Analysis
-
max time kernel
10s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
015669113f4cd43538b6ebae14aed713
-
SHA1
d9229da5e1d349bbdea0f59338f3aa51b6ed4c9c
-
SHA256
12d7c3950d7cc14a258aa625f547cb911037ff1f1108859f3dc81bd9952f9624
-
SHA512
e71f75d96fc41838e7ff33f97c5f2e27bfd45e5fe4abda5f600ea07f0bee9ed48b8d7639f1d43d769d931ad502ec1a4e064d86beb512335e9c74eb20c31c8306
-
SSDEEP
24576:X4JH/TYq8ppSkhB4q/yOvAZLDwPc25AFB3KWS/hdkAkiOippg+YiV:X4JH8Bn6pZLiZ54aWQhdkAkipWeV
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 3616 DECB07.EXE 3752 DECB07.EXE 4588 DECB07.EXE 4524 DECB07.EXE 428 DECB07.EXE 2560 DECB07.EXE 4444 DECB07.EXE 1680 DECB07.EXE 4928 DECB07.EXE 1084 DECB07.EXE 1764 DECB07.EXE 2356 DECB07.EXE -
Loads dropped DLL 64 IoCs
pid Process 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 1680 DECB07.EXE 1680 DECB07.EXE 1680 DECB07.EXE 1680 DECB07.EXE 1680 DECB07.EXE 1680 DECB07.EXE 1680 DECB07.EXE 4928 DECB07.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 13 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE File opened for modification \??\PhysicalDrive0 DECB07.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe File created C:\Windows\SysWOW64\B526A5\DECB07.EXE 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File created C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\B526A5\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\06794E\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\04764D\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\B526A5\DECB07.EXE DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE File opened for modification C:\Windows\SysWOW64\02A732\ DECB07.EXE -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DECB07.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 6 IoCs
pid Process 3868 explorer.exe 2280 explorer.exe 1852 explorer.exe 1668 explorer.exe 1644 explorer.exe 1896 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3616 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 3752 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 4588 DECB07.EXE 2280 explorer.exe 2280 explorer.exe 4524 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 4524 DECB07.EXE 3868 explorer.exe 3868 explorer.exe 4524 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 428 DECB07.EXE 1852 explorer.exe 1852 explorer.exe 1668 explorer.exe 1668 explorer.exe 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 2560 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 4444 DECB07.EXE 1896 explorer.exe 1896 explorer.exe 1644 explorer.exe 1644 explorer.exe 1680 DECB07.EXE 1680 DECB07.EXE 1680 DECB07.EXE 1680 DECB07.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 1192 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 89 PID 4604 wrote to memory of 1192 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 89 PID 4604 wrote to memory of 1192 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 89 PID 4604 wrote to memory of 3616 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 91 PID 4604 wrote to memory of 3616 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 91 PID 4604 wrote to memory of 3616 4604 015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe 91 PID 3616 wrote to memory of 2312 3616 DECB07.EXE 145 PID 3616 wrote to memory of 2312 3616 DECB07.EXE 145 PID 3616 wrote to memory of 2312 3616 DECB07.EXE 145 PID 3616 wrote to memory of 3752 3616 DECB07.EXE 93 PID 3616 wrote to memory of 3752 3616 DECB07.EXE 93 PID 3616 wrote to memory of 3752 3616 DECB07.EXE 93 PID 3752 wrote to memory of 868 3752 DECB07.EXE 95 PID 3752 wrote to memory of 868 3752 DECB07.EXE 95 PID 3752 wrote to memory of 868 3752 DECB07.EXE 95 PID 3752 wrote to memory of 4588 3752 DECB07.EXE 96 PID 3752 wrote to memory of 4588 3752 DECB07.EXE 96 PID 3752 wrote to memory of 4588 3752 DECB07.EXE 96 PID 4588 wrote to memory of 1432 4588 DECB07.EXE 98 PID 4588 wrote to memory of 1432 4588 DECB07.EXE 98 PID 4588 wrote to memory of 1432 4588 DECB07.EXE 98 PID 4588 wrote to memory of 4524 4588 DECB07.EXE 99 PID 4588 wrote to memory of 4524 4588 DECB07.EXE 99 PID 4588 wrote to memory of 4524 4588 DECB07.EXE 99 PID 4524 wrote to memory of 2580 4524 DECB07.EXE 132 PID 4524 wrote to memory of 2580 4524 DECB07.EXE 132 PID 4524 wrote to memory of 2580 4524 DECB07.EXE 132 PID 4524 wrote to memory of 428 4524 DECB07.EXE 102 PID 4524 wrote to memory of 428 4524 DECB07.EXE 102 PID 4524 wrote to memory of 428 4524 DECB07.EXE 102 PID 428 wrote to memory of 2668 428 DECB07.EXE 104 PID 428 wrote to memory of 2668 428 DECB07.EXE 104 PID 428 wrote to memory of 2668 428 DECB07.EXE 104 PID 428 wrote to memory of 2560 428 DECB07.EXE 105 PID 428 wrote to memory of 2560 428 DECB07.EXE 105 PID 428 wrote to memory of 2560 428 DECB07.EXE 105 PID 2560 wrote to memory of 2964 2560 DECB07.EXE 107 PID 2560 wrote to memory of 2964 2560 DECB07.EXE 107 PID 2560 wrote to memory of 2964 2560 DECB07.EXE 107 PID 2560 wrote to memory of 4444 2560 DECB07.EXE 108 PID 2560 wrote to memory of 4444 2560 DECB07.EXE 108 PID 2560 wrote to memory of 4444 2560 DECB07.EXE 108 PID 4444 wrote to memory of 4512 4444 DECB07.EXE 110 PID 4444 wrote to memory of 4512 4444 DECB07.EXE 110 PID 4444 wrote to memory of 4512 4444 DECB07.EXE 110 PID 4444 wrote to memory of 1680 4444 DECB07.EXE 112 PID 4444 wrote to memory of 1680 4444 DECB07.EXE 112 PID 4444 wrote to memory of 1680 4444 DECB07.EXE 112 PID 1680 wrote to memory of 3444 1680 DECB07.EXE 114 PID 1680 wrote to memory of 3444 1680 DECB07.EXE 114 PID 1680 wrote to memory of 3444 1680 DECB07.EXE 114 PID 1680 wrote to memory of 4928 1680 DECB07.EXE 115 PID 1680 wrote to memory of 4928 1680 DECB07.EXE 115 PID 1680 wrote to memory of 4928 1680 DECB07.EXE 115 PID 4928 wrote to memory of 2852 4928 DECB07.EXE 117 PID 4928 wrote to memory of 2852 4928 DECB07.EXE 117 PID 4928 wrote to memory of 2852 4928 DECB07.EXE 117 PID 4928 wrote to memory of 1084 4928 DECB07.EXE 140 PID 4928 wrote to memory of 1084 4928 DECB07.EXE 140 PID 4928 wrote to memory of 1084 4928 DECB07.EXE 140 PID 1084 wrote to memory of 2728 1084 DECB07.EXE 120 PID 1084 wrote to memory of 2728 1084 DECB07.EXE 120 PID 1084 wrote to memory of 2728 1084 DECB07.EXE 120 PID 1084 wrote to memory of 1764 1084 DECB07.EXE 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\015669113f4cd43538b6ebae14aed713_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\015669113f4cd43538b6ebae14aed713_JaffaCakes1182⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB073⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB074⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB075⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB076⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB077⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB078⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB079⤵
- System Location Discovery: System Language Discovery
PID:4512
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0710⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0711⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0712⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0713⤵
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0714⤵PID:2092
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE14⤵PID:1672
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0715⤵PID:3416
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE15⤵PID:3736
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0716⤵PID:2580
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE16⤵PID:3080
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0717⤵PID:3904
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE17⤵PID:1764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0718⤵PID:4620
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE18⤵PID:1084
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0719⤵PID:4344
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE19⤵PID:4400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0720⤵PID:3168
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE20⤵PID:2312
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0721⤵PID:4840
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE21⤵PID:884
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0722⤵PID:5224
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE22⤵PID:5292
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0723⤵PID:5408
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE23⤵PID:5476
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0724⤵PID:5588
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE24⤵PID:5676
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0725⤵PID:5784
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE25⤵PID:5856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0726⤵PID:5936
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE26⤵PID:6016
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0727⤵PID:3428
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE27⤵PID:3552
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0728⤵PID:4956
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE28⤵PID:5240
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0729⤵PID:5444
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE29⤵PID:5880
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0730⤵PID:6080
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE30⤵PID:5788
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0731⤵PID:2460
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE31⤵PID:6044
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0732⤵PID:3168
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE32⤵PID:5980
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0733⤵PID:4656
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE33⤵PID:5528
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0734⤵PID:6172
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE34⤵PID:6292
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0735⤵PID:6428
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE35⤵PID:6488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0736⤵PID:6572
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE36⤵PID:6652
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0737⤵PID:6764
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE37⤵PID:6836
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0738⤵PID:7040
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE38⤵PID:7112
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0739⤵PID:3416
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE39⤵PID:6392
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0740⤵PID:6248
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE40⤵PID:6704
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0741⤵PID:6560
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE41⤵PID:6764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0742⤵PID:6172
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE42⤵PID:6468
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0743⤵PID:6568
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE43⤵PID:6176
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0744⤵PID:7136
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE44⤵PID:4004
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0745⤵PID:7316
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE45⤵PID:7388
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0746⤵PID:7536
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE46⤵PID:7620
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0747⤵PID:7712
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE47⤵PID:7764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0748⤵PID:7880
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE48⤵PID:7940
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0749⤵PID:8048
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE49⤵PID:8096
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0750⤵PID:7192
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE50⤵PID:7248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0751⤵PID:5088
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE51⤵PID:7080
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0752⤵PID:3344
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE52⤵PID:7348
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0753⤵PID:7836
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE53⤵PID:7512
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0754⤵PID:7620
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE54⤵PID:7892
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0755⤵PID:6276
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE55⤵PID:4120
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0756⤵PID:4024
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE56⤵PID:4856
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0757⤵PID:5464
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE57⤵PID:3344
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0758⤵PID:7728
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE58⤵PID:7884
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0759⤵PID:8084
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE59⤵PID:5944
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0760⤵PID:4016
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE60⤵PID:1628
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0761⤵PID:8084
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE61⤵PID:8016
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0762⤵PID:3164
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE62⤵PID:8280
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0763⤵PID:8400
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE63⤵PID:8444
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0764⤵PID:8596
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE64⤵PID:8644
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0765⤵PID:8756
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE65⤵PID:8840
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0766⤵PID:8956
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE66⤵PID:9020
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0767⤵PID:9132
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE67⤵PID:9180
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0768⤵PID:7244
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE68⤵PID:8304
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0769⤵PID:8228
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE69⤵PID:7624
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0770⤵PID:6300
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE70⤵PID:8292
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0771⤵PID:8456
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE71⤵PID:6996
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0772⤵PID:9176
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE72⤵PID:8876
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0773⤵PID:7628
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE73⤵PID:6200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0774⤵PID:3396
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE74⤵PID:8420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0775⤵PID:3932
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE75⤵PID:3156
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0776⤵PID:3316
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE76⤵PID:6300
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0777⤵PID:5308
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE77⤵PID:7720
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0778⤵PID:8420
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE78⤵PID:8348
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0779⤵PID:7604
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE79⤵PID:6300
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0780⤵PID:9292
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE80⤵PID:9336
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0781⤵PID:9436
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE81⤵PID:9488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0782⤵PID:9600
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE82⤵PID:9648
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0783⤵PID:9772
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE83⤵PID:9820
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0784⤵PID:9944
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE84⤵PID:9988
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0785⤵PID:10120
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE85⤵PID:10152
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0786⤵PID:3396
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE86⤵PID:9296
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0787⤵PID:7896
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE87⤵PID:5308
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0788⤵PID:5556
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE88⤵PID:9788
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0789⤵PID:10164
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE89⤵PID:9936
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0790⤵PID:7068
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE90⤵PID:9332
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0791⤵PID:9588
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE91⤵PID:9292
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0792⤵PID:4488
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE92⤵PID:7604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0793⤵PID:9832
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE93⤵PID:9928
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0794⤵PID:6788
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE94⤵PID:4488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0795⤵PID:9832
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE95⤵PID:6292
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0796⤵PID:10340
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE96⤵PID:10384
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0797⤵PID:10508
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE97⤵PID:10544
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0798⤵PID:10652
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE98⤵PID:10692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB0799⤵PID:10856
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE99⤵PID:10896
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07100⤵PID:10996
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE100⤵PID:11028
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07101⤵PID:11164
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE101⤵PID:11200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07102⤵PID:6440
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE102⤵PID:10324
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07103⤵PID:10360
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE103⤵PID:8760
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07104⤵PID:8004
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE104⤵PID:10668
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07105⤵PID:10872
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE105⤵PID:4288
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07106⤵PID:11040
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE106⤵PID:7172
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07107⤵PID:11028
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE107⤵PID:8704
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07108⤵PID:10388
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE108⤵PID:10664
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07109⤵PID:8760
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE109⤵PID:11068
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07110⤵PID:4132
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE110⤵PID:8564
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07111⤵PID:8456
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE111⤵PID:10872
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07112⤵PID:4756
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE112⤵PID:8336
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07113⤵PID:10880
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE113⤵PID:7772
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07114⤵PID:9720
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE114⤵PID:11068
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07115⤵PID:10224
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE115⤵PID:2832
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07116⤵PID:11364
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE116⤵PID:11412
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07117⤵PID:11524
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE117⤵PID:11572
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07118⤵PID:11752
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE118⤵PID:11800
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07119⤵PID:11872
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE119⤵PID:11904
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07120⤵PID:12060
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE120⤵PID:12100
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07121⤵PID:12220
-
-
C:\Windows\SysWOW64\B526A5\DECB07.EXEC:\Windows\system32\B526A5\DECB07.EXE121⤵PID:6736
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B526A5\DECB07122⤵PID:11376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-