Windows\System\KTfyYiY.exe5⤵PID:9032
-
C:\Windows\System\ohfCPvY.exeC:\Windows\System\ohfCPvY.exe5⤵PID:9048
-
C:\Windows\System\PFUzHTx.exeC:\Windows\System\PFUzHTx.exe5⤵PID:9064
-
C:\Windows\System\NqiIVsp.exeC:\Windows\System\NqiIVsp.exe5⤵PID:9080
-
C:\Windows\System\dlNRsxN.exeC:\Windows\System\dlNRsxN.exe5⤵PID:9096
-
C:\Windows\System\jiXuBqA.exeC:\Windows\System\jiXuBqA.exe5⤵PID:9112
-
C:\Windows\System\XSMalcB.exeC:\Windows\System\XSMalcB.exe5⤵PID:9128
-
C:\Windows\System\CSxnCxe.exeC:\Windows\System\CSxnCxe.exe5⤵PID:9144
-
C:\Windows\System\pvFsbRf.exeC:\Windows\System\pvFsbRf.exe5⤵PID:9160
-
C:\Windows\System\jxQaoLy.exeC:\Windows\System\jxQaoLy.exe5⤵PID:9176
-
C:\Windows\System\LgvdWrR.exeC:\Windows\System\LgvdWrR.exe5⤵PID:9192
-
C:\Windows\System\juZqQyo.exeC:\Windows\System\juZqQyo.exe5⤵PID:9208
-
C:\Windows\System\XSsCqrH.exeC:\Windows\System\XSsCqrH.exe5⤵PID:8184
-
C:\Windows\System\FghDFdr.exeC:\Windows\System\FghDFdr.exe5⤵PID:3172
-
C:\Windows\System\UKaRkvs.exeC:\Windows\System\UKaRkvs.exe5⤵PID:6872
-
C:\Windows\System\vJFGyqQ.exeC:\Windows\System\vJFGyqQ.exe5⤵PID:7524
-
C:\Windows\System\pEOdorM.exeC:\Windows\System\pEOdorM.exe5⤵PID:6124
-
C:\Windows\System\thWUktv.exeC:\Windows\System\thWUktv.exe5⤵PID:7596
-
C:\Windows\System\VOZDERu.exeC:\Windows\System\VOZDERu.exe5⤵PID:7764
-
C:\Windows\System\BhCAPnV.exeC:\Windows\System\BhCAPnV.exe5⤵PID:8
-
C:\Windows\System\TqByMcN.exeC:\Windows\System\TqByMcN.exe5⤵PID:4316
-
C:\Windows\System\oCHoBBb.exeC:\Windows\System\oCHoBBb.exe5⤵PID:7476
-
C:\Windows\System\meBiJGo.exeC:\Windows\System\meBiJGo.exe5⤵PID:9228
-
C:\Windows\System\GpzYBqD.exeC:\Windows\System\GpzYBqD.exe5⤵PID:9260
-
C:\Windows\System\omIDcCk.exeC:\Windows\System\omIDcCk.exe5⤵PID:9276
-
C:\Windows\System\DDBSASp.exeC:\Windows\System\DDBSASp.exe5⤵PID:9292
-
C:\Windows\System\IOMAZoR.exeC:\Windows\System\IOMAZoR.exe5⤵PID:9308
-
C:\Windows\System\JtuwdIU.exeC:\Windows\System\JtuwdIU.exe5⤵PID:9328
-
C:\Windows\System\AgqxKin.exeC:\Windows\System\AgqxKin.exe5⤵PID:9344
-
C:\Windows\System\cBdNnUR.exeC:\Windows\System\cBdNnUR.exe5⤵PID:9368
-
C:\Windows\System\BBaIagE.exeC:\Windows\System\BBaIagE.exe5⤵PID:9384
-
C:\Windows\System\gVbSdSQ.exeC:\Windows\System\gVbSdSQ.exe5⤵PID:9404
-
C:\Windows\System\keQJVCi.exeC:\Windows\System\keQJVCi.exe5⤵PID:9420
-
C:\Windows\System\EXVzSEB.exeC:\Windows\System\EXVzSEB.exe5⤵PID:9436
-
C:\Windows\System\brAoaxf.exeC:\Windows\System\brAoaxf.exe5⤵PID:9452
-
C:\Windows\System\KQkdFju.exeC:\Windows\System\KQkdFju.exe5⤵PID:9476
-
C:\Windows\System\bdzKVOe.exeC:\Windows\System\bdzKVOe.exe5⤵PID:9492
-
C:\Windows\System\UYacfMp.exeC:\Windows\System\UYacfMp.exe5⤵PID:9512
-
C:\Windows\System\YOINzhs.exeC:\Windows\System\YOINzhs.exe5⤵PID:9628
-
C:\Windows\System\NyOfzzk.exeC:\Windows\System\NyOfzzk.exe5⤵PID:9756
-
C:\Windows\System\ddQGvTV.exeC:\Windows\System\ddQGvTV.exe5⤵PID:9772
-
C:\Windows\System\TLvsvON.exeC:\Windows\System\TLvsvON.exe5⤵PID:9788
-
C:\Windows\System\cbwCQFF.exeC:\Windows\System\cbwCQFF.exe5⤵PID:9804
-
C:\Windows\System\JnrMKzf.exeC:\Windows\System\JnrMKzf.exe5⤵PID:9824
-
C:\Windows\System\mKiSLZF.exeC:\Windows\System\mKiSLZF.exe5⤵PID:9856
-
C:\Windows\System\woiwUUM.exeC:\Windows\System\woiwUUM.exe5⤵PID:9876
-
C:\Windows\System\kaAllCD.exeC:\Windows\System\kaAllCD.exe5⤵PID:9892
-
C:\Windows\System\NUiShem.exeC:\Windows\System\NUiShem.exe5⤵PID:9988
-
C:\Windows\System\fJpfaZf.exeC:\Windows\System\fJpfaZf.exe5⤵PID:10004
-
C:\Windows\System\PTXPazq.exeC:\Windows\System\PTXPazq.exe5⤵PID:10024
-
C:\Windows\System\hxVfQTU.exeC:\Windows\System\hxVfQTU.exe5⤵PID:10040
-
C:\Windows\System\WEiwIlk.exeC:\Windows\System\WEiwIlk.exe5⤵PID:10056
-
C:\Windows\System\VSriKNW.exeC:\Windows\System\VSriKNW.exe5⤵PID:10072
-
C:\Windows\System\KEFZtjo.exeC:\Windows\System\KEFZtjo.exe5⤵PID:10092
-
C:\Windows\System\NWKvHtT.exeC:\Windows\System\NWKvHtT.exe5⤵PID:10108
-
C:\Windows\System\qnQzkDK.exeC:\Windows\System\qnQzkDK.exe5⤵PID:10128
-
C:\Windows\System\tPjgzaV.exeC:\Windows\System\tPjgzaV.exe5⤵PID:10144
-
C:\Windows\System\FoYlHNN.exeC:\Windows\System\FoYlHNN.exe5⤵PID:10168
-
C:\Windows\System\qQjcShN.exeC:\Windows\System\qQjcShN.exe5⤵PID:10192
-
C:\Windows\System\harTJll.exeC:\Windows\System\harTJll.exe5⤵PID:10212
-
C:\Windows\System\byhDZic.exeC:\Windows\System\byhDZic.exe5⤵PID:10232
-
C:\Windows\System\URUkQUf.exeC:\Windows\System\URUkQUf.exe5⤵PID:8148
-
C:\Windows\System\zvbIGeh.exeC:\Windows\System\zvbIGeh.exe5⤵PID:7944
-
C:\Windows\System\eHXBliI.exeC:\Windows\System\eHXBliI.exe5⤵PID:5332
-
C:\Windows\System\Keqrxwb.exeC:\Windows\System\Keqrxwb.exe5⤵PID:8220
-
C:\Windows\System\qocSNyu.exeC:\Windows\System\qocSNyu.exe5⤵PID:7000
-
C:\Windows\System\mlcnWqg.exeC:\Windows\System\mlcnWqg.exe5⤵PID:6504
-
C:\Windows\System\ZrNWxMt.exeC:\Windows\System\ZrNWxMt.exe5⤵PID:6268
-
C:\Windows\System\tOuPtxE.exeC:\Windows\System\tOuPtxE.exe5⤵PID:8344
-
C:\Windows\System\eIUfFBN.exeC:\Windows\System\eIUfFBN.exe5⤵PID:7576
-
C:\Windows\System\QPpULsa.exeC:\Windows\System\QPpULsa.exe5⤵PID:8528
-
C:\Windows\System\ivZVxcT.exeC:\Windows\System\ivZVxcT.exe5⤵PID:5888
-
C:\Windows\System\xGIpuje.exeC:\Windows\System\xGIpuje.exe5⤵PID:6316
-
C:\Windows\System\vmegcxU.exeC:\Windows\System\vmegcxU.exe5⤵PID:7668
-
C:\Windows\System\SbwIqhd.exeC:\Windows\System\SbwIqhd.exe5⤵PID:8580
-
C:\Windows\System\slhiNhv.exeC:\Windows\System\slhiNhv.exe5⤵PID:8620
-
C:\Windows\System\vYDCBAL.exeC:\Windows\System\vYDCBAL.exe5⤵PID:8656
-
C:\Windows\System\gHoSOot.exeC:\Windows\System\gHoSOot.exe5⤵PID:7852
-
C:\Windows\System\elUlTGy.exeC:\Windows\System\elUlTGy.exe5⤵PID:10264
-
C:\Windows\System\PtqYtGO.exeC:\Windows\System\PtqYtGO.exe5⤵PID:10288
-
C:\Windows\System\xlyggTD.exeC:\Windows\System\xlyggTD.exe5⤵PID:10312
-
C:\Windows\System\RWkpCzQ.exeC:\Windows\System\RWkpCzQ.exe5⤵PID:10340
-
C:\Windows\System\CEDAwHq.exeC:\Windows\System\CEDAwHq.exe5⤵PID:10360
-
C:\Windows\System\VfIewFi.exeC:\Windows\System\VfIewFi.exe5⤵PID:10384
-
C:\Windows\System\WxYFeeB.exeC:\Windows\System\WxYFeeB.exe5⤵PID:10400
-
C:\Windows\System\shKSZxH.exeC:\Windows\System\shKSZxH.exe5⤵PID:10416
-
C:\Windows\System\OvdQQvL.exeC:\Windows\System\OvdQQvL.exe5⤵PID:10432
-
C:\Windows\System\GNmkBYi.exeC:\Windows\System\GNmkBYi.exe5⤵PID:10448
-
C:\Windows\System\popxHTw.exeC:\Windows\System\popxHTw.exe5⤵PID:10464
-
C:\Windows\System\GiDsmGl.exeC:\Windows\System\GiDsmGl.exe5⤵PID:10480
-
C:\Windows\System\vRuEJek.exeC:\Windows\System\vRuEJek.exe5⤵PID:10496
-
C:\Windows\System\TmKBRma.exeC:\Windows\System\TmKBRma.exe5⤵PID:10512
-
C:\Windows\System\rgBEKfs.exeC:\Windows\System\rgBEKfs.exe5⤵PID:10532
-
C:\Windows\System\ywVMnUe.exeC:\Windows\System\ywVMnUe.exe5⤵PID:10548
-
C:\Windows\System\xsRuKLK.exeC:\Windows\System\xsRuKLK.exe5⤵PID:10564
-
C:\Windows\System\QhFbXPU.exeC:\Windows\System\QhFbXPU.exe5⤵PID:10584
-
C:\Windows\System\DIjfnDf.exeC:\Windows\System\DIjfnDf.exe5⤵PID:10600
-
C:\Windows\System\ukSbcoT.exeC:\Windows\System\ukSbcoT.exe5⤵PID:10616
-
C:\Windows\System\AJOgsfK.exeC:\Windows\System\AJOgsfK.exe5⤵PID:10632
-
C:\Windows\System\LFkCSKM.exeC:\Windows\System\LFkCSKM.exe5⤵PID:10648
-
C:\Windows\System\tznwiZt.exeC:\Windows\System\tznwiZt.exe5⤵PID:10664
-
C:\Windows\System\OyMsIwT.exeC:\Windows\System\OyMsIwT.exe5⤵PID:10680
-
C:\Windows\System\kpBgURH.exeC:\Windows\System\kpBgURH.exe5⤵PID:10696
-
C:\Windows\System\RvLMbrn.exeC:\Windows\System\RvLMbrn.exe5⤵PID:10712
-
C:\Windows\System\mlMpUij.exeC:\Windows\System\mlMpUij.exe5⤵PID:10728
-
C:\Windows\System\HwiJlON.exeC:\Windows\System\HwiJlON.exe5⤵PID:10748
-
C:\Windows\System\GdyUFzi.exeC:\Windows\System\GdyUFzi.exe5⤵PID:10776
-
C:\Windows\System\OxaVLyu.exeC:\Windows\System\OxaVLyu.exe5⤵PID:10820
-
C:\Windows\System\uneALDO.exeC:\Windows\System\uneALDO.exe5⤵PID:10836
-
C:\Windows\System\pUUxwiC.exeC:\Windows\System\pUUxwiC.exe5⤵PID:10852
-
C:\Windows\System\fKXYvjn.exeC:\Windows\System\fKXYvjn.exe5⤵PID:10872
-
C:\Windows\System\fdGIfGY.exeC:\Windows\System\fdGIfGY.exe5⤵PID:10888
-
C:\Windows\System\OhdTWtD.exeC:\Windows\System\OhdTWtD.exe5⤵PID:10904
-
C:\Windows\System\NbJFDpI.exeC:\Windows\System\NbJFDpI.exe5⤵PID:11016
-
C:\Windows\System\UxBNHbo.exeC:\Windows\System\UxBNHbo.exe5⤵PID:11116
-
C:\Windows\System\cHPKMhU.exeC:\Windows\System\cHPKMhU.exe5⤵PID:11136
-
C:\Windows\System\tSlZLTV.exeC:\Windows\System\tSlZLTV.exe5⤵PID:11152
-
C:\Windows\System\yPodGQm.exeC:\Windows\System\yPodGQm.exe5⤵PID:11168
-
C:\Windows\System\Yeeehqz.exeC:\Windows\System\Yeeehqz.exe5⤵PID:11188
-
C:\Windows\System\FbUltqm.exeC:\Windows\System\FbUltqm.exe5⤵PID:11208
-
C:\Windows\System\Dmaaklr.exeC:\Windows\System\Dmaaklr.exe5⤵PID:11224
-
C:\Windows\System\JsrXvDH.exeC:\Windows\System\JsrXvDH.exe5⤵PID:11240
-
C:\Windows\System\RTZzXEC.exeC:\Windows\System\RTZzXEC.exe5⤵PID:11256
-
C:\Windows\System\SmPytfv.exeC:\Windows\System\SmPytfv.exe5⤵PID:5776
-
C:\Windows\System\DGEMeob.exeC:\Windows\System\DGEMeob.exe5⤵PID:9392
-
C:\Windows\System\ANOXjHn.exeC:\Windows\System\ANOXjHn.exe5⤵PID:9448
-
C:\Windows\System\nXsyYnO.exeC:\Windows\System\nXsyYnO.exe5⤵PID:5696
-
C:\Windows\System\LgHOZmE.exeC:\Windows\System\LgHOZmE.exe5⤵PID:9524
-
C:\Windows\System\DeYvnYU.exeC:\Windows\System\DeYvnYU.exe5⤵PID:8212
-
C:\Windows\System\nwhkLJF.exeC:\Windows\System\nwhkLJF.exe5⤵PID:9844
-
C:\Windows\System\VEUPEGC.exeC:\Windows\System\VEUPEGC.exe5⤵PID:5284
-
C:\Windows\System\gVnecUl.exeC:\Windows\System\gVnecUl.exe5⤵PID:7400
-
C:\Windows\System\euNptrB.exeC:\Windows\System\euNptrB.exe5⤵PID:8484
-
C:\Windows\System\ZyDZoFe.exeC:\Windows\System\ZyDZoFe.exe5⤵PID:11272
-
C:\Windows\System\ENdtkpN.exeC:\Windows\System\ENdtkpN.exe5⤵PID:11288
-
C:\Windows\System\CcDjRIA.exeC:\Windows\System\CcDjRIA.exe5⤵PID:11308
-
C:\Windows\System\DGeYtQq.exeC:\Windows\System\DGeYtQq.exe5⤵PID:11324
-
C:\Windows\System\cFTkdnK.exeC:\Windows\System\cFTkdnK.exe5⤵PID:11344
-
C:\Windows\System\UVupdMw.exeC:\Windows\System\UVupdMw.exe5⤵PID:11360
-
C:\Windows\System\DOvonss.exeC:\Windows\System\DOvonss.exe5⤵PID:11376
-
C:\Windows\System\PZfrira.exeC:\Windows\System\PZfrira.exe5⤵PID:11392
-
C:\Windows\System\qSRHVeK.exeC:\Windows\System\qSRHVeK.exe5⤵PID:11408
-
C:\Windows\System\jGdYjpl.exeC:\Windows\System\jGdYjpl.exe5⤵PID:11424
-
C:\Windows\System\KUJHWJv.exeC:\Windows\System\KUJHWJv.exe5⤵PID:11440
-
C:\Windows\System\cEJAJjj.exeC:\Windows\System\cEJAJjj.exe5⤵PID:11456
-
C:\Windows\System\KxZRbVu.exeC:\Windows\System\KxZRbVu.exe5⤵PID:11472
-
C:\Windows\System\jOlySdh.exeC:\Windows\System\jOlySdh.exe5⤵PID:11488
-
C:\Windows\System\jCaHerB.exeC:\Windows\System\jCaHerB.exe5⤵PID:11504
-
C:\Windows\System\AbdkOzf.exeC:\Windows\System\AbdkOzf.exe5⤵PID:11520
-
C:\Windows\System\kcOwGjP.exeC:\Windows\System\kcOwGjP.exe5⤵PID:11536
-
C:\Windows\System\AqAwfhX.exeC:\Windows\System\AqAwfhX.exe5⤵PID:11552
-
C:\Windows\System\hFHRQcY.exeC:\Windows\System\hFHRQcY.exe5⤵PID:11568
-
C:\Windows\System\sodvGcI.exeC:\Windows\System\sodvGcI.exe5⤵PID:11584
-
C:\Windows\System\PmzpZGO.exeC:\Windows\System\PmzpZGO.exe5⤵PID:11600
-
C:\Windows\System\vMdEnLj.exeC:\Windows\System\vMdEnLj.exe5⤵PID:11620
-
C:\Windows\System\DRCpOcl.exeC:\Windows\System\DRCpOcl.exe5⤵PID:11644
-
C:\Windows\System\yUUHNNZ.exeC:\Windows\System\yUUHNNZ.exe5⤵PID:11696
-
C:\Windows\System\BSekBlW.exeC:\Windows\System\BSekBlW.exe5⤵PID:11732
-
C:\Windows\System\TkQoJaV.exeC:\Windows\System\TkQoJaV.exe5⤵PID:11768
-
C:\Windows\System\IczBnCg.exeC:\Windows\System\IczBnCg.exe5⤵PID:11788
-
C:\Windows\System\HXwDdIo.exeC:\Windows\System\HXwDdIo.exe5⤵PID:11808
-
C:\Windows\System\OjtXTjv.exeC:\Windows\System\OjtXTjv.exe5⤵PID:11828
-
C:\Windows\System\anRFBWI.exeC:\Windows\System\anRFBWI.exe5⤵PID:11848
-
C:\Windows\System\jQcaYLv.exeC:\Windows\System\jQcaYLv.exe5⤵PID:11864
-
C:\Windows\System\juAzxCW.exeC:\Windows\System\juAzxCW.exe5⤵PID:11880
-
C:\Windows\System\pEIAjNh.exeC:\Windows\System\pEIAjNh.exe5⤵PID:11896
-
C:\Windows\System\njhuaaq.exeC:\Windows\System\njhuaaq.exe5⤵PID:11912
-
C:\Windows\System\qshcBTt.exeC:\Windows\System\qshcBTt.exe5⤵PID:11928
-
C:\Windows\System\geIbRVx.exeC:\Windows\System\geIbRVx.exe5⤵PID:11944
-
C:\Windows\System\FQoAvKX.exeC:\Windows\System\FQoAvKX.exe5⤵PID:11960
-
C:\Windows\System\xGcLpPy.exeC:\Windows\System\xGcLpPy.exe5⤵PID:11992
-
C:\Windows\System\MckxIkL.exeC:\Windows\System\MckxIkL.exe5⤵PID:12156
-
C:\Windows\System\CQeHlSD.exeC:\Windows\System\CQeHlSD.exe5⤵PID:12272
-
C:\Windows\System\lRnFyKH.exeC:\Windows\System\lRnFyKH.exe5⤵PID:8684
-
C:\Windows\System\tXuCUgQ.exeC:\Windows\System\tXuCUgQ.exe5⤵PID:8756
-
C:\Windows\System\dmPfDPc.exeC:\Windows\System\dmPfDPc.exe5⤵PID:8976
-
C:\Windows\System\PSjtHRc.exeC:\Windows\System\PSjtHRc.exe5⤵PID:9072
-
C:\Windows\System\aEBqFDC.exeC:\Windows\System\aEBqFDC.exe5⤵PID:9092
-
C:\Windows\System\wYnTEBq.exeC:\Windows\System\wYnTEBq.exe5⤵PID:9140
-
C:\Windows\System\ncOCbhl.exeC:\Windows\System\ncOCbhl.exe5⤵PID:9172
-
C:\Windows\System\SOEtTOP.exeC:\Windows\System\SOEtTOP.exe5⤵PID:9056
-
C:\Windows\System\qhlCJqz.exeC:\Windows\System\qhlCJqz.exe5⤵PID:7816
-
C:\Windows\System\aUMwgzz.exeC:\Windows\System\aUMwgzz.exe5⤵PID:8156
-
C:\Windows\System\dDqYVGF.exeC:\Windows\System\dDqYVGF.exe5⤵PID:6864
-
C:\Windows\System\MzHnRwC.exeC:\Windows\System\MzHnRwC.exe5⤵PID:8256
-
C:\Windows\System\DAunflD.exeC:\Windows\System\DAunflD.exe5⤵PID:8536
-
C:\Windows\System\xxVRppy.exeC:\Windows\System\xxVRppy.exe5⤵PID:2092
-
C:\Windows\System\dwaHKJw.exeC:\Windows\System\dwaHKJw.exe5⤵PID:7624
-
C:\Windows\System\uSoVmjN.exeC:\Windows\System\uSoVmjN.exe5⤵PID:10320
-
C:\Windows\System\puGfIDD.exeC:\Windows\System\puGfIDD.exe5⤵PID:9268
-
C:\Windows\System\mggnaED.exeC:\Windows\System\mggnaED.exe5⤵PID:9220
-
C:\Windows\System\lFhkEUz.exeC:\Windows\System\lFhkEUz.exe5⤵PID:9336
-
C:\Windows\System\HVtckdC.exeC:\Windows\System\HVtckdC.exe5⤵PID:9324
-
C:\Windows\System\imEgiod.exeC:\Windows\System\imEgiod.exe5⤵PID:9432
-
C:\Windows\System\ZYtZQBn.exeC:\Windows\System\ZYtZQBn.exe5⤵PID:10864
-
C:\Windows\System\ZIAlosq.exeC:\Windows\System\ZIAlosq.exe5⤵PID:9556
-
C:\Windows\System\yqYVbzC.exeC:\Windows\System\yqYVbzC.exe5⤵PID:9592
-
C:\Windows\System\UQXkYTZ.exeC:\Windows\System\UQXkYTZ.exe5⤵PID:9656
-
C:\Windows\System\eJYoOUZ.exeC:\Windows\System\eJYoOUZ.exe5⤵PID:9712
-
C:\Windows\System\bFpToaL.exeC:\Windows\System\bFpToaL.exe5⤵PID:11980
-
C:\Windows\System\eMfFglM.exeC:\Windows\System\eMfFglM.exe5⤵PID:11000
-
C:\Windows\System\DhLGtwC.exeC:\Windows\System\DhLGtwC.exe5⤵PID:11044
-
C:\Windows\System\bqMeJkG.exeC:\Windows\System\bqMeJkG.exe5⤵PID:11068
-
C:\Windows\System\kMpNEuN.exeC:\Windows\System\kMpNEuN.exe5⤵PID:9768
-
C:\Windows\System\bpUtBws.exeC:\Windows\System\bpUtBws.exe5⤵PID:11144
-
C:\Windows\System\hELwPQH.exeC:\Windows\System\hELwPQH.exe5⤵PID:9836
-
C:\Windows\System\tVNlzgc.exeC:\Windows\System\tVNlzgc.exe5⤵PID:11296
-
C:\Windows\System\OnZCqZf.exeC:\Windows\System\OnZCqZf.exe5⤵PID:11416
-
C:\Windows\System\woLQZWk.exeC:\Windows\System\woLQZWk.exe5⤵PID:11496
-
C:\Windows\System\pddTFrB.exeC:\Windows\System\pddTFrB.exe5⤵PID:11592
-
C:\Windows\System\lLtkSCT.exeC:\Windows\System\lLtkSCT.exe5⤵PID:11920
-
C:\Windows\System\svPLYlJ.exeC:\Windows\System\svPLYlJ.exe5⤵PID:12100
-
C:\Windows\System\XlaZRtl.exeC:\Windows\System\XlaZRtl.exe5⤵PID:10048
-
C:\Windows\System\IfszqKK.exeC:\Windows\System\IfszqKK.exe5⤵PID:11320
-
C:\Windows\System\FqevyRk.exeC:\Windows\System\FqevyRk.exe5⤵PID:11452
-
C:\Windows\System\NBNCUxN.exeC:\Windows\System\NBNCUxN.exe5⤵PID:10188
-
C:\Windows\System\GOgDNxe.exeC:\Windows\System\GOgDNxe.exe5⤵PID:10472
-
C:\Windows\System\qTfsXpA.exeC:\Windows\System\qTfsXpA.exe5⤵PID:10520
-
C:\Windows\System\zOVCrAA.exeC:\Windows\System\zOVCrAA.exe5⤵PID:11804
-
C:\Windows\System\JSoEeFK.exeC:\Windows\System\JSoEeFK.exe5⤵PID:10628
-
C:\Windows\System\xkVyVRF.exeC:\Windows\System\xkVyVRF.exe5⤵PID:10800
-
C:\Windows\System\kIskcJl.exeC:\Windows\System\kIskcJl.exe5⤵PID:10896
-
C:\Windows\System\eiOwZwp.exeC:\Windows\System\eiOwZwp.exe5⤵PID:9984
-
C:\Windows\System\wbkTRnv.exeC:\Windows\System\wbkTRnv.exe5⤵PID:12056
-
C:\Windows\System\qoJaqMf.exeC:\Windows\System\qoJaqMf.exe5⤵PID:8364
-
C:\Windows\System\sIchNdP.exeC:\Windows\System\sIchNdP.exe5⤵PID:11252
-
C:\Windows\System\zgBqUPJ.exeC:\Windows\System\zgBqUPJ.exe5⤵PID:11388
-
C:\Windows\System\ZFDIpJf.exeC:\Windows\System\ZFDIpJf.exe5⤵PID:11516
-
C:\Windows\System\GLGuKwi.exeC:\Windows\System\GLGuKwi.exe5⤵PID:9920
-
C:\Windows\System\ItUtZfu.exeC:\Windows\System\ItUtZfu.exe5⤵PID:12296
-
C:\Windows\System\IOYnYNe.exeC:\Windows\System\IOYnYNe.exe5⤵PID:12320
-
C:\Windows\System\eUISNam.exeC:\Windows\System\eUISNam.exe5⤵PID:12344
-
C:\Windows\System\BVXgibZ.exeC:\Windows\System\BVXgibZ.exe5⤵PID:12376
-
C:\Windows\System\eRKiyFl.exeC:\Windows\System\eRKiyFl.exe5⤵PID:12396
-
C:\Windows\System\DEXqOoy.exeC:\Windows\System\DEXqOoy.exe5⤵PID:12424
-
C:\Windows\System\QmGnGed.exeC:\Windows\System\QmGnGed.exe5⤵PID:12460
-
C:\Windows\System\LVUDJMa.exeC:\Windows\System\LVUDJMa.exe5⤵PID:12492
-
C:\Windows\System\aZgPLMz.exeC:\Windows\System\aZgPLMz.exe5⤵PID:12516
-
C:\Windows\System\YjbDWlC.exeC:\Windows\System\YjbDWlC.exe5⤵PID:12540
-
C:\Windows\System\HPGyqWU.exeC:\Windows\System\HPGyqWU.exe5⤵PID:12564
-
C:\Windows\System\eeEicUx.exeC:\Windows\System\eeEicUx.exe5⤵PID:12584
-
C:\Windows\System\UXlybVe.exeC:\Windows\System\UXlybVe.exe5⤵PID:12608
-
C:\Windows\System\XfJNscM.exeC:\Windows\System\XfJNscM.exe5⤵PID:12628
-
C:\Windows\System\tGRprwg.exeC:\Windows\System\tGRprwg.exe5⤵PID:12644
-
C:\Windows\System\WKcWUPF.exeC:\Windows\System\WKcWUPF.exe5⤵PID:12664
-
C:\Windows\System\aATveeY.exeC:\Windows\System\aATveeY.exe5⤵PID:12696
-
C:\Windows\System\hzScvUx.exeC:\Windows\System\hzScvUx.exe5⤵PID:12712
-
C:\Windows\System\JaIMKgQ.exeC:\Windows\System\JaIMKgQ.exe5⤵PID:12732
-
C:\Windows\System\GxInKqX.exeC:\Windows\System\GxInKqX.exe5⤵PID:12760
-
C:\Windows\System\jvLGUyP.exeC:\Windows\System\jvLGUyP.exe5⤵PID:12804
-
C:\Windows\System\EUWZusR.exeC:\Windows\System\EUWZusR.exe5⤵PID:12824
-
C:\Windows\System\CncXqmp.exeC:\Windows\System\CncXqmp.exe5⤵PID:12848
-
C:\Windows\System\ZtijTIn.exeC:\Windows\System\ZtijTIn.exe5⤵PID:12868
-
C:\Windows\System\eyCrLxJ.exeC:\Windows\System\eyCrLxJ.exe5⤵PID:12892
-
C:\Windows\System\jKQWDQa.exeC:\Windows\System\jKQWDQa.exe5⤵PID:12916
-
C:\Windows\System\DaICpry.exeC:\Windows\System\DaICpry.exe5⤵PID:12940
-
C:\Windows\System\podBmpp.exeC:\Windows\System\podBmpp.exe5⤵PID:12960
-
C:\Windows\System\DFCwBfa.exeC:\Windows\System\DFCwBfa.exe5⤵PID:12984
-
C:\Windows\System\YHYWaEI.exeC:\Windows\System\YHYWaEI.exe5⤵PID:13008
-
C:\Windows\System\gKYzAzV.exeC:\Windows\System\gKYzAzV.exe5⤵PID:13036
-
C:\Windows\System\XGRwbEC.exeC:\Windows\System\XGRwbEC.exe5⤵PID:13060
-
C:\Windows\System\zdsgair.exeC:\Windows\System\zdsgair.exe5⤵PID:13084
-
C:\Windows\System\KfLuswi.exeC:\Windows\System\KfLuswi.exe5⤵PID:13108
-
C:\Windows\System\wFRqdhx.exeC:\Windows\System\wFRqdhx.exe5⤵PID:13132
-
C:\Windows\System\oUYFHNS.exeC:\Windows\System\oUYFHNS.exe5⤵PID:13156
-
C:\Windows\System\FTmYJtn.exeC:\Windows\System\FTmYJtn.exe5⤵PID:13180
-
C:\Windows\System\GDYAHqf.exeC:\Windows\System\GDYAHqf.exe5⤵PID:13204
-
C:\Windows\System\IMCtywf.exeC:\Windows\System\IMCtywf.exe5⤵PID:13228
-
C:\Windows\System\wqPTGCp.exeC:\Windows\System\wqPTGCp.exe5⤵PID:13252
-
C:\Windows\System\wuaKCNq.exeC:\Windows\System\wuaKCNq.exe5⤵PID:13276
-
C:\Windows\System\ORYtamJ.exeC:\Windows\System\ORYtamJ.exe5⤵PID:13300
-
C:\Windows\System\SKuJvju.exeC:\Windows\System\SKuJvju.exe5⤵PID:11956
-
C:\Windows\System\eSYCaOX.exeC:\Windows\System\eSYCaOX.exe5⤵PID:9812
-
C:\Windows\System\nzEorUq.exeC:\Windows\System\nzEorUq.exe5⤵PID:7100
-
C:\Windows\System\mcSXxQI.exeC:\Windows\System\mcSXxQI.exe5⤵PID:12212
-
C:\Windows\System\OWHlRye.exeC:\Windows\System\OWHlRye.exe5⤵PID:10164
-
C:\Windows\System\tyRSFEm.exeC:\Windows\System\tyRSFEm.exe5⤵PID:6668
-
C:\Windows\System\gZqSwjI.exeC:\Windows\System\gZqSwjI.exe5⤵PID:13320
-
C:\Windows\System\rMsMRWG.exeC:\Windows\System\rMsMRWG.exe5⤵PID:13344
-
C:\Windows\System\VErcDPy.exeC:\Windows\System\VErcDPy.exe5⤵PID:13368
-
C:\Windows\System\RNLuEdJ.exeC:\Windows\System\RNLuEdJ.exe5⤵PID:13392
-
C:\Windows\System\nfCOKMc.exeC:\Windows\System\nfCOKMc.exe5⤵PID:13416
-
C:\Windows\System\CdOfVEp.exeC:\Windows\System\CdOfVEp.exe5⤵PID:13440
-
C:\Windows\System\ZQepmqI.exeC:\Windows\System\ZQepmqI.exe5⤵PID:13464
-
C:\Windows\System\lvXDUbo.exeC:\Windows\System\lvXDUbo.exe5⤵PID:13488
-
C:\Windows\System\juflORf.exeC:\Windows\System\juflORf.exe5⤵PID:13512
-
C:\Windows\System\olHmhyu.exeC:\Windows\System\olHmhyu.exe5⤵PID:13536
-
C:\Windows\System\YJBOxNB.exeC:\Windows\System\YJBOxNB.exe5⤵PID:13560
-
C:\Windows\System\TSVQYAS.exeC:\Windows\System\TSVQYAS.exe5⤵PID:13584
-
C:\Windows\System\EqWhIAp.exeC:\Windows\System\EqWhIAp.exe5⤵PID:13608
-
C:\Windows\System\hxCRpBZ.exeC:\Windows\System\hxCRpBZ.exe5⤵PID:13632
-
C:\Windows\System\xngFDuw.exeC:\Windows\System\xngFDuw.exe5⤵PID:13660
-
C:\Windows\System\NRFOdci.exeC:\Windows\System\NRFOdci.exe5⤵PID:13684
-
C:\Windows\System\beOLMnZ.exeC:\Windows\System\beOLMnZ.exe5⤵PID:13708
-
C:\Windows\System\fGWqGgM.exeC:\Windows\System\fGWqGgM.exe5⤵PID:13732
-
C:\Windows\System\rMoADiK.exeC:\Windows\System\rMoADiK.exe5⤵PID:13752
-
C:\Windows\System\AFdcntu.exeC:\Windows\System\AFdcntu.exe5⤵PID:13780
-
C:\Windows\System\hTivost.exeC:\Windows\System\hTivost.exe5⤵PID:13804
-
C:\Windows\System\mpAGVDs.exeC:\Windows\System\mpAGVDs.exe5⤵PID:13824
-
C:\Windows\System\fMCYbQA.exeC:\Windows\System\fMCYbQA.exe5⤵PID:13852
-
C:\Windows\System\rdjMrDV.exeC:\Windows\System\rdjMrDV.exe5⤵PID:13872
-
C:\Windows\System\rIVllrK.exeC:\Windows\System\rIVllrK.exe5⤵PID:13896
-
C:\Windows\System\ekQqUNu.exeC:\Windows\System\ekQqUNu.exe5⤵PID:13920
-
C:\Windows\System\VPpCLLS.exeC:\Windows\System\VPpCLLS.exe5⤵PID:13944
-
C:\Windows\System\cPxNlns.exeC:\Windows\System\cPxNlns.exe5⤵PID:13972
-
C:\Windows\System\pwsMAyT.exeC:\Windows\System\pwsMAyT.exe5⤵PID:13992
-
C:\Windows\System\bywxRpA.exeC:\Windows\System\bywxRpA.exe5⤵PID:14008
-
C:\Windows\System\QJSHLnD.exeC:\Windows\System\QJSHLnD.exe5⤵PID:14024
-
C:\Windows\System\jKuTQFR.exeC:\Windows\System\jKuTQFR.exe5⤵PID:14040
-
C:\Windows\System\CJxVVME.exeC:\Windows\System\CJxVVME.exe5⤵PID:14056
-
C:\Windows\System\XUPnSgQ.exeC:\Windows\System\XUPnSgQ.exe5⤵PID:14080
-
C:\Windows\System\klLsOXm.exeC:\Windows\System\klLsOXm.exe5⤵PID:14104
-
C:\Windows\System\DJYdnlI.exeC:\Windows\System\DJYdnlI.exe5⤵PID:14128
-
C:\Windows\System\lvrrQLN.exeC:\Windows\System\lvrrQLN.exe5⤵PID:14156
-
C:\Windows\System\spTdhsk.exeC:\Windows\System\spTdhsk.exe5⤵PID:14180
-
C:\Windows\System\VMyafTv.exeC:\Windows\System\VMyafTv.exe5⤵PID:14204
-
C:\Windows\System\VYMKTqz.exeC:\Windows\System\VYMKTqz.exe5⤵PID:14232
-
C:\Windows\System\fxUNcNf.exeC:\Windows\System\fxUNcNf.exe5⤵PID:14256
-
C:\Windows\System\qzGstUq.exeC:\Windows\System\qzGstUq.exe5⤵PID:14280
-
C:\Windows\System\pGfNkUn.exeC:\Windows\System\pGfNkUn.exe5⤵PID:14304
-
C:\Windows\System\NWhEgNO.exeC:\Windows\System\NWhEgNO.exe5⤵PID:14320
-
C:\Windows\System\GKMqTBA.exeC:\Windows\System\GKMqTBA.exe5⤵PID:14340
-
C:\Windows\System\MFwZOqX.exeC:\Windows\System\MFwZOqX.exe5⤵PID:14356
-
C:\Windows\System\VRjnnyZ.exeC:\Windows\System\VRjnnyZ.exe5⤵PID:14372
-
C:\Windows\System\Llmpqrt.exeC:\Windows\System\Llmpqrt.exe5⤵PID:14388
-
C:\Windows\System\KqecHHp.exeC:\Windows\System\KqecHHp.exe5⤵PID:14404
-
C:\Windows\System\YKFySnA.exeC:\Windows\System\YKFySnA.exe5⤵PID:14428
-
C:\Windows\System\dBZfpKb.exeC:\Windows\System\dBZfpKb.exe5⤵PID:14444
-
C:\Windows\System\sdPcCFe.exeC:\Windows\System\sdPcCFe.exe5⤵PID:14460
-
C:\Windows\System\leUMSud.exeC:\Windows\System\leUMSud.exe5⤵PID:14476
-
C:\Windows\System\BABGsev.exeC:\Windows\System\BABGsev.exe5⤵PID:14492
-
C:\Windows\System\SminDKP.exeC:\Windows\System\SminDKP.exe5⤵PID:14512
-
C:\Windows\System\kKGqlqp.exeC:\Windows\System\kKGqlqp.exe5⤵PID:14784
-
C:\Windows\System\bQeYTHZ.exeC:\Windows\System\bQeYTHZ.exe5⤵PID:14824
-
C:\Windows\System\ojXzaoD.exeC:\Windows\System\ojXzaoD.exe5⤵PID:14880
-
C:\Windows\System\eQMevSk.exeC:\Windows\System\eQMevSk.exe5⤵PID:14900
-
C:\Windows\System\HycDnsW.exeC:\Windows\System\HycDnsW.exe5⤵PID:14924
-
C:\Windows\System\HGfwMhT.exeC:\Windows\System\HGfwMhT.exe5⤵PID:14944
-
C:\Windows\System\sdknZUd.exeC:\Windows\System\sdknZUd.exe5⤵PID:14968
-
C:\Windows\System\bPGWHzY.exeC:\Windows\System\bPGWHzY.exe5⤵PID:14988
-
C:\Windows\System\UstPEpO.exeC:\Windows\System\UstPEpO.exe5⤵PID:15040
-
C:\Windows\System\ICFLMhK.exeC:\Windows\System\ICFLMhK.exe5⤵PID:15056
-
C:\Windows\System\gMswgWi.exeC:\Windows\System\gMswgWi.exe5⤵PID:15072
-
C:\Windows\System\AvTzbIt.exeC:\Windows\System\AvTzbIt.exe5⤵PID:15088
-
C:\Windows\System\PFoLPZt.exeC:\Windows\System\PFoLPZt.exe5⤵PID:15104
-
C:\Windows\System\yHknkHk.exeC:\Windows\System\yHknkHk.exe5⤵PID:15120
-
C:\Windows\System\yqBmhtF.exeC:\Windows\System\yqBmhtF.exe5⤵PID:15136
-
C:\Windows\System\XkzdrjP.exeC:\Windows\System\XkzdrjP.exe5⤵PID:15152
-
C:\Windows\System\salwBae.exeC:\Windows\System\salwBae.exe5⤵PID:15168
-
C:\Windows\System\mvUyqkV.exeC:\Windows\System\mvUyqkV.exe5⤵PID:15184
-
C:\Windows\System\xvnzRAh.exeC:\Windows\System\xvnzRAh.exe5⤵PID:15200
-
C:\Windows\System\cTHtXhu.exeC:\Windows\System\cTHtXhu.exe5⤵PID:15216
-
C:\Windows\System\eagNeUD.exeC:\Windows\System\eagNeUD.exe5⤵PID:15232
-
C:\Windows\System\KGrxzeQ.exeC:\Windows\System\KGrxzeQ.exe5⤵PID:15248
-
C:\Windows\System\WxgzgNQ.exeC:\Windows\System\WxgzgNQ.exe5⤵PID:15264
-
C:\Windows\System\svxQZTO.exeC:\Windows\System\svxQZTO.exe5⤵PID:15280
-
C:\Windows\System\zCxjWOV.exeC:\Windows\System\zCxjWOV.exe5⤵PID:15296
-
C:\Windows\System\XPdlCht.exeC:\Windows\System\XPdlCht.exe5⤵PID:15316
-
C:\Windows\System\IUbwIrP.exeC:\Windows\System\IUbwIrP.exe5⤵PID:15340
-
C:\Windows\System\gwpjvAZ.exeC:\Windows\System\gwpjvAZ.exe5⤵PID:8820
-
C:\Windows\System\VgiGYvB.exeC:\Windows\System\VgiGYvB.exe5⤵PID:16172
-
C:\Windows\System\hYKmHLd.exeC:\Windows\System\hYKmHLd.exe5⤵PID:16192
-
C:\Windows\System\ldZDzsW.exeC:\Windows\System\ldZDzsW.exe5⤵PID:16208
-
C:\Windows\System\IkunRCE.exeC:\Windows\System\IkunRCE.exe5⤵PID:16224
-
C:\Windows\System\MJQZYbX.exeC:\Windows\System\MJQZYbX.exe5⤵PID:16240
-
C:\Windows\System\gsgLaws.exeC:\Windows\System\gsgLaws.exe5⤵PID:16256
-
C:\Windows\System\BigISIq.exeC:\Windows\System\BigISIq.exe5⤵PID:16276
-
C:\Windows\System\LLGTdNc.exeC:\Windows\System\LLGTdNc.exe5⤵PID:16292
-
C:\Windows\System\AFpEihY.exeC:\Windows\System\AFpEihY.exe5⤵PID:16308
-
C:\Users\Admin\Downloads\240919-mvkb7svepleb2c2e79f9b4e62cc1e1268f58af5323_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mvkb7svepleb2c2e79f9b4e62cc1e1268f58af5323_JaffaCakes118.exe4⤵PID:5792
-
C:\Users\Admin\huasoj.exe"C:\Users\Admin\huasoj.exe"5⤵PID:12912
-
C:\Users\Admin\Downloads\240919-mtaflsthkd8a5adcbced1730f122b385a576ebb69a07c88423ba69a41b59df35389b7dab0eN.exeC:\Users\Admin\Downloads\240919-mtaflsthkd8a5adcbced1730f122b385a576ebb69a07c88423ba69a41b59df35389b7dab0eN.exe4⤵PID:2764
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe5⤵PID:6376
-
C:\Users\Admin\Downloads\240919-mvpa6athraeb2c4044f81e2d15fa0916364701e772_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mvpa6athraeb2c4044f81e2d15fa0916364701e772_JaffaCakes118.exe4⤵PID:5256
-
C:\Users\Admin\Downloads\240919-mvlv2avepn2e7292627983196f07ae2cc0268196ebbf4b35784aca35dda9e282bf86f0ba11N.exeC:\Users\Admin\Downloads\240919-mvlv2avepn2e7292627983196f07ae2cc0268196ebbf4b35784aca35dda9e282bf86f0ba11N.exe4⤵PID:6356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6356 -s 4405⤵
- Program crash
PID:8588 -
C:\Users\Admin\Downloads\240919-mr4xfatgpa74336c615974e44bbcea28d6ccfb0dec235be8181e82b775165531377b057c2cN.exeC:\Users\Admin\Downloads\240919-mr4xfatgpa74336c615974e44bbcea28d6ccfb0dec235be8181e82b775165531377b057c2cN.exe4⤵PID:5812
-
C:\Users\Admin\Downloads\240919-m2gjwsvgqreb30c8e30eea8cb153fe1d07b2beadb1_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m2gjwsvgqreb30c8e30eea8cb153fe1d07b2beadb1_JaffaCakes118.exe4⤵PID:7052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7052 -s 2205⤵
- Program crash
PID:15552 -
C:\Users\Admin\Downloads\240919-myyn1avfqqdfade1a62a95110072364a8652a33c1be394d6ae4c9cf9bdf9e0394e41db2654N.exeC:\Users\Admin\Downloads\240919-myyn1avfqqdfade1a62a95110072364a8652a33c1be394d6ae4c9cf9bdf9e0394e41db2654N.exe4⤵PID:6052
-
C:\Users\Admin\Downloads\240919-m2tjfsvcpdfile.exeC:\Users\Admin\Downloads\240919-m2tjfsvcpdfile.exe4⤵PID:7832
-
C:\Users\Admin\Downloads\240919-mwgygavfjjcbb80c1655c3d48393b462b06f9dc949ba014517432968aa8972beffc715c512N.exeC:\Users\Admin\Downloads\240919-mwgygavfjjcbb80c1655c3d48393b462b06f9dc949ba014517432968aa8972beffc715c512N.exe4⤵PID:1668
-
C:\Users\Admin\Downloads\240919-mvhhlsthqgee09d66a9ffc05f8b64b63809e24e68c0143b27f27c38a67c1be020cffe5926eN.exeC:\Users\Admin\Downloads\240919-mvhhlsthqgee09d66a9ffc05f8b64b63809e24e68c0143b27f27c38a67c1be020cffe5926eN.exe4⤵PID:2316
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c echo.5⤵PID:8540
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c exec.bat5⤵PID:12016
-
C:\Users\Admin\Downloads\240919-mvdvesthqd81d3b5c3abd888345da43a96a2b9c6e70769317b5f738f1ef2e45f800c1412ecN.exeC:\Users\Admin\Downloads\240919-mvdvesthqd81d3b5c3abd888345da43a96a2b9c6e70769317b5f738f1ef2e45f800c1412ecN.exe4⤵PID:3484
-
C:\Windows\SysWOW64\ourgeafon.exe"C:\Windows\SysWOW64\ourgeafon.exe"5⤵PID:12216
-
C:\Windows\SysWOW64\ourgeafon.exe--k33p6⤵PID:12740
-
C:\Users\Admin\Downloads\240919-mrhzzavdlkeb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mrhzzavdlkeb29c382d8a70b5d78802d04ec5623e4_JaffaCakes118.exe4⤵PID:10760
-
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"5⤵PID:16160
-
C:\Users\Admin\Downloads\240919-myf4ysvfpn65cf666bb503d75ce0e401e15478d86e8ceff6d55c0b3b4adedef5db81b28745N.exeC:\Users\Admin\Downloads\240919-myf4ysvfpn65cf666bb503d75ce0e401e15478d86e8ceff6d55c0b3b4adedef5db81b28745N.exe4⤵PID:12112
-
C:\Users\Admin\Downloads\240919-mqrkqatgka7498547ab318ea7faa635f6f340eb70e2893b6ff3700535b99746e47761514f4N.exeC:\Users\Admin\Downloads\240919-mqrkqatgka7498547ab318ea7faa635f6f340eb70e2893b6ff3700535b99746e47761514f4N.exe4⤵PID:5600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5600 -s 2645⤵
- Program crash
PID:9800 -
C:\Users\Admin\Downloads\240919-m7d1yswbjkeb3402a26a2747107a28f6b0d72b418a_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m7d1yswbjkeb3402a26a2747107a28f6b0d72b418a_JaffaCakes118.exe4⤵PID:14212
-
C:\Users\Admin\Downloads\240919-m67xmsvela1d971154c93265e5623e2dee7804cc4ea6af97bb8b39c84f8f65030dc0221d69N.exeC:\Users\Admin\Downloads\240919-m67xmsvela1d971154c93265e5623e2dee7804cc4ea6af97bb8b39c84f8f65030dc0221d69N.exe4⤵PID:13448
-
C:\Users\Admin\Downloads\240919-mzxs4avglm50df46e8cb6e4fa265bcecca6fbecf6961a61de6dea81827cf26377aad967c5eN.exeC:\Users\Admin\Downloads\240919-mzxs4avglm50df46e8cb6e4fa265bcecca6fbecf6961a61de6dea81827cf26377aad967c5eN.exe4⤵PID:15976
-
C:\Users\Admin\Downloads\240919-m4es3svhpmaf51aa0388be28a1e26c92a20dc5f950c655b63bafb6e170c7dd0386b836ee10N.exeC:\Users\Admin\Downloads\240919-m4es3svhpmaf51aa0388be28a1e26c92a20dc5f950c655b63bafb6e170c7dd0386b836ee10N.exe4⤵PID:15588
-
C:\Windows\SysWOW64\Ekjded32.exeC:\Windows\system32\Ekjded32.exe5⤵PID:12252
-
C:\Windows\SysWOW64\Fbplml32.exeC:\Windows\system32\Fbplml32.exe6⤵PID:11284
-
C:\Windows\SysWOW64\Jppnpjel.exeC:\Windows\system32\Jppnpjel.exe7⤵PID:6604
-
C:\Windows\SysWOW64\Llnnmhfe.exeC:\Windows\system32\Llnnmhfe.exe8⤵PID:3936
-
C:\Windows\SysWOW64\Mfkkqmiq.exeC:\Windows\system32\Mfkkqmiq.exe9⤵PID:5728
-
C:\Windows\SysWOW64\Mohidbkl.exeC:\Windows\system32\Mohidbkl.exe10⤵PID:11144
-
C:\Windows\SysWOW64\Nbebbk32.exeC:\Windows\system32\Nbebbk32.exe11⤵PID:14900
-
C:\Windows\SysWOW64\Oqmhqapg.exeC:\Windows\system32\Oqmhqapg.exe12⤵PID:9012
-
C:\Windows\SysWOW64\Qclmck32.exeC:\Windows\system32\Qclmck32.exe13⤵PID:5048
-
C:\Windows\SysWOW64\Amnebo32.exeC:\Windows\system32\Amnebo32.exe14⤵PID:14652
-
C:\Windows\SysWOW64\Biklho32.exeC:\Windows\system32\Biklho32.exe15⤵PID:7416
-
C:\Windows\SysWOW64\Cgiohbfi.exeC:\Windows\system32\Cgiohbfi.exe16⤵PID:3420
-
C:\Windows\SysWOW64\Dphiaffa.exeC:\Windows\system32\Dphiaffa.exe17⤵PID:14264
-
C:\Windows\SysWOW64\Dalofi32.exeC:\Windows\system32\Dalofi32.exe18⤵PID:13152
-
C:\Users\Admin\Downloads\240919-mvcx5athqbeb2beb49cd7d95254aa7ea3200673b66_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mvcx5athqbeb2beb49cd7d95254aa7ea3200673b66_JaffaCakes118.exe4⤵PID:7992
-
C:\Users\Admin\Downloads\240919-msswkatgrceb2ac7f2583c97a4e22d3e448c3d241d_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-msswkatgrceb2ac7f2583c97a4e22d3e448c3d241d_JaffaCakes118.exe4⤵PID:10808
-
C:\Users\Admin\Downloads\240919-msswkatgrceb2ac7f2583c97a4e22d3e448c3d241d_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-msswkatgrceb2ac7f2583c97a4e22d3e448c3d241d_JaffaCakes118.exe5⤵PID:10988
-
C:\Users\Admin\Downloads\240919-mntbjatfmfeb27e4021af35e509f349581821c0ca4_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mntbjatfmfeb27e4021af35e509f349581821c0ca4_JaffaCakes118.exe4⤵PID:13640
-
C:\Users\Admin\Downloads\240919-ms17yatgrheb2adf03a0878a0a7ac1c85ec76ca18d_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-ms17yatgrheb2adf03a0878a0a7ac1c85ec76ca18d_JaffaCakes118.exe4⤵PID:11908
-
C:\Users\Admin\Downloads\240919-m5ybtavdqfeb32f95d47c5252e6870d03f8d10037a_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m5ybtavdqfeb32f95d47c5252e6870d03f8d10037a_JaffaCakes118.exe4⤵PID:13680
-
C:\Users\Admin\Downloads\240919-m54htsvdrbeb333330ca229b7e901eb06ac5468b18_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m54htsvdrbeb333330ca229b7e901eb06ac5468b18_JaffaCakes118.exe4⤵PID:13704
-
C:\Users\Admin\Downloads\240919-m52dgavdqheb332303433b26cdbdef7e5eeb57c293_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m52dgavdqheb332303433b26cdbdef7e5eeb57c293_JaffaCakes118.exe4⤵PID:14240
-
C:\Users\Admin\Downloads\240919-mn2mxavckla6cad548c5d7d2ca6a39f9fa6a4656825a97287e6c7b7bcd27e4f2c3469a775eN.exeC:\Users\Admin\Downloads\240919-mn2mxavckla6cad548c5d7d2ca6a39f9fa6a4656825a97287e6c7b7bcd27e4f2c3469a775eN.exe4⤵PID:12292
-
C:\Users\Admin\Downloads\240919-mzst5svbpbeb2fb925875ba9c0929b32827f4dc298_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mzst5svbpbeb2fb925875ba9c0929b32827f4dc298_JaffaCakes118.exe4⤵PID:9088
-
C:\Users\Admin\Downloads\240919-mt2j4athng8c546bfc494505d3a248acab48f772c925313e6acc1ec230339b94301c791311N.exeC:\Users\Admin\Downloads\240919-mt2j4athng8c546bfc494505d3a248acab48f772c925313e6acc1ec230339b94301c791311N.exe4⤵PID:11356
-
C:\Users\Admin\Downloads\240919-ms4ytsvdrq80c7d29a1d98676c27132672175396193cb92ee30bdcfbf6a6c0ceb41b3d9616.exeC:\Users\Admin\Downloads\240919-ms4ytsvdrq80c7d29a1d98676c27132672175396193cb92ee30bdcfbf6a6c0ceb41b3d9616.exe4⤵PID:3068
-
C:\Users\Admin\Downloads\240919-mnqkmsvcjkClient-built.exeC:\Users\Admin\Downloads\240919-mnqkmsvcjkClient-built.exe4⤵PID:15440
-
C:\Users\Admin\Downloads\240919-mnqweavcjm4e66ee2a6c2d7aab2585e72af592939c790c86b9aa9e5a641d0214cb250cd83cN.exeC:\Users\Admin\Downloads\240919-mnqweavcjm4e66ee2a6c2d7aab2585e72af592939c790c86b9aa9e5a641d0214cb250cd83cN.exe4⤵PID:13448
-
\??\c:\lffrlfx.exec:\lffrlfx.exe5⤵PID:1204
-
\??\c:\frlfxfx.exec:\frlfxfx.exe6⤵PID:12112
-
\??\c:\dvddj.exec:\dvddj.exe7⤵PID:9588
-
\??\c:\hbnhbt.exec:\hbnhbt.exe8⤵PID:3352
-
\??\c:\dvddv.exec:\dvddv.exe9⤵PID:8044
-
\??\c:\jpjdd.exec:\jpjdd.exe10⤵PID:5920
-
\??\c:\nnhbnn.exec:\nnhbnn.exe11⤵PID:9300
-
\??\c:\bbbthb.exec:\bbbthb.exe12⤵PID:13972
-
\??\c:\9llxxxr.exec:\9llxxxr.exe13⤵PID:9732
-
\??\c:\jdvdd.exec:\jdvdd.exe14⤵PID:2748
-
\??\c:\thnbhb.exec:\thnbhb.exe15⤵PID:14520
-
\??\c:\7rxxffl.exec:\7rxxffl.exe16⤵PID:8020
-
\??\c:\5hnntb.exec:\5hnntb.exe17⤵PID:12976
-
\??\c:\lxxxrxx.exec:\lxxxrxx.exe18⤵PID:1696
-
\??\c:\bnthhn.exec:\bnthhn.exe19⤵PID:6044
-
\??\c:\xxfxlrx.exec:\xxfxlrx.exe20⤵PID:9800
-
\??\c:\pdjjv.exec:\pdjjv.exe21⤵PID:12040
-
\??\c:\djpjd.exec:\djpjd.exe22⤵PID:2636
-
\??\c:\lllrlrr.exec:\lllrlrr.exe23⤵PID:624
-
\??\c:\llrxrrr.exec:\llrxrrr.exe24⤵PID:8116
-
\??\c:\hhtnbt.exec:\hhtnbt.exe25⤵PID:5868
-
\??\c:\lxfrffx.exec:\lxfrffx.exe26⤵PID:8228
-
\??\c:\7hbtnh.exec:\7hbtnh.exe27⤵PID:12204
-
\??\c:\9nnnhh.exec:\9nnnhh.exe28⤵PID:8396
-
\??\c:\pvpjd.exec:\pvpjd.exe29⤵PID:6948
-
\??\c:\3ppjv.exec:\3ppjv.exe30⤵PID:10180
-
\??\c:\1vddp.exec:\1vddp.exe31⤵PID:7416
-
\??\c:\pdjdp.exec:\pdjdp.exe32⤵PID:13776
-
\??\c:\1tbbht.exec:\1tbbht.exe33⤵PID:5448
-
\??\c:\flrlxxr.exec:\flrlxxr.exe34⤵PID:1808
-
\??\c:\vjjjd.exec:\vjjjd.exe35⤵PID:14060
-
\??\c:\9rxrllf.exec:\9rxrllf.exe36⤵PID:15372
-
\??\c:\bhbtnh.exec:\bhbtnh.exe37⤵PID:9140
-
\??\c:\7rrlrlf.exec:\7rrlrlf.exe38⤵PID:14488
-
\??\c:\3dppp.exec:\3dppp.exe39⤵PID:7732
-
\??\c:\5ddvp.exec:\5ddvp.exe40⤵PID:14644
-
\??\c:\rlrlfff.exec:\rlrlfff.exe41⤵PID:6948
-
C:\Users\Admin\Downloads\240919-m7mm4awbjr872408de261d52a97865abf9745812d7b9c0cbcdd3420776f8a201dea7ffa8a8N.exeC:\Users\Admin\Downloads\240919-m7mm4awbjr872408de261d52a97865abf9745812d7b9c0cbcdd3420776f8a201dea7ffa8a8N.exe4⤵PID:15536
-
C:\Users\Admin\Downloads\240919-mngbzatflh1a31d2593ab0d3e27da65aacca07b81f4e1aaf4dc57d3f98c89afb4f8227f7faN.exeC:\Users\Admin\Downloads\240919-mngbzatflh1a31d2593ab0d3e27da65aacca07b81f4e1aaf4dc57d3f98c89afb4f8227f7faN.exe4⤵PID:8928
-
C:\Windows\SysWOW64\Ekajec32.exeC:\Windows\system32\Ekajec32.exe5⤵PID:14572
-
C:\Windows\SysWOW64\Fajbjh32.exeC:\Windows\system32\Fajbjh32.exe6⤵PID:2740
-
C:\Windows\SysWOW64\Giljfddl.exeC:\Windows\system32\Giljfddl.exe7⤵PID:9636
-
C:\Windows\SysWOW64\Jblmgf32.exeC:\Windows\system32\Jblmgf32.exe8⤵PID:14792
-
C:\Windows\SysWOW64\Kefiopki.exeC:\Windows\system32\Kefiopki.exe9⤵PID:5032
-
C:\Windows\SysWOW64\Kekbjo32.exeC:\Windows\system32\Kekbjo32.exe10⤵PID:15372
-
C:\Users\Admin\Downloads\240919-mx374avfnpeb2e47353805460593a70a639814d8e1_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mx374avfnpeb2e47353805460593a70a639814d8e1_JaffaCakes118.exe4⤵PID:11132
-
C:\Users\Admin\Downloads\240919-mtds2avejreb2b2f641e329b59fcc02a46fb10a634_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mtds2avejreb2b2f641e329b59fcc02a46fb10a634_JaffaCakes118.exe4⤵PID:14780
-
C:\Users\Admin\Downloads\240919-m1b8savbreTrojan.Win32.Amadey.RPQ.MTB-b709fde5bdeea494d7a4e5be2a77f9d0e6fc2164efdd39fff1ce83afb60dcf0eNC:\Users\Admin\Downloads\240919-m1b8savbreTrojan.Win32.Amadey.RPQ.MTB-b709fde5bdeea494d7a4e5be2a77f9d0e6fc2164efdd39fff1ce83afb60dcf0eN4⤵PID:16160
-
\??\c:\bhnhbb.exec:\bhnhbb.exe5⤵PID:15948
-
C:\Users\Admin\Downloads\240919-mmszdavbnn31c6bffa2f54e9707ef606e0a715ee45643161241ea0e1deb4d3047e43ac18a0N.exeC:\Users\Admin\Downloads\240919-mmszdavbnn31c6bffa2f54e9707ef606e0a715ee45643161241ea0e1deb4d3047e43ac18a0N.exe4⤵PID:13940
-
C:\Windows\SysWOW64\Fbbicl32.exeC:\Windows\system32\Fbbicl32.exe5⤵PID:2344
-
C:\Windows\SysWOW64\Gihpkd32.exeC:\Windows\system32\Gihpkd32.exe6⤵PID:7516
-
C:\Users\Admin\Downloads\240919-mv5yxavajf20240929162138.exeC:\Users\Admin\Downloads\240919-mv5yxavajf20240929162138.exe4⤵PID:9932
-
C:\Users\Admin\Downloads\240919-mv81kavaka644465c79b2dc18d99f034cdd48bd261401787acb976247c1021955e0676af31N.exeC:\Users\Admin\Downloads\240919-mv81kavaka644465c79b2dc18d99f034cdd48bd261401787acb976247c1021955e0676af31N.exe4⤵PID:14760
-
C:\Users\Admin\Downloads\240919-m2me5svgrleb30f9d8712addb4d0a2f4efdf773985_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-m2me5svgrleb30f9d8712addb4d0a2f4efdf773985_JaffaCakes118.exe4⤵PID:10296
-
C:\Users\Admin\Downloads\240919-m6r67awapqBackdoor.Win32.Padodor.SK.MTB-c76e487fb7867bdc94c633a33352d8263c4802fc36b31fe64077a017870e6c7dNC:\Users\Admin\Downloads\240919-m6r67awapqBackdoor.Win32.Padodor.SK.MTB-c76e487fb7867bdc94c633a33352d8263c4802fc36b31fe64077a017870e6c7dN4⤵PID:15432
-
C:\Windows\SysWOW64\Eohmkb32.exeC:\Windows\system32\Eohmkb32.exe5⤵PID:10136
-
C:\Windows\SysWOW64\Eghkjdoa.exeC:\Windows\system32\Eghkjdoa.exe6⤵PID:8360
-
C:\Windows\SysWOW64\Fqeioiam.exeC:\Windows\system32\Fqeioiam.exe7⤵PID:2388
-
C:\Windows\SysWOW64\Glfmgp32.exeC:\Windows\system32\Glfmgp32.exe8⤵PID:14532
-
C:\Users\Admin\Downloads\240919-mtxk5svemj2024-09-19_be895bd5ac158111518ec50d41fcb871_magniber.exeC:\Users\Admin\Downloads\240919-mtxk5svemj2024-09-19_be895bd5ac158111518ec50d41fcb871_magniber.exe4⤵PID:15472
-
C:\Users\Admin\Downloads\240919-mtckzavejq1356481fedbf6e653b2563e0c6f96ca35d888b00fed78e83fe9b250a16c966a2N.exeC:\Users\Admin\Downloads\240919-mtckzavejq1356481fedbf6e653b2563e0c6f96ca35d888b00fed78e83fe9b250a16c966a2N.exe4⤵PID:6540
-
C:\Users\Admin\Downloads\240919-mypfbsvfqj82e2e9485c4a572a37f6316fd7ea87ac8d4b7295a50ed12efaa5c1bfbf9a594bN.exeC:\Users\Admin\Downloads\240919-mypfbsvfqj82e2e9485c4a572a37f6316fd7ea87ac8d4b7295a50ed12efaa5c1bfbf9a594bN.exe4⤵PID:9672
-
C:\Users\Admin\Downloads\240919-mt9wgathpfd2ed6f8a92dfd74651bb5ef36c1e4e9a0e56be1f21b2e26a789fc533330d3551N.exeC:\Users\Admin\Downloads\240919-mt9wgathpfd2ed6f8a92dfd74651bb5ef36c1e4e9a0e56be1f21b2e26a789fc533330d3551N.exe4⤵PID:15544
-
C:\Windows\SysWOW64\Eohmkb32.exeC:\Windows\system32\Eohmkb32.exe5⤵PID:13068
-
C:\Windows\SysWOW64\Eghkjdoa.exeC:\Windows\system32\Eghkjdoa.exe6⤵PID:16068
-
C:\Windows\SysWOW64\Filapfbo.exeC:\Windows\system32\Filapfbo.exe7⤵PID:3560
-
C:\Windows\SysWOW64\Gpaihooo.exeC:\Windows\system32\Gpaihooo.exe8⤵PID:13904
-
C:\Windows\SysWOW64\Jojdlfeo.exeC:\Windows\system32\Jojdlfeo.exe9⤵PID:12948
-
C:\Windows\SysWOW64\Lindkm32.exeC:\Windows\system32\Lindkm32.exe10⤵PID:15128
-
C:\Windows\SysWOW64\Lancko32.exeC:\Windows\system32\Lancko32.exe11⤵PID:10720
-
C:\Windows\SysWOW64\Mcaipa32.exeC:\Windows\system32\Mcaipa32.exe12⤵PID:9664
-
C:\Windows\SysWOW64\Nofefp32.exeC:\Windows\system32\Nofefp32.exe13⤵PID:14128
-
C:\Windows\SysWOW64\Oifppdpd.exeC:\Windows\system32\Oifppdpd.exe14⤵PID:3640
-
C:\Windows\SysWOW64\Qamago32.exeC:\Windows\system32\Qamago32.exe15⤵PID:9268
-
C:\Windows\SysWOW64\Aibibp32.exeC:\Windows\system32\Aibibp32.exe16⤵PID:2176
-
C:\Windows\SysWOW64\Bjhkmbho.exeC:\Windows\system32\Bjhkmbho.exe17⤵PID:10356
-
C:\Windows\SysWOW64\Ccmcgcmp.exeC:\Windows\system32\Ccmcgcmp.exe18⤵PID:16164
-
C:\Windows\SysWOW64\Ecbeip32.exeC:\Windows\system32\Ecbeip32.exe19⤵PID:3192
-
C:\Windows\SysWOW64\Fboecfii.exeC:\Windows\system32\Fboecfii.exe20⤵PID:13496
-
C:\Windows\SysWOW64\Fdpnda32.exeC:\Windows\system32\Fdpnda32.exe21⤵PID:15948
-
C:\Windows\SysWOW64\Fklcgk32.exeC:\Windows\system32\Fklcgk32.exe22⤵PID:14300
-
C:\Windows\SysWOW64\Gkcigjel.exeC:\Windows\system32\Gkcigjel.exe23⤵PID:14904
-
C:\Windows\SysWOW64\Gcqjal32.exeC:\Windows\system32\Gcqjal32.exe24⤵PID:14648
-
C:\Windows\SysWOW64\Iabglnco.exeC:\Windows\system32\Iabglnco.exe25⤵PID:6336
-
C:\Windows\SysWOW64\Iecmhlhb.exeC:\Windows\system32\Iecmhlhb.exe26⤵PID:4980
-
C:\Windows\SysWOW64\Iloajfml.exeC:\Windows\system32\Iloajfml.exe27⤵PID:8540
-
C:\Windows\SysWOW64\Jnpjlajn.exeC:\Windows\system32\Jnpjlajn.exe28⤵PID:5412
-
C:\Windows\SysWOW64\Jjihfbno.exeC:\Windows\system32\Jjihfbno.exe29⤵PID:3420
-
C:\Windows\SysWOW64\Jbbmmo32.exeC:\Windows\system32\Jbbmmo32.exe30⤵PID:1996
-
C:\Windows\SysWOW64\Kdhbpf32.exeC:\Windows\system32\Kdhbpf32.exe31⤵PID:15440
-
C:\Windows\SysWOW64\Kaaldjil.exeC:\Windows\system32\Kaaldjil.exe32⤵PID:3124
-
C:\Windows\SysWOW64\Lbcedmnl.exeC:\Windows\system32\Lbcedmnl.exe33⤵PID:624
-
C:\Windows\SysWOW64\Mepnaf32.exeC:\Windows\system32\Mepnaf32.exe34⤵PID:10204
-
C:\Windows\SysWOW64\Mcfkpjng.exeC:\Windows\system32\Mcfkpjng.exe35⤵PID:13864
-
C:\Windows\SysWOW64\Nchhfild.exeC:\Windows\system32\Nchhfild.exe36⤵PID:8444
-
C:\Windows\SysWOW64\Nlcidopb.exeC:\Windows\system32\Nlcidopb.exe37⤵PID:10388
-
C:\Windows\SysWOW64\Nlgbon32.exeC:\Windows\system32\Nlgbon32.exe38⤵PID:10152
-
C:\Users\Admin\Downloads\240919-mqsg1stgkbeb2959ca0c5353aa319c46202a4892dd_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mqsg1stgkbeb2959ca0c5353aa319c46202a4892dd_JaffaCakes118.exe4⤵PID:15964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15964 -s 11005⤵
- Program crash
PID:15124 -
C:\Users\Admin\Downloads\240919-mqzlbsvdjleb29823e125d2144ea35c047fff27394_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mqzlbsvdjleb29823e125d2144ea35c047fff27394_JaffaCakes118.exe4⤵PID:14776
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:14380
-
C:\Users\Admin\Downloads\240919-mqyn2avdjkeb2981b73bc45ab7cfc6343eb24dba6d_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mqyn2avdjkeb2981b73bc45ab7cfc6343eb24dba6d_JaffaCakes118.exe4⤵PID:14664
-
C:\Users\Admin\Downloads\240919-mt8cmsvenk07ccd182b9a63c0ca1dbdd05338b53fb9d10efdaca2d6e69b0e54e45fa2b38afN.exeC:\Users\Admin\Downloads\240919-mt8cmsvenk07ccd182b9a63c0ca1dbdd05338b53fb9d10efdaca2d6e69b0e54e45fa2b38afN.exe4⤵PID:11368
-
\??\c:\flfrlff.exec:\flfrlff.exe5⤵PID:1936
-
\??\c:\rxlllll.exec:\rxlllll.exe6⤵PID:6332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6332 -s 2647⤵
- Program crash
PID:7916 -
C:\Users\Admin\Downloads\240919-mx2dhavarhe58b402207d2b765fa885bbeccf0dacb996ac2e5b9ef09dc1188b11b73de4f91N.exeC:\Users\Admin\Downloads\240919-mx2dhavarhe58b402207d2b765fa885bbeccf0dacb996ac2e5b9ef09dc1188b11b73de4f91N.exe4⤵PID:11448
-
C:\Users\Admin\Downloads\240919-m7g3lsvemca7a7279818ba6ea75592fd23debd459645dea54750689bf745f75638ac3f1224N.exeC:\Users\Admin\Downloads\240919-m7g3lsvemca7a7279818ba6ea75592fd23debd459645dea54750689bf745f75638ac3f1224N.exe4⤵PID:15724
-
C:\Windows\SysWOW64\Fkjmlaac.exeC:\Windows\system32\Fkjmlaac.exe5⤵PID:9416
-
C:\Windows\SysWOW64\Gacepg32.exeC:\Windows\system32\Gacepg32.exe6⤵PID:12120
-
C:\Users\Admin\Downloads\240919-mtn9rsveljeb2b67ed7492c18927170a54fc5146cd_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mtn9rsveljeb2b67ed7492c18927170a54fc5146cd_JaffaCakes118.exe4⤵PID:14300
-
C:\Users\Admin\Downloads\240919-my6dvavfrreb2f336a539ceccf2ac72899e7146263_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-my6dvavfrreb2f336a539ceccf2ac72899e7146263_JaffaCakes118.exe4⤵PID:14004
-
C:\Users\Admin\Downloads\240919-mpqa9svcmpeb2880bfad7b42b145fa8316eacb52f0_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mpqa9svcmpeb2880bfad7b42b145fa8316eacb52f0_JaffaCakes118.exe4⤵PID:14124
-
C:\Users\Admin\Downloads\240919-m5j47avdpddc90ed8513d20ad37dea062c775417e024e366126f83684ff42d6a029d01356dN.exeC:\Users\Admin\Downloads\240919-m5j47avdpddc90ed8513d20ad37dea062c775417e024e366126f83684ff42d6a029d01356dN.exe4⤵PID:6060
-
C:\Windows\SysWOW64\Fnbcgn32.exeC:\Windows\system32\Fnbcgn32.exe5⤵PID:12600
-
C:\Windows\SysWOW64\Fbgbnkfm.exeC:\Windows\system32\Fbgbnkfm.exe6⤵PID:13952
-
C:\Windows\SysWOW64\Gbbajjlp.exeC:\Windows\system32\Gbbajjlp.exe7⤵PID:15000
-
C:\Users\Admin\Downloads\240919-mn12datfnc7c670f9680931eb007751eba725afab5c0a7c9a770fdb668c81af27aee9ffafbN.exeC:\Users\Admin\Downloads\240919-mn12datfnc7c670f9680931eb007751eba725afab5c0a7c9a770fdb668c81af27aee9ffafbN.exe4⤵PID:12304
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe5⤵PID:4016
-
C:\Users\Admin\Downloads\240919-mptzfsvcnk584b1cb8e128beec860bab7b541d63ff338bdf87762466c441c9cfeb3407a0deN.exeC:\Users\Admin\Downloads\240919-mptzfsvcnk584b1cb8e128beec860bab7b541d63ff338bdf87762466c441c9cfeb3407a0deN.exe4⤵PID:12484
-
C:\Users\Admin\Downloads\240919-mnwrnavcjq6ccec871e3ddfdd3e5d1eacfec9ab6a4e9e3f0c717b4a068a2996681922e2761N.exeC:\Users\Admin\Downloads\240919-mnwrnavcjq6ccec871e3ddfdd3e5d1eacfec9ab6a4e9e3f0c717b4a068a2996681922e2761N.exe4⤵PID:10832
-
C:\Windows\SysWOW64\Fohfbpgi.exeC:\Windows\system32\Fohfbpgi.exe5⤵PID:10924
-
C:\Windows\SysWOW64\Gpdennml.exeC:\Windows\system32\Gpdennml.exe6⤵PID:16328
-
C:\Windows\SysWOW64\Hhimhobl.exeC:\Windows\system32\Hhimhobl.exe7⤵PID:7468
-
C:\Windows\SysWOW64\Iehmmb32.exeC:\Windows\system32\Iehmmb32.exe8⤵PID:16060
-
C:\Windows\SysWOW64\Kiphjo32.exeC:\Windows\system32\Kiphjo32.exe9⤵PID:15952
-
C:\Windows\SysWOW64\Mfkkqmiq.exeC:\Windows\system32\Mfkkqmiq.exe10⤵PID:11368
-
C:\Windows\SysWOW64\Mcdeeq32.exeC:\Windows\system32\Mcdeeq32.exe11⤵PID:11532
-
C:\Windows\SysWOW64\Nfqnbjfi.exeC:\Windows\system32\Nfqnbjfi.exe12⤵PID:15120
-
C:\Windows\SysWOW64\Oophlo32.exeC:\Windows\system32\Oophlo32.exe13⤵PID:11064
-
C:\Windows\SysWOW64\Qclmck32.exeC:\Windows\system32\Qclmck32.exe14⤵PID:4080
-
C:\Windows\SysWOW64\Aaiqcnhg.exeC:\Windows\system32\Aaiqcnhg.exe15⤵PID:11440
-
C:\Windows\SysWOW64\Bpedeiff.exeC:\Windows\system32\Bpedeiff.exe16⤵PID:13808
-
C:\Windows\SysWOW64\Bbhildae.exeC:\Windows\system32\Bbhildae.exe17⤵PID:15188
-
C:\Windows\SysWOW64\Diqnjl32.exeC:\Windows\system32\Diqnjl32.exe18⤵PID:12648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12648 -s 42819⤵
- Program crash
PID:13976 -
C:\Users\Admin\Downloads\240919-mtzqhathncBackdoor.Win32.Padodor.SK.MTB-d89a3588929ff18e99268bd23bebdfb5bedbf9010707c5d11175e0bf03ab286eNC:\Users\Admin\Downloads\240919-mtzqhathncBackdoor.Win32.Padodor.SK.MTB-d89a3588929ff18e99268bd23bebdfb5bedbf9010707c5d11175e0bf03ab286eN4⤵PID:15852
-
C:\Users\Admin\Downloads\240919-mm59psvbqje5b10ecd8f2d080e42b770ba09bdf07602961a83e63a73eb02664452c9928b39N.exeC:\Users\Admin\Downloads\240919-mm59psvbqje5b10ecd8f2d080e42b770ba09bdf07602961a83e63a73eb02664452c9928b39N.exe4⤵PID:14396
-
C:\Users\Admin\Downloads\240919-mpvwravcnm7da138967ae72c7bf4c4b20f46c38e42ee5cd7b13603918082bf3a0160f96a90N.exeC:\Users\Admin\Downloads\240919-mpvwravcnm7da138967ae72c7bf4c4b20f46c38e42ee5cd7b13603918082bf3a0160f96a90N.exe4⤵PID:12020
-
C:\Windows\SysWOW64\Fganqbgg.exeC:\Windows\system32\Fganqbgg.exe5⤵PID:12836
-
C:\Windows\SysWOW64\Ggmmlamj.exeC:\Windows\system32\Ggmmlamj.exe6⤵PID:12956
-
C:\Windows\SysWOW64\Ibjqaf32.exeC:\Windows\system32\Ibjqaf32.exe7⤵PID:3556
-
C:\Windows\SysWOW64\Kedlip32.exeC:\Windows\system32\Kedlip32.exe8⤵PID:15308
-
C:\Windows\SysWOW64\Lllagh32.exeC:\Windows\system32\Lllagh32.exe9⤵PID:5496
-
C:\Windows\SysWOW64\Ljdkll32.exeC:\Windows\system32\Ljdkll32.exe10⤵PID:7836
-
C:\Windows\SysWOW64\Mfpell32.exeC:\Windows\system32\Mfpell32.exe11⤵PID:9600
-
C:\Windows\SysWOW64\Ncbafoge.exeC:\Windows\system32\Ncbafoge.exe12⤵PID:14320
-
C:\Windows\SysWOW64\Omalpc32.exeC:\Windows\system32\Omalpc32.exe13⤵PID:11232
-
C:\Windows\SysWOW64\Qppaclio.exeC:\Windows\system32\Qppaclio.exe14⤵PID:7760
-
C:\Windows\SysWOW64\Bfmolc32.exeC:\Windows\system32\Bfmolc32.exe15⤵PID:10764
-
C:\Windows\SysWOW64\Dkkaiphj.exeC:\Windows\system32\Dkkaiphj.exe16⤵PID:15256
-
C:\Windows\SysWOW64\Dnngpj32.exeC:\Windows\system32\Dnngpj32.exe17⤵PID:16376
-
C:\Windows\SysWOW64\Fjhmbihg.exeC:\Windows\system32\Fjhmbihg.exe18⤵PID:15104
-
C:\Windows\SysWOW64\Fqdbdbna.exeC:\Windows\system32\Fqdbdbna.exe19⤵PID:5792
-
C:\Windows\SysWOW64\Gqkhda32.exeC:\Windows\system32\Gqkhda32.exe20⤵PID:5980
-
C:\Windows\SysWOW64\Gqbneq32.exeC:\Windows\system32\Gqbneq32.exe21⤵PID:13948
-
C:\Windows\SysWOW64\Hkohchko.exeC:\Windows\system32\Hkohchko.exe22⤵PID:9568
-
C:\Windows\SysWOW64\Ibpgqa32.exeC:\Windows\system32\Ibpgqa32.exe23⤵PID:13488
-
C:\Windows\SysWOW64\Jnedgq32.exeC:\Windows\system32\Jnedgq32.exe24⤵PID:9416
-
C:\Windows\SysWOW64\Kbeibo32.exeC:\Windows\system32\Kbeibo32.exe25⤵PID:14532
-
C:\Users\Admin\Downloads\240919-msfw1avdpn053b148abb83b29b9f0f6618ae0c3eefc79cf910d691ce191a2945c3763ce429N.exeC:\Users\Admin\Downloads\240919-msfw1avdpn053b148abb83b29b9f0f6618ae0c3eefc79cf910d691ce191a2945c3763ce429N.exe4⤵PID:11576
-
C:\Users\Admin\Downloads\240919-mrpshsvdlp7c919725ffa611d3864e8791e6f465f422cd7e35ec69d3838eb37e74487b01b4N.exeC:\Users\Admin\Downloads\240919-mrpshsvdlp7c919725ffa611d3864e8791e6f465f422cd7e35ec69d3838eb37e74487b01b4N.exe4⤵PID:11796
-
C:\Windows\SysWOW64\Fbmohmoh.exeC:\Windows\system32\Fbmohmoh.exe5⤵PID:15328
-
C:\Windows\SysWOW64\Geoapenf.exeC:\Windows\system32\Geoapenf.exe6⤵PID:3264
-
C:\Users\Admin\Downloads\240919-mz5hyavbqceb2ffbe6faa9889a7e6bf8e31b1835aa_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mz5hyavbqceb2ffbe6faa9889a7e6bf8e31b1835aa_JaffaCakes118.exe4⤵PID:8900
-
C:\Users\Admin\Downloads\240919-mqx3havdjj87d8435f113c187203955d1d9c1cc2f80cb66c32a670cb9804145508ac06c7b3N.exeC:\Users\Admin\Downloads\240919-mqx3havdjj87d8435f113c187203955d1d9c1cc2f80cb66c32a670cb9804145508ac06c7b3N.exe4⤵PID:9764
-
C:\Users\Admin\Downloads\240919-mpq8katfqcJJSploit_8.5.0_x64-setup(1).exeC:\Users\Admin\Downloads\240919-mpq8katfqcJJSploit_8.5.0_x64-setup(1).exe4⤵PID:5956
-
C:\Users\Admin\Downloads\240919-mphanavclr4a1dec797e03510f2779843163d7596aa3e5c2985337fbc74bb646be04599ffdN.exeC:\Users\Admin\Downloads\240919-mphanavclr4a1dec797e03510f2779843163d7596aa3e5c2985337fbc74bb646be04599ffdN.exe4⤵PID:4140
-
\??\c:\pjdvp.exec:\pjdvp.exe5⤵PID:8016
-
\??\c:\tnbttt.exec:\tnbttt.exe6⤵PID:1724
-
\??\c:\jpppj.exec:\jpppj.exe7⤵PID:8916
-
\??\c:\rxlrrxx.exec:\rxlrrxx.exe8⤵PID:5084
-
\??\c:\rrffrrr.exec:\rrffrrr.exe9⤵PID:4540
-
\??\c:\bbhbtt.exec:\bbhbtt.exe10⤵PID:13384
-
\??\c:\rllxlll.exec:\rllxlll.exe11⤵PID:13568
-
\??\c:\fllfxxr.exec:\fllfxxr.exe12⤵PID:8980
-
\??\c:\bbtnnh.exec:\bbtnnh.exe13⤵PID:13920
-
\??\c:\pvddp.exec:\pvddp.exe14⤵PID:13100
-
\??\c:\5bnhnn.exec:\5bnhnn.exe15⤵PID:15064
-
\??\c:\hbtnhn.exec:\hbtnhn.exe16⤵PID:16356
-
\??\c:\ddjvj.exec:\ddjvj.exe17⤵PID:15236
-
\??\c:\thhttt.exec:\thhttt.exe18⤵PID:3388
-
\??\c:\5nhbbh.exec:\5nhbbh.exe19⤵PID:13372
-
\??\c:\rrxrxxr.exec:\rrxrxxr.exe20⤵PID:9784
-
\??\c:\3htnhb.exec:\3htnhb.exe21⤵PID:15000
-
\??\c:\5hhbtt.exec:\5hhbtt.exe22⤵PID:14740
-
\??\c:\xrxrxxx.exec:\xrxrxxx.exe23⤵PID:6156
-
\??\c:\dvddj.exec:\dvddj.exe24⤵PID:2216
-
\??\c:\xrfrlll.exec:\xrfrlll.exe25⤵PID:14928
-
\??\c:\1xxfffl.exec:\1xxfffl.exe26⤵PID:16104
-
\??\c:\hhbtbt.exec:\hhbtbt.exe27⤵PID:9184
-
\??\c:\1vjdp.exec:\1vjdp.exe28⤵PID:12736
-
\??\c:\hbbtnh.exec:\hbbtnh.exe29⤵PID:6672
-
\??\c:\vjjjd.exec:\vjjjd.exe30⤵PID:6540
-
\??\c:\dppjj.exec:\dppjj.exe31⤵PID:8044
-
\??\c:\5tthtn.exec:\5tthtn.exe32⤵PID:15676
-
\??\c:\jjpjp.exec:\jjpjp.exe33⤵PID:13284
-
\??\c:\ffxxfxr.exec:\ffxxfxr.exe34⤵PID:13100
-
\??\c:\nnnhbt.exec:\nnnhbt.exe35⤵PID:8784
-
\??\c:\vvdvv.exec:\vvdvv.exe36⤵PID:1180
-
\??\c:\1ppdp.exec:\1ppdp.exe37⤵PID:5856
-
\??\c:\xxxlxrl.exec:\xxxlxrl.exe38⤵PID:9612
-
C:\Users\Admin\Downloads\240919-m4v53avhrl2ab67e4d5eaccf67104f71d055fd74347400c401e85caf22d05aba60aaa6958dN.exeC:\Users\Admin\Downloads\240919-m4v53avhrl2ab67e4d5eaccf67104f71d055fd74347400c401e85caf22d05aba60aaa6958dN.exe4⤵PID:13592
-
C:\Windows\SysWOW64\Eqiibjlj.exeC:\Windows\system32\Eqiibjlj.exe5⤵PID:6284
-
C:\Windows\SysWOW64\Fqppci32.exeC:\Windows\system32\Fqppci32.exe6⤵PID:12040
-
C:\Windows\SysWOW64\Gaebef32.exeC:\Windows\system32\Gaebef32.exe7⤵PID:13980
-
C:\Windows\SysWOW64\Joqafgni.exeC:\Windows\system32\Joqafgni.exe8⤵PID:1204
-
C:\Windows\SysWOW64\Kefiopki.exeC:\Windows\system32\Kefiopki.exe9⤵PID:13016
-
C:\Windows\SysWOW64\Kcmfnd32.exeC:\Windows\system32\Kcmfnd32.exe10⤵PID:1172
-
C:\Users\Admin\Downloads\240919-mpx14stfqe1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N.exeC:\Users\Admin\Downloads\240919-mpx14stfqe1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N.exe4⤵PID:14740
-
C:\Users\Admin\Downloads\240919-m6z7sswaqq1ccca55b4bd5fc4c5d62294717843033ef210903553bce04e0bab0026e893b89N.exeC:\Users\Admin\Downloads\240919-m6z7sswaqq1ccca55b4bd5fc4c5d62294717843033ef210903553bce04e0bab0026e893b89N.exe4⤵PID:15808
-
C:\Windows\SysWOW64\Fkofga32.exeC:\Windows\system32\Fkofga32.exe5⤵PID:4344
-
C:\Users\Admin\Downloads\240919-mz8wcsvgmjeb300ae33ebd5d77c122e698c1e76962_JaffaCakes118.exeC:\Users\Admin\Downloads\240919-mz8wcsvgmjeb300ae33ebd5d77c122e698c1e76962_JaffaCakes118.exe4⤵PID:11128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2276
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2620
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 756 -ip 7561⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2028 -ip 20281⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4040 -ip 40401⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 6356 -ip 63561⤵PID:5356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 7052 -ip 70521⤵PID:12084
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 7992 -ip 79921⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 13680 -ip 136801⤵PID:13504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 14380 -ip 143801⤵PID:13568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 11576 -ip 115761⤵PID:5548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 6332 -ip 63321⤵PID:10356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 12484 -ip 124841⤵PID:13308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 14740 -ip 147401⤵PID:7056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 12064 -ip 120641⤵PID:12112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3068 -ip 30681⤵PID:14112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 8900 -ip 89001⤵PID:6368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 15964 -ip 159641⤵PID:8228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 9932 -ip 99321⤵PID:14436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 12648 -ip 126481⤵PID:9780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
14Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5cd02eca5336317bd124fba25d9d77c79
SHA1b8639f0e4e742c1a7e350d390bfe9fc555d95a27
SHA256c52ad5019f6617828bcc7afbd33169a55c270eccccdfa889011f090ee5458466
SHA512c39d8b2dd9d00b96937d7e7bbe330b5acaeda3e0b642a02dd436193db28277ce7f917b28ad07e0cb060319698044249b791f8e6d8d3a0e836c10ef9d80b9376e
-
Filesize
32KB
MD5749f5c8ea788fc4aa90c92cad5c2c026
SHA15cbd1b3178a1681296bae548bc52ece8256df1da
SHA256b220fe20ad027c52bda9ff829701b1657bc053a4e380ecff48d8d2700f6a30b0
SHA51240c25b60285582459b1609ba3f5e9cbff7370557b0a9f5a9220ccd0be994330a586b1774c9fc59abd25af058e2f58248deaabc5b4432c16d283f8a8a263797ea
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
83KB
MD5dd26ed92888de9c57660a7ad631bb916
SHA177d479d44d9e04f0a1355569332233459b69a154
SHA256324268786921ec940cbd4b5e2f71dafd08e578a12e373a715658527e5b211697
SHA512d693367565005c1b87823e781dc5925146512182c8d8a3a2201e712c88df1c0e66e65ecaec9af22037f0a8f8b3fb3f511ea47cfd5774651d71673fab612d2897
-
Filesize
175KB
MD5d8caf1c098db12b2eba8edae51f31c10
SHA1e533ac6c614d95c09082ae951b3b685daca29a8f
SHA256364208a97336f577d99bbaaed6d2cf8a4a24d6693b323de4665f75a964ca041d
SHA51277e36f4fb44374b7c58a9005a1d7dfeb3214eabb90786e8a7c6593b5b1c7a305d6aa446be7a06ae0ff38f2bedea68cacb39053b7b7ec297bff3571b3922fd938
-
Filesize
122KB
MD5c8afa1ebb28828e1115c110313d2a810
SHA11d0d28799a5dbe313b6f4ddfdb7986d2902fa97a
SHA2568978972cf341ccd0edf8435d63909a739df7ef29ec7dd57ed5cab64b342891f0
SHA5124d9f41bd23b62600d1eb097d1578ba656b5e13fd2f31ef74202aa511111969bb8cfc2a8e903de73bd6e63fadaa59b078714885b8c5b8ecc5c4128ff9d06c1e56
-
Filesize
251KB
MD5cea3b419c7ca87140a157629c6dbd299
SHA17dbff775235b1937b150ae70302b3208833dc9be
SHA25695b9850e6fb335b235589dd1348e007507c6b28e332c9abb111f2a0035c358e5
SHA5126e3a6781c0f05bb5182073cca1e69b6df55f05ff7cdcea394bacf50f88605e2241b7387f1d8ba9f40a96832d04f55edb80003f0cf1e537a26f99408ee9312f5b
-
Filesize
64KB
MD5d19cb5ca144ae1fd29b6395b0225cf40
SHA15b9ec6e656261ce179dfcfd5c6a3cfe07c2dfeb4
SHA256f95ec2562a3c70fb1a6e44d72f4223ce3c7a0f0038159d09dce629f59591d5aa
SHA5129ac3a8a4dbdb09be3760e7ccb11269f82a47b24c03d10d289bcdded9a43e57d3cd656f8d060d66b810382ecac3a62f101f83ea626b58cd0b5a3cca25b67b1519
-
Filesize
156KB
MD58cfbafe65d6e38dde8e2e8006b66bb3e
SHA1cb63addd102e47c777d55753c00c29c547e2243c
SHA2566d548db0ab73291f82cf0f4ca9ec0c81460185319c8965e829faeacae19444ff
SHA512fa021615d5c080aadcd5b84fd221900054eb763a7af8638f70cf6cd49bd92773074f1ac6884f3ce1d8a15d59439f554381377faee4842ed5beb13ff3e1b510f4
-
Filesize
31KB
MD57d91dd8e5f1dbc3058ea399f5f31c1e6
SHA1b983653b9f2df66e721ece95f086c2f933d303fc
SHA25676bba42b1392dc57a867aef385b990fa302a4f1dcf453705ac119c9c98a36e8d
SHA512b8e7369da79255a4bb2ed91ba0c313b4578ee45c94e6bc74582fc14f8b2984ed8fcda0434a5bd3b72ea704e6e8fd8cbf1901f325e774475e4f28961483d6c7cf
-
Filesize
81KB
MD5e43aed7d6a8bcd9ddfc59c2d1a2c4b02
SHA136f367f68fb9868412246725b604b27b5019d747
SHA2562c2a6a6ba360e38f0c2b5a53b4626f833a3111844d95615ebf35be0e76b1ef7a
SHA512d92e26eb88db891de389a464f850a8da0a39af8a4d86d9894768cb97182b8351817ce14fe1eb8301b18b80d1d5d8876a48ba66eb7b874c7c3d7b009fcdbc8c4e
-
Filesize
22KB
MD5a58f3fbbbbb1ecb4260d626b07be2cda
SHA1aed4398a71905952064fc5da1191f57846bbd2d6
SHA25689dd6fbea61edb8f1c934b7e5e822b4ce9bea939ff585c83c197e06a1fd8311a
SHA5127fd371818932384b014d219bb318fb86c1787f3a58a3f08e904b7bbe3486f7ad6bc3776b335c178658c87efd663b913a14fb16d1e52198801659e132fa830d07
-
Filesize
22KB
MD5adf9263b966cea234762c0782aba6e78
SHA1e97047edecf92a0b654f7a25efd5484f13ded88f
SHA25610cd6bf518350f93ab4643f701efdac851cdd7a26a0d8bcabfbb2bd273e1f529
SHA51256c09d786f4ba401d4827da4148d96b140f28f647a03ac6ab94f64de9be4c75ecb8b583efad28aa0c51356978caa96f0cb9d56cc4883ff42c1ee7f736e481c52
-
Filesize
22KB
MD528840d7d1ea0a873fb8f91c3e93d6108
SHA10856b3ceb5e300510b9791b031fffceaa78ee929
SHA256d3fad206a52d9b1dd954c37a45e63e691ebc7bfe8af27a87553203fb445224ce
SHA51293596ec710bd738fcbddf4db0f102f537355bbbaea347d2314d62064d5110cf1deb3ecb6d1e0922f019351acfe2d1c694684d0e62e22c004d5a20a6cae5c7fe3
-
Filesize
22KB
MD5586d46d392348ad2ee25404b9d005a4e
SHA14bece51a5daacf3c7dcff0edf34bcb813512027f
SHA2562859fe2fe069e5f4300dd0106733750b1c8c67ee5d8788c4556b7d21c6da651d
SHA512daad865dbb4ca7542d5bd50186ffa633a709bfe1cf79d0d98e738760634da49afef1c418357d9482dbe33fe995847e05f653b6e3bba00aa42badce47dd072115
-
Filesize
22KB
MD5221f63ee94e3ffb567d2342df588bebc
SHA14831d769ebe1f44bf4c1245ee319f1452d45f3cd
SHA256fd7c5503aa81dea1de9baee318e6a53663f7a4634f42e116e83c6a0f36d11143
SHA5123d36175eaa6dc035f2b26b5638e332408579aa461d663f1cf5a3e9df20e11a7cca982b80c9dcf35ba9a8bc4203ac2f64f5dc043b60a6f16720f4d4ce052096c9
-
Filesize
26KB
MD56ee268f365dc48d407c337d1c7924b0c
SHA13eb808e972ae127c5cfcd787c473526a0caee699
SHA256eb50cc53863c5a1c0b2fe805d9ecefef3f2dbd0e749a6cc142f89406f4ffdb10
SHA512914da19994d7c9b1b02adb118d0b9cb2fdd5433ee448b15e21445ecfc30941045246b7c389a2d9c59fb6487bb00426579b054c946e52982516d09b095279c4d9
-
Filesize
22KB
MD5852904535068e569e2b157f3bca0c08f
SHA1c79b4d109178f4ab8c19ab549286eee4edf6eddb
SHA256202b77cd363fce7c09d9a59b5779f701767c8734cc17bbe8b9ece5a0619f2225
SHA5123e814678c7aa0d3d3a637ce3048e3b472dbb01b2e2a5932e5b257aa76bf8de8117a38e2a352daff66939a73c1b971b302f5635ea1d826b8a3afa49f9b543a541
-
Filesize
22KB
MD5cdfc83e189bda0ac9eab447671754e87
SHA1cf597ee626366738d0ea1a1d8be245f26abbea72
SHA256f4811f251c49c9ae75f9fe25890bacede852e4f1bfdc6685f49096253a43f007
SHA512659ee46e210fcad6c778988a164ce3f69a137d05fb2699ff662540cbb281b38719017f1049d5189fafdae06c07a48d3d29dd98e11c1cae5d47768c243af37fe9
-
Filesize
22KB
MD5c79ccd7c5b752b1289980b0be29804c4
SHA12054a8f9ebf739adfcfc23534759ae52901c189f
SHA2568e910589f3f9a27ed6ce1d4f2d579b4ef99cfa80c0bf6f59b48ba6556e1578a0
SHA51292de7aec7f91f6f4f7cc3dd575b11ea0f4fe516682ba2d05d605380a785597bc953b575cf0ff722980f0849a65d8c4a14c7717eeed8631a7aac0cb626d050e75
-
Filesize
22KB
MD5aa20afdb5cbf1041d355a4234c2c1d45
SHA1811f508bd33e89bbd13e37623b6e2e9e88fdcd7c
SHA256ef6657aac4aa97a57e034fd5baf4490706128ffafce7c285dc8736b1f7ee4d09
SHA51206740552875ff2df234ec76f45cce3c66b7d5280a3d1b90874799780ff534437e5dffacf9e40bfddc301507d833235e25eab8119ac80d2587a43a80d4f0068b8
-
Filesize
22KB
MD5f8203547595aa86bfe2cf85e579de087
SHA1ca31fc30201196931595ac90f87c53e736f64acf
SHA256e2d698823ba78b85d221744f38d3f9e8acccd0eedbb62c13e7d0dff4a04bd2b1
SHA512d0818ee6b1a775793305828ba59c6c0f721d3fe2fcaca5bbfe047f25a500243ab4486c368302636e1c3934becc88c8178606a29871fe019d68b932ad1be3ee1b
-
Filesize
22KB
MD50ccdef1404dbe551cd48604ff4252055
SHA138a8d492356dc2b1f1376bdeacab82d266a9d658
SHA2564863006b0c2aa2a39dff2050b64fbbe448b3e28a239e9e58a9a6d32f5f5a3549
SHA5120846489a418d2480e65f7bef4a564fe68fe554f4a603a6f372ddd03eed7ee6299649b61172a7a9ca9a9500a924c2642493cce1040fcd6601d5862c248c902e9e
-
Filesize
22KB
MD5f1d0595773886d101e684e772118d1ef
SHA1290276053a75cbeb794441965284b18311ab355d
SHA256040e1572da9a980392184b1315f27ebcdaf07a0d94ddf49cbd0d499f7cdb099a
SHA512db57f4ae78f7062cfe392d6829c5975be91d0062ff06725c45c06a74e04ade8bcaf709cfebeba8146fb4396206141aa49572968ea240aa1cba909e43985dc3ee
-
Filesize
22KB
MD53abf2eb0c597131b05ee5b8550a13079
SHA15197da49b5e975675d1b954febb3738d6141f0c8
SHA256ff611cc2cb492c84748fa148eda80dec0cb23fc3b71828475ecea29597c26cd8
SHA512656213a8785fe937c38c58f0f01f693dc10dff1192b232f00fb18aa32c05c76a95566a9148462ea39b39f1740a7fee1c9ac9a90c6810f38512b3103d18c89b72
-
Filesize
22KB
MD583a0b483d37ed23c6e67896d91cea3f0
SHA16b5045ed8717c5b9f50e6a23643357c8c024abdb
SHA256d7511eb9191a63eb293af941667aa2318fa6da79f06119b280e0b11e6b6b1d25
SHA512dab0203fc26c0249b7a8882d41365d82690d908db359c3a6880f41a1c4eebde51ae084bd123864c32d8574cb0a22cfbc94bcd8e33b51f37f49575e2b9de93807
-
Filesize
22KB
MD58b0fe1a0ea86820020d2662873425bc4
SHA13c2292c34a2b53b29f62cc57838e087e98498012
SHA256070d8827798ee2aa4c2dc70d7faef8ef680eca4c46ecc2dad3ce16380cab1f82
SHA5120c29c8fae6c5a8de2f0047cbe66e0b2ae7c30cbeced6df1ea2e472ba123bf9e542d9e6cd8eb06b4f0cbe2e343b7929cf25bce1e79937076bf1d0480d91d2c9b4
-
Filesize
22KB
MD5eaa2228507c1fbde1698256c01cd97b7
SHA1c98936c79b769cf03e2163624b195c152324c88a
SHA2564297033ef8061c797127f0382df24f69264dca5c14d4f5b6cd2bcca33e26c1f5
SHA5128319949a1e1acca312dbe99dfd9eedd1b5e4a13946a6ff829d6792d72f0a3a618ce10140954c035a5390a5a6e3b8ae2f23513629007cd3b7a88d5fb6fd81d763
-
Filesize
22KB
MD5e26a5e364a76bf00feaab920c535adbb
SHA1411eaf1ca1d8f1aebcd816d93933561c927f2754
SHA256b3c0356f64e583c8aca3b1284c6133540a8a12f94b74568fb78ddc36eac6ab15
SHA512333e42eeea07a46db46f222e27429facaaf2ce8a433f0c39f5d5c72e67d894c813d3cf77880434f6373e0d8fffa3ef96d5f37e38dd4775491f3da2b569e9df59
-
Filesize
22KB
MD582e58246846b6daf6ad4e4b208d322d4
SHA180f3b8460ab80d9abe54886417a6bc53fd9289fa
SHA256f6eb755c146d0a0ebf59d24fb9e1e87dc0220b31b33c6acbc8bebaf31493c785
SHA512e1a032846c6110758fbc8eb84dbd3d228e83b3200bf5820c67d9740f6f8c7e926e4c89b92e8d34721d84fd597ab64455fd3029138e35f22329af23f599afdadf
-
Filesize
22KB
MD5650c005113599fb8b0b2e0d357756ac7
SHA156791db00766dc400df477dcb4bd59c6fa509de6
SHA2565f16a1131c8f00ebbe3c4b108bd772071a2d9b4ca01b669b8aeb3ffb43dabcda
SHA5124bc54ad70b75f550e623311dc48ea0fd8ff71207f64127379fcd48027ee2458d27a2aaa454637b4f09d713cc9e1f2cc09bb6cd55b0c6b7ed25e52cb46827fff2
-
Filesize
22KB
MD5f6afbc523b86f27b93074bc04668d3f2
SHA16311708ab0f04cb82accc6c06ae6735a2c691c1d
SHA25671c0c7c163d1a3d35e74f8d7299eb38ef7268af1fa276e9a3966761212c570f0
SHA5129ab0c2d025525fe047e27769c3b2be7526ad0d0cbe76eb1e3a84dc2cff60ab3c4a218388892f600f7b3b003909ae133b0e7da19c9ba96b624fa8f5123c3a97cf
-
Filesize
22KB
MD5445571331c2fc8a153952a6980c1950a
SHA1bea310d6243f2b25f2de8d8d69abaeb117cf2b82
SHA2561dda55027f7d215442e11c88a82c95f312673b7e7454569e5c969c1c24047915
SHA512853797dd50d0ad6018e7e7d11aefbca61653baa8c60b22fdd34133fce6bf6f02ed0c747457c2783e699e8e7097f14429286904267c13521ee9cb255d3ea79806
-
Filesize
22KB
MD55da5938e0d3a9024f42d55e1fd4c0cd7
SHA17e83fec64b4c4a96cfcae26ced9a48d4447f12b7
SHA2560ea1cf78c0be94554ff7cd17a9c863c951c1e1eaa54191d7f2b0e043697c8d00
SHA5129a302c664bfddf509c0489af24a238b15612802c7d6dccbbfb57b39691b80af79ed35cab31e84424a34e0de32179054277ca09a0457b90c72af195f8328c82dd
-
Filesize
22KB
MD5c1919eacf044d5c47cc2c83d3d9c9cd9
SHA10a80158c5999ea9f1c4ca11988456634d7491fcc
SHA2569b82643497092524e0aed6cfbaf7467849cde82292313bbd745c61ed2fd32ea8
SHA512ad2ccabbdc769cbeb3c0b4d8d647647c8f43d3c3f3c85ab638ce00665379f9a0f5bfc24fe25184003d180143c29da0c36c6d2c7ffeae68a81c27b90f69336cbe
-
Filesize
22KB
MD5566232dabd645dcd37961d7ec8fde687
SHA188a7a8c777709ae4b6d47bed6678d0192eb3bc3f
SHA2561290d332718c47961052ebc97a3a71db2c746a55c035a32b72e5ff00eb422f96
SHA512e5d549c461859445006a4083763ce855adbb72cf9a0bcb8958daa99e20b1ca8a82dec12e1062787e2ae8aee94224b0c92171a4d99ed348b94eab921ede205220
-
Filesize
22KB
MD50793ca01735f1d6a40dd6767e06dbb67
SHA16abea799a4a6e94d5a68fab51e79734751e940c5
SHA256cdf7915f619a728fb64c257bfaa8257ee2353bf3c0b88214d5624931a1ac247b
SHA51233f703cea3b6cef3fcbd973812635129ef204c2b1590ffe027dbd55ba35cbd481cf769de16634bd02acbdbd59e6af52cad0964d4d36327606c1948f38048703f
-
Filesize
22KB
MD5eeafb70f56cc0052435c2268021588e9
SHA189c89278c2ac4846ac7b8bd4177965e6f8f3a750
SHA256b529fed3875c6f4eecf2d9c012bc0e27cb2d124c2dd1da155f8337b4cb002030
SHA512ce211b79f4d0dc942dbe1544d7e26e8e6f2c116dce6bc678aede9cb2104771758c0bd670e1eca2d5a9a6728346d093f44459e9791317b215c6ff73e47d1203f8
-
Filesize
26KB
MD517680cd553168e9126ca9d7437caecc7
SHA18acafcb5f01d3b01a7c48a3b91bdeeb8bf1cf841
SHA2566438c683e376583f6368c582ce3caab274cf3f7d7320e7f6cda427ba338847ca
SHA512146ae3230c213ffab4b2c7805374ccb5f53155266ba9213d8f22e073deef0bd733b9488c2091c3db037c1d1dfaa4bbfb90e2afd041a447603c25690681239ae3
-
Filesize
22KB
MD5e9d4a1374a200a6e195e3c5ab42e6bbd
SHA1c0c79309a6ab14592b91087bec0cc519979e5ebf
SHA256612df2aaf3435c2be575581d1b2deddcef33f1b53179acff3e4ac24a0fcd3d50
SHA5121de9d70036eb5211184b3b40f671608cf75b539f6fd36b812facdd9722927eb8e5c4c579db6a360003d06cc139f2ddbda8d19de17cb3a36fcfb53e462a9d7b27
-
Filesize
22KB
MD510a42548fcf16732d354a6ed24f53ec5
SHA1b6b28307c0cc79e0abef15ed25758947c1ccab85
SHA256ca3e5b21f83d87a958ba7934c5e4d8e7939b2e9013fe2deaeba1f9088b4277bb
SHA512ecebb5973ecf8f34115985ae24061c29a9d943592389a4e8f215df7408c770a1f7c6c8927d30403d5c43814a4b64ac622ec018be02532f88dbbca6d6208266ab
-
Filesize
22KB
MD55d3da2f634470ab215345829c1518456
SHA1fec712a88415e68925f63257d3a20ab496c2aac0
SHA256d2ed53111a652fde26c08504803f76301fce2fba04f33a7f250b5b2569e4f240
SHA51216079ce0bcc9816297f23c95573bd52da08b29b90da4855b4315b3fa98947b1b35ffd30760064144f3f5647c27e0c1bd3aba623d17364fff45c9b2fa598a2ba8
-
Filesize
22KB
MD5c74e10b82c8e652efdec8e4d6ad6deaa
SHA1bad903bb9f9ecfda83f0db58d4b281ea458a06bd
SHA256d42b2d466a81e8e64d8132fad0f4df61d33875449ead8d4f76732b04f74bbce6
SHA5125cc4b0d7e862fd32e8374501d1b8798e369b19dc483cdb568915b48a956e4f0a79b1d2c59322394128a330fea7c939161a7af1787b4dc5f250e74f8df8805f6e
-
Filesize
30KB
MD5e07a207d5d3cc852aa6d60325b68ed03
SHA164ba9a5c2ca4b6af03e369a7c2a2b3c79cac6c51
SHA256b8fdf7893ff152a08fbc4d3f962905da3161b0b9fe71393ab68c56199277e322
SHA5120dbafab60618ec0c815ae91994490c55878c904af625ba6931fe0ea80eb229c98e367623e472e3b4c0e27e0af6feeb4d2cdacd4c426e1a99a1291b41cc52f666
-
Filesize
22KB
MD598bf2202e52b98a742f24724bb534166
SHA160a24df76b24aa6946bb16ead9575c7828d264b0
SHA256fe005d1a7908e36d4fd6cb2711de251462c9bebf99e4060687df11bd0bbedc8a
SHA512d346eaf8a966720e47099293d91f2856c816acb7e5f952e6700e007ba176147218798648a4a3e1b928e7a46622ef3603aa4d909113fb02d5551c40ed0e243441
-
Filesize
26KB
MD56edcd747d5beb5d5b0550b9e8c84e3a3
SHA18b8baf8f112ac0a64ee79091b02a412d19497e69
SHA256d5b5c4ee347678e60af236c5e6fd6b47ad5786e080d14fdb11af0aa5740e7760
SHA5121bc72f7b6b13374dab05f8914dc96f194bfa86cad4549a3fca1dd79485cfdbe1d45053f197e2bdd280b8787edcbd96c4c74dffdf044c99520148d153bb0a438e
-
Filesize
26KB
MD5374349666a3b260411281ab95c5405a2
SHA142a9a8f5d1933ec140bd89aa6c42c894285f14d1
SHA2562a6f53be6e8b8fabbf8fcc2ac1224f70628f4ab35e0b36612a6728df7685d56a
SHA5125c4a79503f83eb8e12a38605c1ab2cf6332f7ef845dc7ac5c34dc71cb86e903dc002c91a7142a56433fff97ff21ec926c9cc0be92a31ecffe2a7c5e042d6fc4a
-
Filesize
26KB
MD506f29e2e2ebc8e3d8d0110a48aa7b289
SHA1b9047a9aa94d25f331e85aa343729a7f3ff23773
SHA2566c24d050afc07bc5d2ba5eb07840345569b52e97442bcc7c4413fccedc11e6c4
SHA5129de0b3f3ab2c0ed61920d99e3a931bbc08015d848907bf4cd5cb2c81017de4d23f2f8977a3a7895b92208ae7e5753ab8c4b00c00e375da005b432b5534ea7838
-
Filesize
22KB
MD5a1002f4a501f4a8de33d63f561a9fbc6
SHA1e1217b42c831ce595609cfde857cd1b6727c966d
SHA256fe94985959fe310cafa1eb3e32f28001ef03afefd32497d0c099eb9393bf6f4b
SHA512123a5ebca5d8a1292f238bab3bd8cc12ab3157672a904361a72f5f7177f4ce0dd4708fdfda34f2ed0b4973ad7d92bc69b85651687a4604def4bf7bdca5d49b17
-
Filesize
22KB
MD59f15a5d2f28cca5f4c2b51451fa2db7c
SHA1cef982e7cb6b31787c462d21578c3c750d1f3edb
SHA25633af8b4a4f1f9a76d5d59fdf634bb469ca9a830133a293a5eef1236b27e37e63
SHA5127668d42fd8cce5daa7e0c8c276edd3bda0d4ee1c5450fa8d46cf7600f40b2f56e024f98157a86e9843d0b7d33cb281ebdca3a25275e08981f5d9cbaad1cfe371
-
Filesize
1.3MB
MD5763d1a751c5d47212fbf0caea63f46f5
SHA1845eaa1046a47b5cf376b3dbefcf7497af25f180
SHA256378a4b40f4fa4a8229c93e0afee819085251af03402ccefa3b469651e50e60b7
SHA512bb356dd610e6035f4002671440ce96624addf9a89fd952a6419647a528a551a6ccd0eca0ee2eeb080d9aad683b5afc9415c721fa62c3bcddcb7f1923f59d9c45
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
768KB
MD519a2aba25456181d5fb572d88ac0e73e
SHA1656ca8cdfc9c3a6379536e2027e93408851483db
SHA2562e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337
-
Filesize
66KB
MD58dbe9bbf7118f4862e02cd2aaf43f1ab
SHA1935bc8c5cea4502d0facf0c49c5f2b9c138608ed
SHA25629f173e0147390a99f541ba0c0231fdd7dfbca84d0e2e561ef352bf1ec72f5db
SHA512938f8387dcc356012ac4a952d371664700b110f7111fcc24f5df7d79791ae95bad0dbaf77d2d6c86c820bfd48a6bdbe8858b7e7ae1a77df88e596556c7135ed4
-
Filesize
6.6MB
MD5cae8fa4e7cb32da83acf655c2c39d9e1
SHA17a0055588a2d232be8c56791642cb0f5abbc71f8
SHA2568ad53c67c2b4db4387d5f72ee2a3ca80c40af444b22bf41a6cfda2225a27bb93
SHA512db2190da2c35bceed0ef91d7553ff0dea442286490145c3d0e89db59ba1299b0851e601cc324b5f7fd026414fc73755e8eff2ef5fb5eeb1c54a9e13e7c66dd0c
-
Filesize
30KB
MD579ce1ae3a23dff6ed5fc66e6416600cd
SHA16204374d99144b0a26fd1d61940ff4f0d17c2212
SHA256678e09ad44be42fa9bc9c7a18c25dbe995a59b6c36a13eecc09c0f02a647b6f0
SHA512a4e48696788798a7d061c0ef620d40187850741c2bec357db0e37a2dd94d3a50f9f55ba75dc4d95e50946cbab78b84ba1fc42d51fd498640a231321566613daa
-
Filesize
1.1MB
MD5a9f5b06fae677c9eb5be8b37d5fb1cb9
SHA15c37b880a1479445dd583f85c58a8790584f595d
SHA2564e9e93fd6486571e1b5dce381fa536fb6c5593584d3330368ccd47ee6107bf52
SHA5125d7664716fa52f407d56771862262317ac7f4a03f31f209333c3eea7f1c8cf3d5dbafc1942122948d19208d023df220407014f47e57694e70480a878822b779a
-
Filesize
1.1MB
MD5b848e259fabaf32b4b3c980a0a12488d
SHA1da2e864e18521c86c7d8968db74bb2b28e4c23e2
SHA256c65073b65f107e471c9be3c699fb11f774e9a07581f41229582f7b2154b6fc3c
SHA5124c6953504d1401fe0c74435bceebc5ec7bf8991fd42b659867a3529cee5cc64da54f1ab404e88160e747887a7409098f1a85a546bc40f12f0dde0025408f9e27
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
167KB
MD5809dd59315e8ddc7b8620dcbf40e600f
SHA1bbdd679ef59ada9b40c7c648e8401596e480b962
SHA256801e944ab6513594fffb38572788b6db73e087f4b83555916aec34b2d9ec8971
SHA51206aba4ede1856b652cb85f022a0b29f008c09969d9979aa0fbd1349cce584041b280f339030d096e7877e0e15339e3812dd6aa2a7242302896aac66985e8a11b
-
Filesize
3.1MB
MD5ad65e314e3666c6fbc0f136c99f631da
SHA15137a5d5b2bd39ecba140eb28efc1e16efac3559
SHA25643052c3fb4fe5acac1cfc20ba1bb8ce71519ca8678a7c2dacf51120ca4d82442
SHA5127acb40fd12fe4d4bbcd938bae4a2639a3c126cfd2d711f2a9bf78f3952da72550df0b7cd283721bbf7e1e121ed886039881ebbaec5025975a282e12ddc41af2c
-
Filesize
7.6MB
MD5feafd6863c898b9a03bd500ea81ff4e9
SHA1671070658499e19183b46f67485cd94db883bdea
SHA256dedcf41a2f024eb9eec6da1f19819e58ed9fa446f6040b9ec03786c5a576cace
SHA512b7768e515d97821776b0c360581f7bc4d8a83d41a1179488d965ac6427ee5cabc3945fb21c1160f5ebd3a035474d3bb1bba7f5046b288eee648753cade53ba1d
-
C:\Users\Admin\Downloads\240919-mxw4savarce12a64c0ebf24e1f63bb83600b9274c81bdad7ef7841d51289f4ff674ba2e1cdN.exe
Filesize1.9MB
MD55c225c2d29b64a2d40c0458a1ea231e0
SHA120abbb145adc13e2f9e6e1d50a8252643cf96ff9
SHA256e12a64c0ebf24e1f63bb83600b9274c81bdad7ef7841d51289f4ff674ba2e1cd
SHA51222be5aba700f76de4a3345a725711860fad4f10cdd987f6755a041363a99998270390bcb55f64fcdab26420aca4b1b7af7d78d3b491e99d3c63c7311c3712335
-
Filesize
512KB
MD5eb300ae33ebd5d77c122e698c1e76962
SHA1d031a1748790da389259b4af8f77bc85ed611b42
SHA256f35a237114bbb9ebfe4d666eef61f5da3a1adf0e697ba95d9f7ad9927790793e
SHA512ebaabba921dd2be289548a56642670d4e4ed0d61e48a854120993f91b37ebba7df80eae49d014ce1f02dc307322b067a0c9d524883126472150847f2d289aac4
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
70KB
MD5a49d9d6753733e90e11ab8f702bb1b7b
SHA17c32235912be3a81ca73cb64d1f6990e6135211f
SHA256a5c7ef6ac56be4577d6ad81e6059f3bcfc352fff0b6d9f4fbf96880666083225
SHA51240fd4d4c9d67777f58dad483b26ba2f4d49d2a7e4f78f564cb304efc847cd8418ee5b6093a87ed026d6eb6396391cb7ceb994c97fcd6457d047ce148f6946083
-
Filesize
336KB
MD58ee9a3f304bdf69b723b91f8f4358612
SHA1c06b7be859e093f799c95a600957422cb43da590
SHA256f9f35d80e1ccb69f374a84c8020b89a773dd76eeb161e54b297fda8858b36963
SHA5128ed77cf6080802f26fb580ee1c081bd006adbd3db5fbaea15fbb4a85fbbf32f430cc6fef1a0c13de7ec07cc5d41d6ff3477a17dee9e5f3431eae07ea3e4e80c1
-
Filesize
100KB
MD5b60c9244b8007e7d136ddbed566d136a
SHA1a8fa44f7e09454c2ab9eab6c058d3b274e410116
SHA2567d5cb387ad99d92ae1fbf30243f2414dd799629b8d8146101f76b78a7a28f9a6
SHA512620f73f0dd9f3fd77917aeb8223b262033fe72285b783f0697784c187b4f67e3067726d6d68fe7d08567a6bafcb7422954c9fb15ede7ba496fa971c48d15ed10
-
Filesize
204KB
MD5ad8d8e330360a3862182e779ef1044c6
SHA1bfa2c499ff04951c40090d711a5f42975f133a5d
SHA256929477ab1c8641c571a29800de08b9499aeca8d2794b52b5a730e85f71a8099d
SHA51250a72f0051379df63535c32a8abcfb494f176961fe67c9716304760511470525eb99db1c1921d77cf6ab6f03009a1333eed4bc924454ff5ed2d79f41d051d6e5
-
Filesize
983KB
MD5d939e16cd4522e937acf3785cc317b5e
SHA1f2e956eb726046522820eb359f5e792230875e80
SHA25658b6dad3a1c6eee2f374993039374d7802fd643f492c0c64f7a87662ff480b3b
SHA512d144d8d8dd7bdabddb151c6d67d974fec10b42b5707563b426ae3411400869c62a29ca29508e723940b2e72eeefca8c61570ea0d2777a9350133ca9c23f32469
-
Filesize
96KB
MD57cdf9d7c049b87fa8c0f0383dbef73f6
SHA187c24eeb765eec1e2d6aa23dedad1751262764af
SHA256869e9c14d5fb3015778cb7387f71e719c663963073681044fab2e217f4cfceeb
SHA5127d33f0087dbdd57611b6ada7d274c96a286c8389b2ba0a0031610f3b7c264bd672f566543a263ed8c201c36f7603f706fd33a14f8f288205bdaee7b803e35beb
-
Filesize
96KB
MD53141b5f4d011a2ce2ae254e80c1af8c8
SHA158100b6ece32f4284345e561d326a8e90faa0ec8
SHA2568635382a316605be4675b739bcda8ae9a133c8e2f458be9855f6c72fbd85a926
SHA512153fdfd4ac3482b276f9dc23c300648718ae8cd1a3ae1ba15849f7ff7ea2f93df8f5217ba734fe18b96023da2e2556d19edb7bb1495086f506abfae4f6a05974
-
Filesize
72KB
MD5cf4f93369e2aeef410a2ce3a3dd88f03
SHA160b63da1a7e259ddfbf19c9c7fcac2338bad5a99
SHA2562487a3c2e80a4d78044c10d145fc144480505b2c38805d21c9362c83f1ebbc4b
SHA5125e5c3c31bc482aebb18cc19ff35214286e1b5a615c1f0f229e4a7c09711b3d8a20fbd4e50fdf59beb40cdc194cde06f435da073a955b473f3f393f68abaa09cd
-
Filesize
386KB
MD539f455d7a9e15b5a7c19d97583fe1fd4
SHA174061d8da44b1c9866cfd8face27a531a34f15c5
SHA2563cedb2ba2ecbf632219146c9385ec1f74b268c990e45d949a18e099a08abb503
SHA5123c4a80118fae6814ee3e0a512b05666bba366663e2ea93493ab4a45f174c4d25d3627f3b51966c3f868413274344820c271a136e4b909e20769f533659742fb2
-
Filesize
71KB
MD5c52b03ac650dc45c83058d73bf140020
SHA1184a877a9ea8be59af9df3bf1d590bc9ac31a066
SHA2561c4c82bc1573cbc48fd1c163be11a4c0dba497959010d0e09404d8ba478c1991
SHA51254a0d7edc5eb1036a3c0f9fe1cbbdc4afc06727fec124b8029c6ea571327b44dffa9db96595df0e66e88f10fd698f7d9e1ba785c2d2edf26b1baed1b80d5bda1
-
Filesize
80KB
MD52ec38e0b6ef47cee7ec459e1743927f5
SHA18148507f4277ea01a2d30c2a06e4300195f18be5
SHA256f17a6dc2b923192a7f57611a5266fc0cac127f6cd5864e21865603b2583971df
SHA512a68d6b6c55c03f66133819e07ee15fecb66cb3a2a167c9938bd0073d40f5170386950dc043d3a73c25f1da45ea60d4ca8a869516f02583b2926f29bbaf31f80e
-
Filesize
386KB
MD5bacc96799043d5e579e84c2b35b08f77
SHA17e79f0fe5840ad221304ddc74919eb766173b2fe
SHA2569fd333f3034a28a7c0968bb89a6a4c0d2960366cda2773716429ac82d1de645d
SHA512ff3c344704bfc55ca2faa716686642f08b06e9f6104ddc31d4fdc3dfa05b8aa03b80af0e7b57ce1fef38f1cb77b44538f2b923ab7b393ea868788587913ca3d8
-
Filesize
80KB
MD5adaacff58bdd66fa3ca9e5084c3cc789
SHA1453247e2f49308e152d3f5ebae4acbd44c804f3c
SHA2563b00e1af02bf00e3e524277264ef9e229fc207d7062e63ce624ca2449977e1fc
SHA512266571c9945c4c86ec6230ded524f6953829365fa0f5aeb6d1917b04e73acfcaf08e5029e8c63a66a30fb4b6188564e35675720f8f4b4bfc232c3c8d62430c72
-
Filesize
7KB
MD56a5b1965b3e055c849d361e2032aaed6
SHA14cbd5bcc71fe3b3e683e5fcb671e8bc86903760b
SHA2561cb5c412a9024efd04000a14b79453b103f27a157d0fd4258ad4874f3c8d7d99
SHA512e93407c77c4e5f5e2e9bffdca6f95368429162ee1de682905a25dfb79d26a1be512c467bdcd08feefccfd7bcb1d759106edfab8eba865b6f1e500fc0d856a05d
-
Filesize
7KB
MD5f46e6995a553c51b0f975e83222c4a33
SHA152e3751268531035f730604c08f38804f3ca6ae9
SHA2565f295b99c2d9348fb8834434b588d720d4019cbea60dcd96a68b5c98b22164fb
SHA512e8f30a08106455d737e540a0aa477338e826b1db7a236eeec1d92820999bab39a3ffef1a07d034369beef655496b6886c3ad3295be75768dc898d40bf3aea4fd
-
Filesize
64KB
MD5b170cdfaa3bbee39298e122ee38a474e
SHA112f8c9d0777a9cbd1b4767ebbf2f5b1c1cdf0de6
SHA256276bda143c5117f6820603758ea502f5d413b726fb7807080fa35d0667cfd7d7
SHA512976e51d9b098fbf74f5e56d8886f67d7093b36cab572e4d347a8e72675521571d8709621a2b0924e63937d1faf5eb3fd6e737a24e8668700728bf220b865839f
-
Filesize
71KB
MD5ae3795480b336e007c2f051ee060ffb2
SHA1140f5eefff4ddae28304167cbd4b195691492c1b
SHA256ccba16dca7acfb722ff4b126a6563cb4650e4097a83c0ca3663f0a0eb36c01a1
SHA512ce8a523eedc8ca63605212ccea1e9bf86bd48725e7dbf483778dc5b8655b652a2b89c565eaf01387af0cbe41ec726b0398c12390848bc8e559a772ace9b1f028
-
Filesize
1021KB
MD56e52d6f281f36be5f456fda1abc9b8c5
SHA1a1cf9d0809e027176720aa50aa9c24f182592d68
SHA25696196520154b896f6821f6cc61f6b4a29df40d9c2e0651e8765489bc5dd7d3ef
SHA51208a83d8bd1e0b3120a38862f39a91de3572a95167fdbc01d3ca1afcafcdb1ad39dfdebab67645e54f25857e9d419070a6ada37d611844e20c26eb8054f5c879f
-
Filesize
72KB
MD57bc82b8417076541e991e298f99a6135
SHA17b949e969410bf20eb6e77c90bbb84f9e812c213
SHA256d9bfdb6092e904ededaef5ae8819a9f4e438cba4bf237a6e1995f3557e4519ce
SHA512192c3d4cce3d0bff2a2eb94e716c1f49b982959fe9d4e303277b0b805312d89aae8f6885fc76d57c10b4b49009b56a2c78f2871177c25ea8beec868257433907
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4
-
Filesize
4.4MB
MD59c641873ff6f2c858e45f4291ee702c2
SHA173f0da445b42a74cc56bab0ab8d752d833aeeb2f
SHA2561b975e54be2e077a9c541fbcedf6584a1f4d54b0080df76ed96ca026e8a7cbaa
SHA512dd7b08623a0c21c566cf9007722e705a774627484143edc99d51f538c7612db1c15fb8e149066b796584af0e29170d1cb928992791b6f85b212cf26132ad70cd
-
Filesize
775KB
MD5eb2d9694231bacb7e13389724c054b5e
SHA1f3c09a88b3d68f0a1d66ada412cf41bedc54321c
SHA25667b48f44b86557382c914561ed6168fc850f2e74f1818087f067a12d9e7bf5d7
SHA512a9be9aea94b6cc741c45e3d1ed1380237e635124d5d54b55c671e9d3c949991b97106ec640389471f9ced49e5d167d6e7c726e0a076f2e5b65a39a4fc0de270e
-
Filesize
1.0MB
MD5e19d64c3d8852dbb903c0c7df18a93d4
SHA1458d3c917f6c6cdf52aab0c516b9816ecd4a15ce
SHA256814d0b11b04da64e38100a0f099740a9a45f0ef9d10bbe4d3c39eb18417b6e3f
SHA51224a03c0f7a327f2be90bea89c260f9cd72e258c96addd32fe5c2a13c82e1351d231d60f436373308b3107891f6344cf71c416fc67efc9bf1a3484f68f402d4bf
-
Filesize
73KB
MD5f00e2d1a0b41d6c374be06a64bed5bcf
SHA1fff099ddb79870de1f759f294876e855132f065b
SHA2565cad40a5334032f8f73372ed4dcf8831fe5a3c42f2932793f9c5727bed48edb4
SHA512dba447aa4c7e2158d75107d2efb53e81491eeb405e241a39d8d6ef92a11239690cc4c610a68ece7d284f2a70577121d60c156e7f97037c09d4f366223f129b2f
-
Filesize
263KB
MD5d8918eb76a54f3550f91f31f76c81cf6
SHA104bf9f9279ad66b83f483fd8649328db39b386ed
SHA256701ea6a3b66263e1d6f5fe66c7ded3fa875bfb8aa3613aa816cfdef3aaf94e74
SHA5128047b939a0189c0597d1205deb3f716768c669ff1ad2f601e62de98ff62b1cae31594d976049032801b687cfa10c259903c91f56f9f8ecbd5d6801b5091e6a0b
-
Filesize
82KB
MD57bfd05e5f2807e95d66847236943267a
SHA13b027b75fa6427327d7f1aa079a929ebf75bcfd6
SHA2564254e2670299d08a740ddad59ae5a60de064dd9880a21aaa99d558475c079732
SHA512b787764862f4a3892934781a9753e97d8ff0dfccf2ba750d189119230c17aae23ade7673902e7b6d7e963b00c9f68de65a0db1b12771063be86f4dfffe014d32
-
Filesize
141KB
MD55c32758f77c6b4261ee571b8a2858b19
SHA1dd44e6436795b2d9307a7b0c2280b91b67fd3ff1
SHA2561427b3c926e119fcb2cfea4cc5eb6c6e5a018fbe17e7e72f8529438244e0165d
SHA512659969b4eb2276b800e1d144d36ec6a009376c7d6b7f07aa417f9beecc53c0eff865703d6a581744747d61b41f89e683db9450c183ff3e14b6629e51a189714c
-
Filesize
460KB
MD59e9a00206bedeeba220f624258556695
SHA1bc9234adcb41266b163d12a490f1d705b4f73169
SHA2569eebb546264d078dd8bae700578d006808bcb188f61f31d9e7b71ddd8e2a494f
SHA512b755b65fc918dc0a9d9c764aa0428ac6f6cebb784147d7c2b6cddebc671ac5db3e83f3350c161c79bc0c059ffc4cbdda79ad471d70f8e6b60bf9faf0f3b31074
-
Filesize
100KB
MD521cd1cd6edc5ea4a51f9567f1e984f02
SHA16d5c37222ef5e7c1258e28ee51d67a4b9b797cc2
SHA2565aecf177e0d82b0e05c05786bc5f91ca78e651545c5e2a99b170d80f99dc3027
SHA51266e94132fb99b60b07fa479d397ec93c62f77449795d2f241c73e8b4f90b32c84029cf6a517a14dfe6aefd3d8826acd5c8cae7441b3dac2989deeedf751dff3e