Analysis
-
max time kernel
43s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
b0bdf36903b4df97ff16a2e9392cd65f
-
SHA1
0a318924eb7a7f0263353e19e095cb302332614e
-
SHA256
93ff0ea4842fd80abfb9059cbd2c148a062286f3da29d416cf153b49756757f8
-
SHA512
7e24d06ae851f398c884be408db35024f89b0596b414bab4a6536f5516d7f01ac1c26d8517cdfab1fc228be99a013545bdddabdb6e3050f5b7c8f00c9790b4ad
-
SSDEEP
24576:2EQWl8ewe67CF4ED/dBDC7ftYZedd5eoqCss/lZE1NRELt:2SlkDe4ELmYZeVyC7ZE1rEx
Malware Config
Signatures
-
Executes dropped EXE 59 IoCs
Processes:
E37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEpid Process 2264 E37CC5.EXE 2644 E37CC5.EXE 2508 E37CC5.EXE 2964 E37CC5.EXE 2456 E37CC5.EXE 1076 E37CC5.EXE 1708 E37CC5.EXE 1124 E37CC5.EXE 2564 E37CC5.EXE 1340 E37CC5.EXE 2660 E37CC5.EXE 2004 E37CC5.EXE 1508 E37CC5.EXE 2888 E37CC5.EXE 2216 E37CC5.EXE 1052 E37CC5.EXE 2904 E37CC5.EXE 1076 E37CC5.EXE 1748 E37CC5.EXE 2324 E37CC5.EXE 2208 E37CC5.EXE 1804 E37CC5.EXE 2780 E37CC5.EXE 2760 E37CC5.EXE 1748 E37CC5.EXE 2600 E37CC5.EXE 1692 E37CC5.EXE 2768 E37CC5.EXE 3208 E37CC5.EXE 3360 E37CC5.EXE 3492 E37CC5.EXE 3628 E37CC5.EXE 3776 E37CC5.EXE 3888 E37CC5.EXE 4008 E37CC5.EXE 3144 E37CC5.EXE 1692 E37CC5.EXE 3608 E37CC5.EXE 3716 E37CC5.EXE 3952 E37CC5.EXE 3384 E37CC5.EXE 3844 E37CC5.EXE 3248 E37CC5.EXE 3936 E37CC5.EXE 3084 E37CC5.EXE 3844 E37CC5.EXE 4208 E37CC5.EXE 4344 E37CC5.EXE 4460 E37CC5.EXE 4596 E37CC5.EXE 4704 E37CC5.EXE 4816 E37CC5.EXE 4932 E37CC5.EXE 5052 E37CC5.EXE 3512 E37CC5.EXE 4360 E37CC5.EXE 3324 E37CC5.EXE 4684 E37CC5.EXE 4904 E37CC5.EXE -
Loads dropped DLL 64 IoCs
Processes:
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEpid Process 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2264 E37CC5.EXE 2264 E37CC5.EXE 2264 E37CC5.EXE 2264 E37CC5.EXE 2264 E37CC5.EXE 2264 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 1340 E37CC5.EXE 1340 E37CC5.EXE 1340 E37CC5.EXE 1340 E37CC5.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 59 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
E37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEb0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEdescription ioc Process File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE -
Drops file in System32 directory 5 IoCs
Processes:
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\ADE119 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\9E3B3C b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\C021A2 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File created C:\Windows\SysWOW64\ADE119\E37CC5.EXE b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ADE119\E37CC5.EXE b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe -
Drops file in Windows directory 12 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEexplorer.exeexplorer.exeexplorer.exeexplorer.exeb0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exeexplorer.exeexplorer.exeE37CC5.EXEE37CC5.EXEexplorer.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEexplorer.exeE37CC5.EXEE37CC5.EXEexplorer.exeE37CC5.EXEexplorer.exeexplorer.exeexplorer.exeE37CC5.EXEexplorer.exeexplorer.exeexplorer.exeE37CC5.EXEexplorer.exeE37CC5.EXEexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEexplorer.exeE37CC5.EXEexplorer.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEexplorer.exeE37CC5.EXEexplorer.exeexplorer.exeexplorer.exeexplorer.exeE37CC5.EXEexplorer.exeexplorer.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEexplorer.exeE37CC5.EXEE37CC5.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE -
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEpid Process 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2264 E37CC5.EXE 2264 E37CC5.EXE 2264 E37CC5.EXE 2264 E37CC5.EXE 2264 E37CC5.EXE 2264 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2644 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2508 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2964 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 2456 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1076 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1708 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 1124 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 2564 E37CC5.EXE 1340 E37CC5.EXE 1340 E37CC5.EXE 1340 E37CC5.EXE 1340 E37CC5.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exeE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEE37CC5.EXEdescription pid Process procid_target PID 2788 wrote to memory of 2864 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2864 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2864 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2864 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2264 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2264 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2264 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2264 2788 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 32 PID 2264 wrote to memory of 2680 2264 E37CC5.EXE 33 PID 2264 wrote to memory of 2680 2264 E37CC5.EXE 33 PID 2264 wrote to memory of 2680 2264 E37CC5.EXE 33 PID 2264 wrote to memory of 2680 2264 E37CC5.EXE 33 PID 2264 wrote to memory of 2644 2264 E37CC5.EXE 34 PID 2264 wrote to memory of 2644 2264 E37CC5.EXE 34 PID 2264 wrote to memory of 2644 2264 E37CC5.EXE 34 PID 2264 wrote to memory of 2644 2264 E37CC5.EXE 34 PID 2644 wrote to memory of 2888 2644 E37CC5.EXE 71 PID 2644 wrote to memory of 2888 2644 E37CC5.EXE 71 PID 2644 wrote to memory of 2888 2644 E37CC5.EXE 71 PID 2644 wrote to memory of 2888 2644 E37CC5.EXE 71 PID 2644 wrote to memory of 2508 2644 E37CC5.EXE 37 PID 2644 wrote to memory of 2508 2644 E37CC5.EXE 37 PID 2644 wrote to memory of 2508 2644 E37CC5.EXE 37 PID 2644 wrote to memory of 2508 2644 E37CC5.EXE 37 PID 2508 wrote to memory of 2368 2508 E37CC5.EXE 38 PID 2508 wrote to memory of 2368 2508 E37CC5.EXE 38 PID 2508 wrote to memory of 2368 2508 E37CC5.EXE 38 PID 2508 wrote to memory of 2368 2508 E37CC5.EXE 38 PID 2508 wrote to memory of 2964 2508 E37CC5.EXE 40 PID 2508 wrote to memory of 2964 2508 E37CC5.EXE 40 PID 2508 wrote to memory of 2964 2508 E37CC5.EXE 40 PID 2508 wrote to memory of 2964 2508 E37CC5.EXE 40 PID 2964 wrote to memory of 2052 2964 E37CC5.EXE 41 PID 2964 wrote to memory of 2052 2964 E37CC5.EXE 41 PID 2964 wrote to memory of 2052 2964 E37CC5.EXE 41 PID 2964 wrote to memory of 2052 2964 E37CC5.EXE 41 PID 2964 wrote to memory of 2456 2964 E37CC5.EXE 43 PID 2964 wrote to memory of 2456 2964 E37CC5.EXE 43 PID 2964 wrote to memory of 2456 2964 E37CC5.EXE 43 PID 2964 wrote to memory of 2456 2964 E37CC5.EXE 43 PID 2456 wrote to memory of 1604 2456 E37CC5.EXE 45 PID 2456 wrote to memory of 1604 2456 E37CC5.EXE 45 PID 2456 wrote to memory of 1604 2456 E37CC5.EXE 45 PID 2456 wrote to memory of 1604 2456 E37CC5.EXE 45 PID 2456 wrote to memory of 1076 2456 E37CC5.EXE 83 PID 2456 wrote to memory of 1076 2456 E37CC5.EXE 83 PID 2456 wrote to memory of 1076 2456 E37CC5.EXE 83 PID 2456 wrote to memory of 1076 2456 E37CC5.EXE 83 PID 1076 wrote to memory of 1696 1076 E37CC5.EXE 48 PID 1076 wrote to memory of 1696 1076 E37CC5.EXE 48 PID 1076 wrote to memory of 1696 1076 E37CC5.EXE 48 PID 1076 wrote to memory of 1696 1076 E37CC5.EXE 48 PID 1076 wrote to memory of 1708 1076 E37CC5.EXE 49 PID 1076 wrote to memory of 1708 1076 E37CC5.EXE 49 PID 1076 wrote to memory of 1708 1076 E37CC5.EXE 49 PID 1076 wrote to memory of 1708 1076 E37CC5.EXE 49 PID 1708 wrote to memory of 924 1708 E37CC5.EXE 91 PID 1708 wrote to memory of 924 1708 E37CC5.EXE 91 PID 1708 wrote to memory of 924 1708 E37CC5.EXE 91 PID 1708 wrote to memory of 924 1708 E37CC5.EXE 91 PID 1708 wrote to memory of 1124 1708 E37CC5.EXE 52 PID 1708 wrote to memory of 1124 1708 E37CC5.EXE 52 PID 1708 wrote to memory of 1124 1708 E37CC5.EXE 52 PID 1708 wrote to memory of 1124 1708 E37CC5.EXE 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes1182⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC53⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC54⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC55⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC56⤵PID:2052
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC57⤵PID:1604
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC58⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC59⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:1124 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC510⤵PID:2328
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC511⤵PID:2832
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC512⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC513⤵PID:1996
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC514⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE14⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1508 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC515⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2888 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC516⤵
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE16⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2216 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC517⤵
- System Location Discovery: System Language Discovery
PID:1544
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE17⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1052 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC518⤵PID:2156
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE18⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC519⤵
- System Location Discovery: System Language Discovery
PID:376
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE19⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1076 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC520⤵PID:1440
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE20⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1748 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC521⤵PID:2236
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE21⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2324 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC522⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE22⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2208 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC523⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE23⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1804 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC524⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE24⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC525⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE25⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC526⤵PID:2776
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE26⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC527⤵PID:880
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE27⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC528⤵PID:2152
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE28⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC529⤵PID:1640
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE29⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC530⤵PID:3152
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE30⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3208 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC531⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE31⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3360 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC532⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE32⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC533⤵PID:3580
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE33⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC534⤵
- System Location Discovery: System Language Discovery
PID:3720
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE34⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3776 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC535⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE35⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3888 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC536⤵
- System Location Discovery: System Language Discovery
PID:3968
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE36⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4008 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC537⤵PID:4084
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE37⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3144 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC538⤵
- System Location Discovery: System Language Discovery
PID:3384
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE38⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1692 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC539⤵
- System Location Discovery: System Language Discovery
PID:3636
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE39⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC540⤵
- System Location Discovery: System Language Discovery
PID:3364
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE40⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3716 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC541⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE41⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3952 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC542⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE42⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3384 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC543⤵PID:4012
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE43⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3844 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC544⤵PID:3424
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE44⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC545⤵PID:4016
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE45⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3936 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC546⤵PID:1804
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE46⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC547⤵PID:3224
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE47⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3844 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC548⤵PID:4164
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE48⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC549⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE49⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC550⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE50⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC551⤵
- System Location Discovery: System Language Discovery
PID:4552
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE51⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4596 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC552⤵
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE52⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4704 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC553⤵PID:4776
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE53⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4816 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC554⤵
- System Location Discovery: System Language Discovery
PID:4892
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE54⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4932 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC555⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE55⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:5052 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC556⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE56⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3512 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC557⤵
- System Location Discovery: System Language Discovery
PID:4288
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE57⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4360 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC558⤵PID:3844
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE58⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3324 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC559⤵PID:4552
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE59⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC560⤵
- System Location Discovery: System Language Discovery
PID:4944
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4904 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC561⤵PID:3632
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE61⤵PID:4280
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC562⤵PID:4476
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE62⤵PID:4420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC563⤵PID:4728
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE63⤵PID:5076
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC564⤵PID:4160
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE64⤵PID:4440
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC565⤵PID:4364
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE65⤵PID:4616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC566⤵PID:4728
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE66⤵PID:5076
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC567⤵PID:5200
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE67⤵PID:5232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC568⤵PID:5312
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE68⤵PID:5344
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC569⤵PID:5412
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE69⤵PID:5456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC570⤵PID:5532
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE70⤵PID:5564
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC571⤵PID:5656
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE71⤵PID:5688
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC572⤵PID:5760
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE72⤵PID:5800
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC573⤵PID:5876
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE73⤵PID:5916
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC574⤵PID:5992
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE74⤵PID:6036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC575⤵PID:6116
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE75⤵PID:5144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC576⤵PID:5208
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE76⤵PID:5364
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC577⤵PID:5436
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE77⤵PID:5540
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC578⤵PID:5732
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE78⤵PID:5768
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC579⤵PID:6052
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE79⤵PID:6008
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC580⤵PID:5320
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE80⤵PID:5536
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC581⤵PID:5936
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE81⤵PID:5800
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC582⤵PID:5920
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE82⤵PID:5768
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC583⤵PID:1724
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE83⤵PID:2952
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC584⤵PID:6184
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE84⤵PID:6224
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC585⤵PID:6320
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE85⤵PID:6360
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC586⤵PID:6440
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE86⤵PID:6488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC587⤵PID:6564
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE87⤵PID:6600
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC588⤵PID:6696
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE88⤵PID:6736
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC589⤵PID:6840
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE89⤵PID:6880
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC590⤵PID:6960
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE90⤵PID:6992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC591⤵PID:7084
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE91⤵PID:7116
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC592⤵PID:5184
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE92⤵PID:6240
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC593⤵PID:6332
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE93⤵PID:6504
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC594⤵PID:6652
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE94⤵PID:6564
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC595⤵PID:6804
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE95⤵PID:6600
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC596⤵PID:7088
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE96⤵PID:3036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC597⤵PID:6668
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE97⤵PID:7008
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC598⤵PID:5800
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE98⤵PID:6212
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC599⤵PID:7084
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE99⤵PID:6380
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5100⤵PID:7212
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE100⤵PID:7252
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5101⤵PID:7348
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE101⤵PID:7388
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5102⤵PID:7480
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE102⤵PID:7524
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5103⤵PID:7600
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE103⤵PID:7640
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5104⤵PID:7716
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE104⤵PID:7764
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5105⤵PID:7876
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE105⤵PID:7912
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5106⤵PID:7992
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE106⤵PID:8028
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5107⤵PID:8116
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE107⤵PID:8156
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5108⤵PID:7268
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE108⤵PID:7320
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5109⤵PID:7536
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE109⤵PID:7252
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5110⤵PID:7776
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE110⤵PID:7716
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5111⤵PID:7644
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE111⤵PID:8008
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5112⤵PID:8108
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE112⤵PID:7332
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5113⤵PID:7572
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE113⤵PID:7724
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5114⤵PID:7644
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE114⤵PID:7404
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5115⤵PID:8156
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE115⤵PID:7220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5116⤵PID:8256
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE116⤵PID:8296
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5117⤵PID:8360
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE117⤵PID:8408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5118⤵PID:8500
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE118⤵PID:8536
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5119⤵PID:8628
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE119⤵PID:8660
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5120⤵PID:8740
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE120⤵PID:8772
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5121⤵PID:8852
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE121⤵PID:8892
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5122⤵PID:8992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-