Analysis
-
max time kernel
8s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2024, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
b0bdf36903b4df97ff16a2e9392cd65f
-
SHA1
0a318924eb7a7f0263353e19e095cb302332614e
-
SHA256
93ff0ea4842fd80abfb9059cbd2c148a062286f3da29d416cf153b49756757f8
-
SHA512
7e24d06ae851f398c884be408db35024f89b0596b414bab4a6536f5516d7f01ac1c26d8517cdfab1fc228be99a013545bdddabdb6e3050f5b7c8f00c9790b4ad
-
SSDEEP
24576:2EQWl8ewe67CF4ED/dBDC7ftYZedd5eoqCss/lZE1NRELt:2SlkDe4ELmYZeVyC7ZE1rEx
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 2044 E37CC5.EXE 2580 E37CC5.EXE 1176 E37CC5.EXE 4564 E37CC5.EXE 832 E37CC5.EXE 2916 E37CC5.EXE 4924 E37CC5.EXE 3684 E37CC5.EXE 1188 E37CC5.EXE 868 E37CC5.EXE 2956 E37CC5.EXE 5100 E37CC5.EXE -
Loads dropped DLL 64 IoCs
pid Process 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 1188 E37CC5.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 12 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE File opened for modification \??\PhysicalDrive0 E37CC5.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ADE119 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\9E3B3C b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\C021A2 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File created C:\Windows\SysWOW64\ADE119\E37CC5.EXE b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ADE119\E37CC5.EXE b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe -
Suspicious behavior: AddClipboardFormatListener 5 IoCs
pid Process 1948 explorer.exe 1972 explorer.exe 1628 explorer.exe 1732 explorer.exe 916 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2044 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 2580 E37CC5.EXE 1948 explorer.exe 1948 explorer.exe 2580 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1176 E37CC5.EXE 1972 explorer.exe 1972 explorer.exe 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 4564 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 832 E37CC5.EXE 1628 explorer.exe 1628 explorer.exe 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 2916 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 4924 E37CC5.EXE 1732 explorer.exe 1732 explorer.exe 916 explorer.exe 916 explorer.exe 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE 3684 E37CC5.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 1320 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 83 PID 3396 wrote to memory of 1320 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 83 PID 3396 wrote to memory of 1320 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 83 PID 3396 wrote to memory of 2044 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 85 PID 3396 wrote to memory of 2044 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 85 PID 3396 wrote to memory of 2044 3396 b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe 85 PID 2044 wrote to memory of 4692 2044 E37CC5.EXE 86 PID 2044 wrote to memory of 4692 2044 E37CC5.EXE 86 PID 2044 wrote to memory of 4692 2044 E37CC5.EXE 86 PID 2044 wrote to memory of 2580 2044 E37CC5.EXE 87 PID 2044 wrote to memory of 2580 2044 E37CC5.EXE 87 PID 2044 wrote to memory of 2580 2044 E37CC5.EXE 87 PID 2580 wrote to memory of 1132 2580 E37CC5.EXE 89 PID 2580 wrote to memory of 1132 2580 E37CC5.EXE 89 PID 2580 wrote to memory of 1132 2580 E37CC5.EXE 89 PID 2580 wrote to memory of 1176 2580 E37CC5.EXE 90 PID 2580 wrote to memory of 1176 2580 E37CC5.EXE 90 PID 2580 wrote to memory of 1176 2580 E37CC5.EXE 90 PID 1176 wrote to memory of 1568 1176 E37CC5.EXE 92 PID 1176 wrote to memory of 1568 1176 E37CC5.EXE 92 PID 1176 wrote to memory of 1568 1176 E37CC5.EXE 92 PID 1176 wrote to memory of 4564 1176 E37CC5.EXE 94 PID 1176 wrote to memory of 4564 1176 E37CC5.EXE 94 PID 1176 wrote to memory of 4564 1176 E37CC5.EXE 94 PID 4564 wrote to memory of 4656 4564 E37CC5.EXE 95 PID 4564 wrote to memory of 4656 4564 E37CC5.EXE 95 PID 4564 wrote to memory of 4656 4564 E37CC5.EXE 95 PID 4564 wrote to memory of 832 4564 E37CC5.EXE 96 PID 4564 wrote to memory of 832 4564 E37CC5.EXE 96 PID 4564 wrote to memory of 832 4564 E37CC5.EXE 96 PID 832 wrote to memory of 2808 832 E37CC5.EXE 98 PID 832 wrote to memory of 2808 832 E37CC5.EXE 98 PID 832 wrote to memory of 2808 832 E37CC5.EXE 98 PID 832 wrote to memory of 2916 832 E37CC5.EXE 99 PID 832 wrote to memory of 2916 832 E37CC5.EXE 99 PID 832 wrote to memory of 2916 832 E37CC5.EXE 99 PID 2916 wrote to memory of 2688 2916 E37CC5.EXE 101 PID 2916 wrote to memory of 2688 2916 E37CC5.EXE 101 PID 2916 wrote to memory of 2688 2916 E37CC5.EXE 101 PID 2916 wrote to memory of 4924 2916 E37CC5.EXE 102 PID 2916 wrote to memory of 4924 2916 E37CC5.EXE 102 PID 2916 wrote to memory of 4924 2916 E37CC5.EXE 102 PID 4924 wrote to memory of 1000 4924 E37CC5.EXE 104 PID 4924 wrote to memory of 1000 4924 E37CC5.EXE 104 PID 4924 wrote to memory of 1000 4924 E37CC5.EXE 104 PID 4924 wrote to memory of 3684 4924 E37CC5.EXE 134 PID 4924 wrote to memory of 3684 4924 E37CC5.EXE 134 PID 4924 wrote to memory of 3684 4924 E37CC5.EXE 134 PID 3684 wrote to memory of 3372 3684 E37CC5.EXE 107 PID 3684 wrote to memory of 3372 3684 E37CC5.EXE 107 PID 3684 wrote to memory of 3372 3684 E37CC5.EXE 107 PID 3684 wrote to memory of 1188 3684 E37CC5.EXE 108 PID 3684 wrote to memory of 1188 3684 E37CC5.EXE 108 PID 3684 wrote to memory of 1188 3684 E37CC5.EXE 108 PID 1188 wrote to memory of 2188 1188 E37CC5.EXE 110 PID 1188 wrote to memory of 2188 1188 E37CC5.EXE 110 PID 1188 wrote to memory of 2188 1188 E37CC5.EXE 110 PID 1188 wrote to memory of 868 1188 E37CC5.EXE 111 PID 1188 wrote to memory of 868 1188 E37CC5.EXE 111 PID 1188 wrote to memory of 868 1188 E37CC5.EXE 111 PID 868 wrote to memory of 3768 868 E37CC5.EXE 113 PID 868 wrote to memory of 3768 868 E37CC5.EXE 113 PID 868 wrote to memory of 3768 868 E37CC5.EXE 113 PID 868 wrote to memory of 2956 868 E37CC5.EXE 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\b0bdf36903b4df97ff16a2e9392cd65f_JaffaCakes1182⤵
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC53⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC54⤵
- System Location Discovery: System Language Discovery
PID:1132
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC55⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC56⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC57⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC58⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC59⤵
- System Location Discovery: System Language Discovery
PID:1000
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC510⤵
- System Location Discovery: System Language Discovery
PID:3372
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC511⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC512⤵
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC513⤵
- System Location Discovery: System Language Discovery
PID:1208
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE13⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC514⤵PID:1296
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE14⤵PID:5116
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC515⤵PID:4508
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE15⤵PID:1396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC516⤵PID:4936
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE16⤵PID:3812
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC517⤵PID:4176
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE17⤵PID:3684
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC518⤵PID:2828
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE18⤵PID:1164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC519⤵PID:1984
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE19⤵PID:3144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC520⤵PID:4936
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE20⤵PID:4992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC521⤵PID:5116
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE21⤵PID:2472
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC522⤵PID:5056
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE22⤵PID:1860
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC523⤵PID:5168
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE23⤵PID:5212
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC524⤵PID:5332
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE24⤵PID:5388
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC525⤵PID:5492
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE25⤵PID:5560
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC526⤵PID:5672
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE26⤵PID:5740
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC527⤵PID:5868
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE27⤵PID:5932
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC528⤵PID:6024
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE28⤵PID:6072
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC529⤵PID:1956
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE29⤵PID:5272
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC530⤵PID:5504
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE30⤵PID:5616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC531⤵PID:5792
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE31⤵PID:5848
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC532⤵PID:5996
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE32⤵PID:1776
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC533⤵PID:6056
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE33⤵PID:5444
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC534⤵PID:5732
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE34⤵PID:5420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC535⤵PID:6136
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE35⤵PID:6040
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC536⤵PID:5888
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE36⤵PID:5984
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC537⤵PID:6016
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE37⤵PID:5484
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC538⤵PID:3920
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE38⤵PID:5216
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC539⤵PID:6168
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE39⤵PID:6220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC540⤵PID:6372
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE40⤵PID:6412
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC541⤵PID:6548
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE41⤵PID:6608
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC542⤵PID:6728
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE42⤵PID:6804
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC543⤵PID:6908
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE43⤵PID:6984
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC544⤵PID:7108
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE44⤵PID:5964
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC545⤵PID:5984
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE45⤵PID:6472
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC546⤵PID:5888
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE46⤵PID:6364
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC547⤵PID:6956
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE47⤵PID:7012
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC548⤵PID:6936
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE48⤵PID:6248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC549⤵PID:7116
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE49⤵PID:1624
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC550⤵PID:6204
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE50⤵PID:6552
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC551⤵PID:5484
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE51⤵PID:6472
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC552⤵PID:6120
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE52⤵PID:5952
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC553⤵PID:3984
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE53⤵PID:6200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC554⤵PID:5484
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE54⤵PID:6136
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC555⤵PID:5588
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE55⤵PID:6980
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC556⤵PID:6072
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE56⤵PID:5396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC557⤵PID:6848
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE57⤵PID:7200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC558⤵PID:7316
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE58⤵PID:7356
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC559⤵PID:7452
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE59⤵PID:7484
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC560⤵PID:7584
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE60⤵PID:7648
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC561⤵PID:7728
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE61⤵PID:7796
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC562⤵PID:7880
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE62⤵PID:7916
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC563⤵PID:8016
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE63⤵PID:8056
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC564⤵PID:8152
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE64⤵PID:1220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC565⤵PID:5512
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE65⤵PID:7188
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC566⤵PID:5396
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE66⤵PID:7364
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC567⤵PID:7820
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE67⤵PID:7488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC568⤵PID:7672
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE68⤵PID:8036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC569⤵PID:7984
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE69⤵PID:6024
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC570⤵PID:7588
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE70⤵PID:5396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC571⤵PID:1728
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE71⤵PID:2092
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC572⤵PID:4164
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE72⤵PID:7988
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC573⤵PID:7472
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE73⤵PID:6140
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC574⤵PID:2936
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE74⤵PID:5396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC575⤵PID:6452
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE75⤵PID:4824
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC576⤵PID:3528
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE76⤵PID:7184
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC577⤵PID:372
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE77⤵PID:888
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC578⤵PID:2408
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE78⤵PID:3332
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC579⤵PID:8300
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE79⤵PID:8352
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC580⤵PID:8492
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE80⤵PID:8556
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC581⤵PID:8656
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE81⤵PID:8712
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC582⤵PID:8828
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE82⤵PID:8880
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC583⤵PID:8996
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE83⤵PID:9028
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC584⤵PID:9152
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE84⤵PID:9188
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC585⤵PID:2612
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE85⤵PID:8396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC586⤵PID:8324
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE86⤵PID:1268
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC587⤵PID:8484
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE87⤵PID:2456
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC588⤵PID:8956
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE88⤵PID:8832
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC589⤵PID:8712
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE89⤵PID:6104
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC590⤵PID:3752
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE90⤵PID:9152
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC591⤵PID:1892
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE91⤵PID:5392
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC592⤵PID:8752
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE92⤵PID:7120
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC593⤵PID:8956
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE93⤵PID:8756
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC594⤵PID:2000
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE94⤵PID:3612
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC595⤵PID:8512
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE95⤵PID:9164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC596⤵PID:8712
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE96⤵PID:9152
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC597⤵PID:7804
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE97⤵PID:2408
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC598⤵PID:8672
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE98⤵PID:6164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC599⤵PID:6196
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE99⤵PID:6400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5100⤵PID:5104
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE100⤵PID:6596
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5101⤵PID:8492
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE101⤵PID:9244
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5102⤵PID:9360
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE102⤵PID:9412
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5103⤵PID:9500
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE103⤵PID:9560
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5104⤵PID:9684
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE104⤵PID:9728
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5105⤵PID:9824
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE105⤵PID:9896
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5106⤵PID:9984
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE106⤵PID:10028
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5107⤵PID:10164
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE107⤵PID:10200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5108⤵PID:2524
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE108⤵PID:7092
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5109⤵PID:3172
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE109⤵PID:9584
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5110⤵PID:9752
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE110⤵PID:9700
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5111⤵PID:9872
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE111⤵PID:1712
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5112⤵PID:6796
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE112⤵PID:9904
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5113⤵PID:7500
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE113⤵PID:9272
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5114⤵PID:9760
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE114⤵PID:9736
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5115⤵PID:10140
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE115⤵PID:8472
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5116⤵PID:9392
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE116⤵PID:9872
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5117⤵PID:8204
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE117⤵PID:6072
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5118⤵PID:3764
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE118⤵PID:8556
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5119⤵PID:4076
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE119⤵PID:10252
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5120⤵PID:10356
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE120⤵PID:10400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5121⤵PID:10516
-
-
C:\Windows\SysWOW64\ADE119\E37CC5.EXEC:\Windows\system32\ADE119\E37CC5.EXE121⤵PID:10652
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\ADE119\E37CC5122⤵PID:10740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-