Analysis
-
max time kernel
12s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
7b8ab805d1f05e438993fd4f25b60827
-
SHA1
988f6c403a8981b23782ba92e6da9636383e8a6d
-
SHA256
f619e625c73d1cdb069792c0d582cc206e7d7f009de1b4268918c437f1fabeea
-
SHA512
500d6101c8d308327e026d1dd68f7188ff6fec9f54a406b11cefb8e2e9f9def838747553bf4c7011e83650d2862281c0088dbede7593b0001d32fa1e900ea3e0
-
SSDEEP
24576:UW8dHfxwJKzOghaOactYnBwkiXhz/k00c96j5xUwDVR+LNwsdpn:UW8NYdgh6elkRSQ5lDVsLNxT
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 2 IoCs
resource yara_rule behavioral1/files/0x00080000000169f5-24.dat family_ardamax behavioral1/files/0x0006000000016e1d-56.dat family_ardamax -
Executes dropped EXE 64 IoCs
pid Process 1852 loader.exe 1844 EGAF.exe 2468 loader.exe 2816 EGAF.exe 2800 loader.exe 1564 loader.exe 2864 EGAF.exe 304 loader.exe 2772 EGAF.exe 2776 EGAF.exe 2660 loader.exe 1340 loader.exe 1260 EGAF.exe 2276 EGAF.exe 2640 loader.exe 2348 EGAF.exe 1688 loader.exe 1292 EGAF.exe 600 loader.exe 1828 EGAF.exe 832 loader.exe 1680 EGAF.exe 2128 loader.exe 1240 EGAF.exe 1604 loader.exe 2388 EGAF.exe 1520 loader.exe 1836 EGAF.exe 2780 loader.exe 2300 EGAF.exe 2124 loader.exe 2808 EGAF.exe 2520 loader.exe 2676 EGAF.exe 2872 loader.exe 2996 EGAF.exe 2656 loader.exe 2944 EGAF.exe 2688 loader.exe 1344 EGAF.exe 1200 loader.exe 1448 EGAF.exe 3052 loader.exe 1996 EGAF.exe 3016 loader.exe 2012 EGAF.exe 2764 loader.exe 940 EGAF.exe 660 loader.exe 1932 EGAF.exe 600 loader.exe 1140 EGAF.exe 752 loader.exe 2064 EGAF.exe 2428 loader.exe 1424 EGAF.exe 2476 loader.exe 1712 EGAF.exe 1636 loader.exe 328 EGAF.exe 1852 loader.exe 2708 EGAF.exe 2532 loader.exe 2636 EGAF.exe -
Loads dropped DLL 64 IoCs
pid Process 2368 7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe 2368 7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe 1852 loader.exe 1852 loader.exe 1852 loader.exe 2468 loader.exe 2468 loader.exe 2468 loader.exe 2800 loader.exe 2800 loader.exe 2800 loader.exe 1564 loader.exe 1564 loader.exe 1564 loader.exe 304 loader.exe 304 loader.exe 1844 EGAF.exe 1844 EGAF.exe 2776 EGAF.exe 2776 EGAF.exe 304 loader.exe 304 loader.exe 304 loader.exe 2660 loader.exe 2660 loader.exe 2660 loader.exe 1340 loader.exe 2864 EGAF.exe 1260 EGAF.exe 1340 loader.exe 1340 loader.exe 1340 loader.exe 2864 EGAF.exe 2276 EGAF.exe 2276 EGAF.exe 2640 loader.exe 2640 loader.exe 2348 EGAF.exe 2348 EGAF.exe 2640 loader.exe 2640 loader.exe 2640 loader.exe 1688 loader.exe 1688 loader.exe 1688 loader.exe 600 loader.exe 1292 EGAF.exe 1292 EGAF.exe 600 loader.exe 1828 EGAF.exe 600 loader.exe 1828 EGAF.exe 600 loader.exe 600 loader.exe 832 loader.exe 832 loader.exe 1680 EGAF.exe 1680 EGAF.exe 832 loader.exe 832 loader.exe 832 loader.exe 2128 loader.exe 2128 loader.exe 1240 EGAF.exe -
Adds Run key to start application 2 TTPs 59 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EGAF Agent = "C:\\Windows\\SysWOW64\\28463\\EGAF.exe" EGAF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File opened for modification C:\Windows\SysWOW64\28463\key.bin loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463 EGAF.exe File opened for modification C:\Windows\SysWOW64\28463\key.bin loader.exe File created C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File opened for modification C:\Windows\SysWOW64\28463 EGAF.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463 EGAF.exe File opened for modification C:\Windows\SysWOW64\28463\key.bin loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.006 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File opened for modification C:\Windows\SysWOW64\28463\key.bin loader.exe File opened for modification C:\Windows\SysWOW64\28463\key.bin loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463 EGAF.exe File opened for modification C:\Windows\SysWOW64\28463 EGAF.exe File created C:\Windows\SysWOW64\28463\EGAF.006 loader.exe File opened for modification C:\Windows\SysWOW64\28463\key.bin loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.006 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe loader.exe File created C:\Windows\SysWOW64\28463\EGAF.006 loader.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.006 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.007 loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File opened for modification C:\Windows\SysWOW64\28463\key.bin loader.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\key.bin loader.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe loader.exe File created C:\Windows\SysWOW64\28463\EGAF.006 loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.001 loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.006 loader.exe File created C:\Windows\SysWOW64\28463\EGAF.exe loader.exe File opened for modification C:\Windows\SysWOW64\28463\EGAF.007 loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loader.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515}\TypeLib\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0\0\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\Version EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515}\Version\ = "1.0" EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4} EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\0\win64 EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0 EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0\ = "GrooveToolContainerAlpha" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\TypeLib\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515}\VersionIndependentProgID EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4}\ = "Kanop" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\InprocServer32\ = "%SystemRoot%\\SysWow64\\iasnap.dll" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\HELPDIR\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shell32.dll" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\ = "Segonil.Rifazo" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4}\InProcServer32\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62} EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\InprocServer32 EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515}\Programmable\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\0\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\FLAGS\ = "0" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0\0\win32 EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\FLAGS EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4}\Version EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\ProgID EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\TypeLib\ = "{50809CF9-EF94-BF8D-DA75-C1930BE92073}" EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515}\Version EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4}\TypeLib\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0 EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515}\VersionIndependentProgID\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4}\ProgID\ = "Shell.Application.1" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\HELPDIR\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\ProgID\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515}\Version\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\0\win32 EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\TypeLib EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\0 EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\0\win32 EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0 EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4}\Version\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\105" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{83CFAA16-A310-469B-E583-2B5112799AB4}\Version\ = "1.1" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0\FLAGS\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0\HELPDIR EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\VersionIndependentProgID\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\FLAGS EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\80" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\InprocServer32\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0\ EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{50809CF9-EF94-BF8D-DA75-C1930BE92073}\1.0\FLAGS EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\VersionIndependentProgID EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515} EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6ED22B9F-76F1-07E3-86EE-C4CC7B7B5314}\1.0\ = "Groove Telespace Members 1.0 Type Library" EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63804EEB-1FBD-4D62-9783-5A17660E1515}\Programmable EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\atl.dll" EGAF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\HELPDIR EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\ProgID\ = "IAS.EAPTypes.1" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\0\win32\ EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27071857-E1D7-457C-5289-FFE08FC20A62}\VersionIndependentProgID\ = "IAS.EAPTypes" EGAF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{829FA2E0-3ED1-4DA3-7C82-1507C48C3BA6}\1.0\HELPDIR\ = "%SYSTEMROOT%\\" EGAF.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 1844 EGAF.exe Token: SeIncBasePriorityPrivilege 1844 EGAF.exe Token: 33 2864 EGAF.exe Token: SeIncBasePriorityPrivilege 2864 EGAF.exe Token: 33 2348 EGAF.exe Token: SeIncBasePriorityPrivilege 2348 EGAF.exe Token: 33 1292 EGAF.exe Token: SeIncBasePriorityPrivilege 1292 EGAF.exe Token: 33 1828 EGAF.exe Token: SeIncBasePriorityPrivilege 1828 EGAF.exe Token: 33 1680 EGAF.exe Token: SeIncBasePriorityPrivilege 1680 EGAF.exe Token: 33 1240 EGAF.exe Token: SeIncBasePriorityPrivilege 1240 EGAF.exe Token: 33 2388 EGAF.exe Token: SeIncBasePriorityPrivilege 2388 EGAF.exe Token: 33 1836 EGAF.exe Token: SeIncBasePriorityPrivilege 1836 EGAF.exe Token: 33 2808 EGAF.exe Token: SeIncBasePriorityPrivilege 2808 EGAF.exe Token: 33 2996 EGAF.exe Token: SeIncBasePriorityPrivilege 2996 EGAF.exe Token: 33 2944 EGAF.exe Token: SeIncBasePriorityPrivilege 2944 EGAF.exe Token: 33 1344 EGAF.exe Token: SeIncBasePriorityPrivilege 1344 EGAF.exe Token: 33 1448 EGAF.exe Token: SeIncBasePriorityPrivilege 1448 EGAF.exe Token: 33 1996 EGAF.exe Token: SeIncBasePriorityPrivilege 1996 EGAF.exe Token: 33 940 EGAF.exe Token: SeIncBasePriorityPrivilege 940 EGAF.exe Token: 33 1932 EGAF.exe Token: SeIncBasePriorityPrivilege 1932 EGAF.exe Token: 33 1140 EGAF.exe Token: SeIncBasePriorityPrivilege 1140 EGAF.exe Token: 33 1424 EGAF.exe Token: SeIncBasePriorityPrivilege 1424 EGAF.exe Token: 33 1712 EGAF.exe Token: SeIncBasePriorityPrivilege 1712 EGAF.exe Token: 33 2708 EGAF.exe Token: SeIncBasePriorityPrivilege 2708 EGAF.exe Token: 33 2596 EGAF.exe Token: SeIncBasePriorityPrivilege 2596 EGAF.exe Token: 33 2968 EGAF.exe Token: SeIncBasePriorityPrivilege 2968 EGAF.exe Token: 33 1988 EGAF.exe Token: SeIncBasePriorityPrivilege 1988 EGAF.exe Token: 33 1432 EGAF.exe Token: SeIncBasePriorityPrivilege 1432 EGAF.exe Token: 33 1440 EGAF.exe Token: SeIncBasePriorityPrivilege 1440 EGAF.exe Token: 33 1280 EGAF.exe Token: SeIncBasePriorityPrivilege 1280 EGAF.exe Token: 33 2456 EGAF.exe Token: SeIncBasePriorityPrivilege 2456 EGAF.exe Token: 33 2128 EGAF.exe Token: SeIncBasePriorityPrivilege 2128 EGAF.exe Token: 33 1180 EGAF.exe Token: SeIncBasePriorityPrivilege 1180 EGAF.exe Token: 33 2544 EGAF.exe Token: SeIncBasePriorityPrivilege 2544 EGAF.exe Token: 33 2836 EGAF.exe Token: SeIncBasePriorityPrivilege 2836 EGAF.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1844 EGAF.exe 1844 EGAF.exe 1844 EGAF.exe 1844 EGAF.exe 1844 EGAF.exe 2864 EGAF.exe 2864 EGAF.exe 2864 EGAF.exe 2864 EGAF.exe 2864 EGAF.exe 2348 EGAF.exe 2348 EGAF.exe 2348 EGAF.exe 2348 EGAF.exe 2348 EGAF.exe 1292 EGAF.exe 1292 EGAF.exe 1292 EGAF.exe 1292 EGAF.exe 1292 EGAF.exe 1828 EGAF.exe 1828 EGAF.exe 1828 EGAF.exe 1828 EGAF.exe 1828 EGAF.exe 1680 EGAF.exe 1680 EGAF.exe 1680 EGAF.exe 1680 EGAF.exe 1680 EGAF.exe 1240 EGAF.exe 1240 EGAF.exe 1240 EGAF.exe 1240 EGAF.exe 1240 EGAF.exe 2388 EGAF.exe 2388 EGAF.exe 2388 EGAF.exe 2388 EGAF.exe 2388 EGAF.exe 1836 EGAF.exe 1836 EGAF.exe 1836 EGAF.exe 1836 EGAF.exe 1836 EGAF.exe 2808 EGAF.exe 2808 EGAF.exe 2808 EGAF.exe 2808 EGAF.exe 2808 EGAF.exe 2996 EGAF.exe 2996 EGAF.exe 2996 EGAF.exe 2996 EGAF.exe 2996 EGAF.exe 2944 EGAF.exe 2944 EGAF.exe 2944 EGAF.exe 2944 EGAF.exe 2944 EGAF.exe 1344 EGAF.exe 1344 EGAF.exe 1344 EGAF.exe 1344 EGAF.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1852 2368 7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1852 2368 7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1852 2368 7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1852 2368 7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe 30 PID 1852 wrote to memory of 1844 1852 loader.exe 31 PID 1852 wrote to memory of 1844 1852 loader.exe 31 PID 1852 wrote to memory of 1844 1852 loader.exe 31 PID 1852 wrote to memory of 1844 1852 loader.exe 31 PID 1852 wrote to memory of 2468 1852 loader.exe 32 PID 1852 wrote to memory of 2468 1852 loader.exe 32 PID 1852 wrote to memory of 2468 1852 loader.exe 32 PID 1852 wrote to memory of 2468 1852 loader.exe 32 PID 2468 wrote to memory of 2816 2468 loader.exe 33 PID 2468 wrote to memory of 2816 2468 loader.exe 33 PID 2468 wrote to memory of 2816 2468 loader.exe 33 PID 2468 wrote to memory of 2816 2468 loader.exe 33 PID 2468 wrote to memory of 2800 2468 loader.exe 34 PID 2468 wrote to memory of 2800 2468 loader.exe 34 PID 2468 wrote to memory of 2800 2468 loader.exe 34 PID 2468 wrote to memory of 2800 2468 loader.exe 34 PID 2800 wrote to memory of 2864 2800 loader.exe 212 PID 2800 wrote to memory of 2864 2800 loader.exe 212 PID 2800 wrote to memory of 2864 2800 loader.exe 212 PID 2800 wrote to memory of 2864 2800 loader.exe 212 PID 2800 wrote to memory of 1564 2800 loader.exe 36 PID 2800 wrote to memory of 1564 2800 loader.exe 36 PID 2800 wrote to memory of 1564 2800 loader.exe 36 PID 2800 wrote to memory of 1564 2800 loader.exe 36 PID 1564 wrote to memory of 2772 1564 loader.exe 1255 PID 1564 wrote to memory of 2772 1564 loader.exe 1255 PID 1564 wrote to memory of 2772 1564 loader.exe 1255 PID 1564 wrote to memory of 2772 1564 loader.exe 1255 PID 1564 wrote to memory of 304 1564 loader.exe 1178 PID 1564 wrote to memory of 304 1564 loader.exe 1178 PID 1564 wrote to memory of 304 1564 loader.exe 1178 PID 1564 wrote to memory of 304 1564 loader.exe 1178 PID 304 wrote to memory of 2776 304 loader.exe 1805 PID 304 wrote to memory of 2776 304 loader.exe 1805 PID 304 wrote to memory of 2776 304 loader.exe 1805 PID 304 wrote to memory of 2776 304 loader.exe 1805 PID 304 wrote to memory of 2660 304 loader.exe 2112 PID 304 wrote to memory of 2660 304 loader.exe 2112 PID 304 wrote to memory of 2660 304 loader.exe 2112 PID 304 wrote to memory of 2660 304 loader.exe 2112 PID 2660 wrote to memory of 1260 2660 loader.exe 2127 PID 2660 wrote to memory of 1260 2660 loader.exe 2127 PID 2660 wrote to memory of 1260 2660 loader.exe 2127 PID 2660 wrote to memory of 1260 2660 loader.exe 2127 PID 2660 wrote to memory of 1340 2660 loader.exe 2262 PID 2660 wrote to memory of 1340 2660 loader.exe 2262 PID 2660 wrote to memory of 1340 2660 loader.exe 2262 PID 2660 wrote to memory of 1340 2660 loader.exe 2262 PID 1340 wrote to memory of 2276 1340 loader.exe 2256 PID 1340 wrote to memory of 2276 1340 loader.exe 2256 PID 1340 wrote to memory of 2276 1340 loader.exe 2256 PID 1340 wrote to memory of 2276 1340 loader.exe 2256 PID 1340 wrote to memory of 2640 1340 loader.exe 2268 PID 1340 wrote to memory of 2640 1340 loader.exe 2268 PID 1340 wrote to memory of 2640 1340 loader.exe 2268 PID 1340 wrote to memory of 2640 1340 loader.exe 2268 PID 2640 wrote to memory of 2348 2640 loader.exe 2275 PID 2640 wrote to memory of 2348 2640 loader.exe 2275 PID 2640 wrote to memory of 2348 2640 loader.exe 2275 PID 2640 wrote to memory of 2348 2640 loader.exe 2275
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7b8ab805d1f05e438993fd4f25b60827_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"6⤵
- Executes dropped EXE
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:600 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:832 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"15⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"16⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"16⤵
- Executes dropped EXE
PID:2780 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"17⤵
- Executes dropped EXE
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"18⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"19⤵
- Executes dropped EXE
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"20⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"21⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"22⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"23⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"24⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"25⤵
- Executes dropped EXE
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"26⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:660 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"27⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"27⤵
- Executes dropped EXE
PID:600 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:752 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"29⤵
- Executes dropped EXE
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"30⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"31⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"32⤵
- Executes dropped EXE
PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"33⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"33⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"34⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"34⤵PID:2124
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"35⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"35⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"36⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"36⤵PID:2772
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"37⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"37⤵
- Drops file in System32 directory
PID:1444 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"38⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"38⤵PID:2000
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"39⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"39⤵PID:532
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"40⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"40⤵PID:2316
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"41⤵PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"41⤵PID:884
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"42⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"42⤵PID:1608
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"43⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"43⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:952 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"44⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"44⤵PID:1316
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"45⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"45⤵
- Drops file in System32 directory
PID:868 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"46⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"46⤵PID:2016
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"47⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"47⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"48⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"48⤵
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"49⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"49⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"50⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"50⤵PID:2912
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"51⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"51⤵
- Drops file in System32 directory
PID:2644 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"52⤵
- Adds Run key to start application
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"52⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"53⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"53⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"54⤵
- Adds Run key to start application
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"54⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"55⤵
- Adds Run key to start application
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"55⤵
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"56⤵
- System Location Discovery: System Language Discovery
PID:480
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"56⤵PID:2044
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"57⤵
- Adds Run key to start application
PID:308
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"57⤵
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"58⤵
- Adds Run key to start application
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"58⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"59⤵
- Adds Run key to start application
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"59⤵
- Drops file in System32 directory
PID:1460 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"60⤵
- System Location Discovery: System Language Discovery
PID:600
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"60⤵PID:2488
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"61⤵
- Adds Run key to start application
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"61⤵
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"62⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"62⤵
- Drops file in System32 directory
PID:1732 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"63⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"63⤵
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"64⤵
- Adds Run key to start application
PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"64⤵
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"65⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"65⤵
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"66⤵
- Adds Run key to start application
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"66⤵
- Drops file in System32 directory
PID:1204 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"67⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"67⤵PID:1224
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"69⤵
- Adds Run key to start application
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"69⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"70⤵
- Adds Run key to start application
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"70⤵PID:1928
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"71⤵PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"71⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"72⤵
- Adds Run key to start application
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"72⤵PID:2932
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"73⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"73⤵
- Drops file in System32 directory
PID:2188 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"74⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"74⤵PID:296
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"75⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"75⤵
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"76⤵PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"76⤵PID:1548
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"77⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"77⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"78⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"78⤵PID:908
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"79⤵
- Adds Run key to start application
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"79⤵
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"80⤵
- Adds Run key to start application
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"80⤵
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"81⤵
- System Location Discovery: System Language Discovery
PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"81⤵
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"82⤵
- Adds Run key to start application
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"82⤵
- Drops file in System32 directory
PID:1704 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"83⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"83⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"84⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"84⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"85⤵
- Adds Run key to start application
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"85⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"86⤵
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"86⤵
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"87⤵
- Adds Run key to start application
PID:352
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"87⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"88⤵
- Adds Run key to start application
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"88⤵
- Drops file in System32 directory
PID:304 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"89⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"89⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"90⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"90⤵
- Drops file in System32 directory
PID:3056 -
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"91⤵PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"91⤵PID:344
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"92⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"92⤵PID:532
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"93⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"93⤵PID:1012
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"94⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"94⤵PID:1692
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"95⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"95⤵PID:1608
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"96⤵PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"96⤵PID:2392
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"97⤵PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"97⤵PID:1528
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"98⤵PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"98⤵PID:2068
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"99⤵PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"99⤵PID:1972
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"100⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"100⤵PID:1840
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"101⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"101⤵PID:2680
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"102⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"102⤵PID:2928
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"103⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"103⤵PID:2704
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"104⤵PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"104⤵PID:2596
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"105⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"105⤵PID:2460
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"106⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"106⤵PID:2360
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"107⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"107⤵PID:2952
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"108⤵PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"108⤵PID:1644
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"109⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"109⤵PID:3048
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"110⤵PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"110⤵PID:2236
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"111⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"111⤵PID:3064
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"112⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"112⤵PID:680
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"113⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"113⤵PID:1172
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"114⤵PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"114⤵PID:956
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"115⤵PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"115⤵PID:1828
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"116⤵PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"116⤵PID:2140
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"117⤵PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"117⤵PID:1604
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"118⤵PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"118⤵PID:2552
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"119⤵PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"119⤵PID:1732
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"120⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"120⤵PID:2692
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"121⤵PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"121⤵PID:2792
-
C:\Windows\SysWOW64\28463\EGAF.exe"C:\Windows\system32\28463\EGAF.exe"122⤵PID:2928
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-