Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 07:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe
Resource
win7-20240704-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe
Resource
win10v2004-20240704-en
4 signatures
150 seconds
General
-
Target
2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe
-
Size
313KB
-
MD5
2f7f5560775949053f1e60fc602d52fc
-
SHA1
0079a814e1806cddf9a94f3cb66f8f6040dd0deb
-
SHA256
c50bc0ecfb7b78a952b0225bc3c616dacd83eb4626cef8aec8be08a3e1596171
-
SHA512
f19765d7e49e782bd43e44293d3ffcabc67f6dd4d069de3fdae78f04524ee5b20bf4aea1f428050db6eb0a4fc78cc24c1ab79fc71d2247286fcfb15522cde009
-
SSDEEP
6144:rdw2CsbZ5kp/Llj8aG8Rty29F0duOd028hfTQzAdvMqzMjm/ZpS:pw2CsbZ5kNR8aVRsE6duHTk4vMwMjm/u
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1268 yokmwxo.exe 2488 yokmwxo.exe 2756 dxahmdu.exe 2848 dxahmdu.exe 2880 hnxuijy.exe 2668 hnxuijy.exe 2352 msqcbsk.exe 1760 msqcbsk.exe 2932 tamcniu.exe 2936 tamcniu.exe 2856 evfmdcv.exe 1540 evfmdcv.exe 1920 jiyuomz.exe 2504 jiyuomz.exe 2052 wzbxxmf.exe 2292 wzbxxmf.exe 448 dgoprko.exe 1728 dgoprko.exe 1520 kznuodx.exe 1704 kznuodx.exe 1104 uzzzyce.exe 3032 uzzzyce.exe 700 fuskgxf.exe 2708 fuskgxf.exe 2556 rwgzsbj.exe 1588 rwgzsbj.exe 2116 enbcajp.exe 1640 enbcajp.exe 1496 rdwfrru.exe 2904 rdwfrru.exe 2176 efcncwz.exe 2740 efcncwz.exe 2468 oeoknvg.exe 1976 oeoknvg.exe 2664 bdjnvdm.exe 1644 bdjnvdm.exe 2968 otepelj.exe 2920 otepelj.exe 2956 xhencsx.exe 2872 xhencsx.exe 1336 kyhpktc.exe 1008 kyhpktc.exe 2328 ylrfqwb.exe 764 ylrfqwb.exe 2916 hzrcgeo.exe 1808 hzrcgeo.exe 1136 uxmfpeu.exe 1376 uxmfpeu.exe 2192 hkevvis.exe 2572 hkevvis.exe 2140 ryektpf.exe 1264 ryektpf.exe 1172 eloiyte.exe 2156 eloiyte.exe 1756 oolsmwl.exe 2100 oolsmwl.exe 1740 tbvirsj.exe 2228 tbvirsj.exe 1032 dmksnvy.exe 2312 dmksnvy.exe 1036 qzcitzw.exe 2756 qzcitzw.exe 2288 ancyjgj.exe 2772 ancyjgj.exe -
Loads dropped DLL 64 IoCs
pid Process 2264 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 2264 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 1268 yokmwxo.exe 2488 yokmwxo.exe 2488 yokmwxo.exe 2756 dxahmdu.exe 2848 dxahmdu.exe 2848 dxahmdu.exe 2668 hnxuijy.exe 2668 hnxuijy.exe 1760 msqcbsk.exe 1760 msqcbsk.exe 2936 tamcniu.exe 2936 tamcniu.exe 1540 evfmdcv.exe 1540 evfmdcv.exe 2504 jiyuomz.exe 2504 jiyuomz.exe 2292 wzbxxmf.exe 2292 wzbxxmf.exe 1728 dgoprko.exe 1728 dgoprko.exe 1704 kznuodx.exe 1704 kznuodx.exe 3032 uzzzyce.exe 3032 uzzzyce.exe 2708 fuskgxf.exe 2708 fuskgxf.exe 1588 rwgzsbj.exe 1588 rwgzsbj.exe 1640 enbcajp.exe 1640 enbcajp.exe 2904 rdwfrru.exe 2904 rdwfrru.exe 2740 efcncwz.exe 2740 efcncwz.exe 1976 oeoknvg.exe 1976 oeoknvg.exe 1644 bdjnvdm.exe 1644 bdjnvdm.exe 2920 otepelj.exe 2920 otepelj.exe 2872 xhencsx.exe 2872 xhencsx.exe 1008 kyhpktc.exe 1008 kyhpktc.exe 764 ylrfqwb.exe 764 ylrfqwb.exe 1808 hzrcgeo.exe 1808 hzrcgeo.exe 1376 uxmfpeu.exe 1376 uxmfpeu.exe 2572 hkevvis.exe 2572 hkevvis.exe 1264 ryektpf.exe 1264 ryektpf.exe 2156 eloiyte.exe 2156 eloiyte.exe 2100 oolsmwl.exe 2100 oolsmwl.exe 2228 tbvirsj.exe 2228 tbvirsj.exe 2312 dmksnvy.exe 2312 dmksnvy.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\nfudybs.exe zkdnsgt.exe File created C:\Windows\SysWOW64\ehlssdi.exe ruccmzj.exe File opened for modification C:\Windows\SysWOW64\mgopxda.exe zqtmovu.exe File opened for modification C:\Windows\SysWOW64\cjdwade.exe ptjtsuy.exe File opened for modification C:\Windows\SysWOW64\mmczqsu.exe ccmoupo.exe File created C:\Windows\SysWOW64\vddahoq.exe Process not Found File opened for modification C:\Windows\SysWOW64\istjoyl.exe Process not Found File created C:\Windows\SysWOW64\qrlkbop.exe Process not Found File created C:\Windows\SysWOW64\jhwddpz.exe Process not Found File opened for modification C:\Windows\SysWOW64\wzbxxmf.exe jiyuomz.exe File opened for modification C:\Windows\SysWOW64\yaqjsyc.exe knhumud.exe File opened for modification C:\Windows\SysWOW64\aakpgan.exe Process not Found File created C:\Windows\SysWOW64\chfgnep.exe prkdewr.exe File opened for modification C:\Windows\SysWOW64\lkjjlop.exe yuggcgj.exe File opened for modification C:\Windows\SysWOW64\ruccmzj.exe eezzdre.exe File opened for modification C:\Windows\SysWOW64\jxdczem.exe xvxvnzz.exe File created C:\Windows\SysWOW64\exumoru.exe uyqpvsm.exe File opened for modification C:\Windows\SysWOW64\pqgejkd.exe calcbbx.exe File created C:\Windows\SysWOW64\ogxqrnw.exe atnbljx.exe File opened for modification C:\Windows\SysWOW64\ppehobt.exe ccmjixv.exe File opened for modification C:\Windows\SysWOW64\rhbrbmj.exe hwmpgjd.exe File opened for modification C:\Windows\SysWOW64\oxqkqew.exe fmbzvbi.exe File created C:\Windows\SysWOW64\vuvdppx.exe Process not Found File opened for modification C:\Windows\SysWOW64\hnwyrdr.exe Process not Found File created C:\Windows\SysWOW64\mzzgjjz.exe Process not Found File created C:\Windows\SysWOW64\ivjmquq.exe ypjosmd.exe File created C:\Windows\SysWOW64\bmpkylb.exe rjrhdqu.exe File opened for modification C:\Windows\SysWOW64\zkzoave.exe uxiyusf.exe File created C:\Windows\SysWOW64\gtqmxuo.exe Process not Found File created C:\Windows\SysWOW64\bfbqryk.exe Process not Found File opened for modification C:\Windows\SysWOW64\khpsxxk.exe Process not Found File opened for modification C:\Windows\SysWOW64\hgeldrk.exe Process not Found File created C:\Windows\SysWOW64\otepelj.exe bdjnvdm.exe File opened for modification C:\Windows\SysWOW64\rokmuvw.exe bkcrqqz.exe File opened for modification C:\Windows\SysWOW64\qapfmas.exe galibbk.exe File created C:\Windows\SysWOW64\jyyxjdu.exe znjnoan.exe File opened for modification C:\Windows\SysWOW64\oazypet.exe bjewheo.exe File created C:\Windows\SysWOW64\calcbbx.exe qbjzsba.exe File opened for modification C:\Windows\SysWOW64\scwfqec.exe iahuubv.exe File opened for modification C:\Windows\SysWOW64\tghbcyn.exe Process not Found File opened for modification C:\Windows\SysWOW64\fregcwt.exe Process not Found File created C:\Windows\SysWOW64\fpybljv.exe Process not Found File opened for modification C:\Windows\SysWOW64\qrlkbop.exe Process not Found File created C:\Windows\SysWOW64\zpdskus.exe mclueqt.exe File opened for modification C:\Windows\SysWOW64\intuztl.exe vlnenhz.exe File created C:\Windows\SysWOW64\omichkr.exe Process not Found File opened for modification C:\Windows\SysWOW64\digmkwn.exe Process not Found File opened for modification C:\Windows\SysWOW64\eoqaoqp.exe Process not Found File opened for modification C:\Windows\SysWOW64\prkdewr.exe dsqavom.exe File created C:\Windows\SysWOW64\yxabiuy.exe lhxzamt.exe File opened for modification C:\Windows\SysWOW64\ccmoupo.exe pigyjlk.exe File created C:\Windows\SysWOW64\yblvlce.exe Process not Found File created C:\Windows\SysWOW64\mkdicun.exe cwdlena.exe File opened for modification C:\Windows\SysWOW64\iijygwn.exe vrgwxoh.exe File created C:\Windows\SysWOW64\rvggber.exe ewddswl.exe File opened for modification C:\Windows\SysWOW64\gvhmrkw.exe wlkbehq.exe File opened for modification C:\Windows\SysWOW64\pigyjlk.exe cjdwade.exe File opened for modification C:\Windows\SysWOW64\sehtqku.exe frydkgn.exe File created C:\Windows\SysWOW64\taymoqo.exe ggswddb.exe File created C:\Windows\SysWOW64\ilyfxpc.exe Process not Found File created C:\Windows\SysWOW64\tnpkvyw.exe Process not Found File opened for modification C:\Windows\SysWOW64\rnlcwyn.exe Process not Found File opened for modification C:\Windows\SysWOW64\fxduetf.exe shjrvla.exe File created C:\Windows\SysWOW64\mqjiibj.exe Process not Found -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2900 set thread context of 2264 2900 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 30 PID 1268 set thread context of 2488 1268 yokmwxo.exe 32 PID 2756 set thread context of 2848 2756 dxahmdu.exe 34 PID 2880 set thread context of 2668 2880 hnxuijy.exe 36 PID 2352 set thread context of 1760 2352 msqcbsk.exe 38 PID 2932 set thread context of 2936 2932 tamcniu.exe 40 PID 2856 set thread context of 1540 2856 evfmdcv.exe 42 PID 1920 set thread context of 2504 1920 jiyuomz.exe 44 PID 2052 set thread context of 2292 2052 wzbxxmf.exe 46 PID 448 set thread context of 1728 448 dgoprko.exe 48 PID 1520 set thread context of 1704 1520 kznuodx.exe 51 PID 1104 set thread context of 3032 1104 uzzzyce.exe 53 PID 700 set thread context of 2708 700 fuskgxf.exe 55 PID 2556 set thread context of 1588 2556 rwgzsbj.exe 57 PID 2116 set thread context of 1640 2116 enbcajp.exe 59 PID 1496 set thread context of 2904 1496 rdwfrru.exe 61 PID 2176 set thread context of 2740 2176 efcncwz.exe 63 PID 2468 set thread context of 1976 2468 oeoknvg.exe 65 PID 2664 set thread context of 1644 2664 bdjnvdm.exe 67 PID 2968 set thread context of 2920 2968 otepelj.exe 69 PID 2956 set thread context of 2872 2956 xhencsx.exe 71 PID 1336 set thread context of 1008 1336 kyhpktc.exe 73 PID 2328 set thread context of 764 2328 ylrfqwb.exe 75 PID 2916 set thread context of 1808 2916 hzrcgeo.exe 77 PID 1136 set thread context of 1376 1136 uxmfpeu.exe 79 PID 2192 set thread context of 2572 2192 hkevvis.exe 81 PID 2140 set thread context of 1264 2140 ryektpf.exe 83 PID 1172 set thread context of 2156 1172 eloiyte.exe 85 PID 1756 set thread context of 2100 1756 oolsmwl.exe 87 PID 1740 set thread context of 2228 1740 tbvirsj.exe 89 PID 1032 set thread context of 2312 1032 dmksnvy.exe 91 PID 1036 set thread context of 2756 1036 qzcitzw.exe 93 PID 2288 set thread context of 2772 2288 ancyjgj.exe 95 PID 2728 set thread context of 2844 2728 ndxarhh.exe 97 PID 2656 set thread context of 1452 2656 xzythjq.exe 99 PID 2928 set thread context of 2952 2928 hjnduew.exe 101 PID 2008 set thread context of 1652 2008 rjraede.exe 103 PID 1716 set thread context of 2328 1716 hqlilvz.exe 105 PID 1108 set thread context of 2964 1108 rbalgyo.exe 107 PID 2296 set thread context of 1260 2296 eokjmum.exe 109 PID 1520 set thread context of 496 1520 ozhtzxt.exe 111 PID 2404 set thread context of 908 2404 atnbljx.exe 113 PID 2032 set thread context of 1948 2032 ogxqrnw.exe 115 PID 1756 set thread context of 2232 1756 yqmbmik.exe 117 PID 2792 set thread context of 2248 2792 htklzlq.exe 119 PID 2120 set thread context of 2492 2120 ureoitw.exe 121 PID 2820 set thread context of 2828 2820 hizqqcb.exe 123 PID 2752 set thread context of 2480 2752 ugctzcz.exe 125 PID 2644 set thread context of 2632 2644 ejreufn.exe 127 PID 672 set thread context of 2992 672 rlxtgrs.exe 129 PID 3020 set thread context of 1028 3020 bkcrqqz.exe 131 PID 2364 set thread context of 344 2364 rokmuvw.exe 133 PID 2016 set thread context of 1956 2016 ackbkdb.exe 135 PID 1772 set thread context of 1328 1772 nbfetlh.exe 137 PID 1876 set thread context of 1548 1876 boptghf.exe 139 PID 912 set thread context of 1560 912 krmeuku.exe 141 PID 2508 set thread context of 1752 2508 xphgcsr.exe 143 PID 1276 set thread context of 1924 1276 kjnwoee.exe 145 PID 2440 set thread context of 2236 2440 uqruydd.exe 147 PID 2704 set thread context of 3068 2704 hkfjriq.exe 149 PID 2840 set thread context of 2820 2840 rjjhchp.exe 151 PID 1996 set thread context of 2304 1996 elpwntb.exe 153 PID 2796 set thread context of 2672 2796 ryhmtpa.exe 155 PID 768 set thread context of 1620 768 bjwwosg.exe 157 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2264 2900 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2264 2900 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2264 2900 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2264 2900 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2264 2900 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2264 2900 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 30 PID 2264 wrote to memory of 1268 2264 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 31 PID 2264 wrote to memory of 1268 2264 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 31 PID 2264 wrote to memory of 1268 2264 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 31 PID 2264 wrote to memory of 1268 2264 2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe 31 PID 1268 wrote to memory of 2488 1268 yokmwxo.exe 32 PID 1268 wrote to memory of 2488 1268 yokmwxo.exe 32 PID 1268 wrote to memory of 2488 1268 yokmwxo.exe 32 PID 1268 wrote to memory of 2488 1268 yokmwxo.exe 32 PID 1268 wrote to memory of 2488 1268 yokmwxo.exe 32 PID 1268 wrote to memory of 2488 1268 yokmwxo.exe 32 PID 2488 wrote to memory of 2756 2488 yokmwxo.exe 33 PID 2488 wrote to memory of 2756 2488 yokmwxo.exe 33 PID 2488 wrote to memory of 2756 2488 yokmwxo.exe 33 PID 2488 wrote to memory of 2756 2488 yokmwxo.exe 33 PID 2756 wrote to memory of 2848 2756 dxahmdu.exe 34 PID 2756 wrote to memory of 2848 2756 dxahmdu.exe 34 PID 2756 wrote to memory of 2848 2756 dxahmdu.exe 34 PID 2756 wrote to memory of 2848 2756 dxahmdu.exe 34 PID 2756 wrote to memory of 2848 2756 dxahmdu.exe 34 PID 2756 wrote to memory of 2848 2756 dxahmdu.exe 34 PID 2848 wrote to memory of 2880 2848 dxahmdu.exe 35 PID 2848 wrote to memory of 2880 2848 dxahmdu.exe 35 PID 2848 wrote to memory of 2880 2848 dxahmdu.exe 35 PID 2848 wrote to memory of 2880 2848 dxahmdu.exe 35 PID 2880 wrote to memory of 2668 2880 hnxuijy.exe 36 PID 2880 wrote to memory of 2668 2880 hnxuijy.exe 36 PID 2880 wrote to memory of 2668 2880 hnxuijy.exe 36 PID 2880 wrote to memory of 2668 2880 hnxuijy.exe 36 PID 2880 wrote to memory of 2668 2880 hnxuijy.exe 36 PID 2880 wrote to memory of 2668 2880 hnxuijy.exe 36 PID 2668 wrote to memory of 2352 2668 hnxuijy.exe 37 PID 2668 wrote to memory of 2352 2668 hnxuijy.exe 37 PID 2668 wrote to memory of 2352 2668 hnxuijy.exe 37 PID 2668 wrote to memory of 2352 2668 hnxuijy.exe 37 PID 2352 wrote to memory of 1760 2352 msqcbsk.exe 38 PID 2352 wrote to memory of 1760 2352 msqcbsk.exe 38 PID 2352 wrote to memory of 1760 2352 msqcbsk.exe 38 PID 2352 wrote to memory of 1760 2352 msqcbsk.exe 38 PID 2352 wrote to memory of 1760 2352 msqcbsk.exe 38 PID 2352 wrote to memory of 1760 2352 msqcbsk.exe 38 PID 1760 wrote to memory of 2932 1760 msqcbsk.exe 39 PID 1760 wrote to memory of 2932 1760 msqcbsk.exe 39 PID 1760 wrote to memory of 2932 1760 msqcbsk.exe 39 PID 1760 wrote to memory of 2932 1760 msqcbsk.exe 39 PID 2932 wrote to memory of 2936 2932 tamcniu.exe 40 PID 2932 wrote to memory of 2936 2932 tamcniu.exe 40 PID 2932 wrote to memory of 2936 2932 tamcniu.exe 40 PID 2932 wrote to memory of 2936 2932 tamcniu.exe 40 PID 2932 wrote to memory of 2936 2932 tamcniu.exe 40 PID 2932 wrote to memory of 2936 2932 tamcniu.exe 40 PID 2936 wrote to memory of 2856 2936 tamcniu.exe 41 PID 2936 wrote to memory of 2856 2936 tamcniu.exe 41 PID 2936 wrote to memory of 2856 2936 tamcniu.exe 41 PID 2936 wrote to memory of 2856 2936 tamcniu.exe 41 PID 2856 wrote to memory of 1540 2856 evfmdcv.exe 42 PID 2856 wrote to memory of 1540 2856 evfmdcv.exe 42 PID 2856 wrote to memory of 1540 2856 evfmdcv.exe 42 PID 2856 wrote to memory of 1540 2856 evfmdcv.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\yokmwxo.exeC:\Windows\system32\yokmwxo.exe 464 "C:\Users\Admin\AppData\Local\Temp\2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\yokmwxo.exe"C:\Windows\SysWOW64\yokmwxo.exe" 464 "C:\Users\Admin\AppData\Local\Temp\2f7f5560775949053f1e60fc602d52fc_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\dxahmdu.exeC:\Windows\system32\dxahmdu.exe 456 "C:\Windows\SysWOW64\yokmwxo.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\dxahmdu.exe"C:\Windows\SysWOW64\dxahmdu.exe" 456 "C:\Windows\SysWOW64\yokmwxo.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\hnxuijy.exeC:\Windows\system32\hnxuijy.exe 452 "C:\Windows\SysWOW64\dxahmdu.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\hnxuijy.exe"C:\Windows\SysWOW64\hnxuijy.exe" 452 "C:\Windows\SysWOW64\dxahmdu.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\msqcbsk.exeC:\Windows\system32\msqcbsk.exe 452 "C:\Windows\SysWOW64\hnxuijy.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\msqcbsk.exe"C:\Windows\SysWOW64\msqcbsk.exe" 452 "C:\Windows\SysWOW64\hnxuijy.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\tamcniu.exeC:\Windows\system32\tamcniu.exe 452 "C:\Windows\SysWOW64\msqcbsk.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\tamcniu.exe"C:\Windows\SysWOW64\tamcniu.exe" 452 "C:\Windows\SysWOW64\msqcbsk.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\evfmdcv.exeC:\Windows\system32\evfmdcv.exe 452 "C:\Windows\SysWOW64\tamcniu.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\evfmdcv.exe"C:\Windows\SysWOW64\evfmdcv.exe" 452 "C:\Windows\SysWOW64\tamcniu.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1540 -
C:\Windows\SysWOW64\jiyuomz.exeC:\Windows\system32\jiyuomz.exe 452 "C:\Windows\SysWOW64\evfmdcv.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1920 -
C:\Windows\SysWOW64\jiyuomz.exe"C:\Windows\SysWOW64\jiyuomz.exe" 452 "C:\Windows\SysWOW64\evfmdcv.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\wzbxxmf.exeC:\Windows\system32\wzbxxmf.exe 528 "C:\Windows\SysWOW64\jiyuomz.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2052 -
C:\Windows\SysWOW64\wzbxxmf.exe"C:\Windows\SysWOW64\wzbxxmf.exe" 528 "C:\Windows\SysWOW64\jiyuomz.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292 -
C:\Windows\SysWOW64\dgoprko.exeC:\Windows\system32\dgoprko.exe 452 "C:\Windows\SysWOW64\wzbxxmf.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:448 -
C:\Windows\SysWOW64\dgoprko.exe"C:\Windows\SysWOW64\dgoprko.exe" 452 "C:\Windows\SysWOW64\wzbxxmf.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Windows\SysWOW64\kznuodx.exeC:\Windows\system32\kznuodx.exe 464 "C:\Windows\SysWOW64\dgoprko.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1520 -
C:\Windows\SysWOW64\kznuodx.exe"C:\Windows\SysWOW64\kznuodx.exe" 464 "C:\Windows\SysWOW64\dgoprko.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Windows\SysWOW64\uzzzyce.exeC:\Windows\system32\uzzzyce.exe 484 "C:\Windows\SysWOW64\kznuodx.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1104 -
C:\Windows\SysWOW64\uzzzyce.exe"C:\Windows\SysWOW64\uzzzyce.exe" 484 "C:\Windows\SysWOW64\kznuodx.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Windows\SysWOW64\fuskgxf.exeC:\Windows\system32\fuskgxf.exe 536 "C:\Windows\SysWOW64\uzzzyce.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:700 -
C:\Windows\SysWOW64\fuskgxf.exe"C:\Windows\SysWOW64\fuskgxf.exe" 536 "C:\Windows\SysWOW64\uzzzyce.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2708 -
C:\Windows\SysWOW64\rwgzsbj.exeC:\Windows\system32\rwgzsbj.exe 532 "C:\Windows\SysWOW64\fuskgxf.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2556 -
C:\Windows\SysWOW64\rwgzsbj.exe"C:\Windows\SysWOW64\rwgzsbj.exe" 532 "C:\Windows\SysWOW64\fuskgxf.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588 -
C:\Windows\SysWOW64\enbcajp.exeC:\Windows\system32\enbcajp.exe 528 "C:\Windows\SysWOW64\rwgzsbj.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2116 -
C:\Windows\SysWOW64\enbcajp.exe"C:\Windows\SysWOW64\enbcajp.exe" 528 "C:\Windows\SysWOW64\rwgzsbj.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Windows\SysWOW64\rdwfrru.exeC:\Windows\system32\rdwfrru.exe 536 "C:\Windows\SysWOW64\enbcajp.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1496 -
C:\Windows\SysWOW64\rdwfrru.exe"C:\Windows\SysWOW64\rdwfrru.exe" 536 "C:\Windows\SysWOW64\enbcajp.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Windows\SysWOW64\efcncwz.exeC:\Windows\system32\efcncwz.exe 536 "C:\Windows\SysWOW64\rdwfrru.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2176 -
C:\Windows\SysWOW64\efcncwz.exe"C:\Windows\SysWOW64\efcncwz.exe" 536 "C:\Windows\SysWOW64\rdwfrru.exe"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740 -
C:\Windows\SysWOW64\oeoknvg.exeC:\Windows\system32\oeoknvg.exe 532 "C:\Windows\SysWOW64\efcncwz.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2468 -
C:\Windows\SysWOW64\oeoknvg.exe"C:\Windows\SysWOW64\oeoknvg.exe" 532 "C:\Windows\SysWOW64\efcncwz.exe"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Windows\SysWOW64\bdjnvdm.exeC:\Windows\system32\bdjnvdm.exe 528 "C:\Windows\SysWOW64\oeoknvg.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2664 -
C:\Windows\SysWOW64\bdjnvdm.exe"C:\Windows\SysWOW64\bdjnvdm.exe" 528 "C:\Windows\SysWOW64\oeoknvg.exe"38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\otepelj.exeC:\Windows\system32\otepelj.exe 528 "C:\Windows\SysWOW64\bdjnvdm.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2968 -
C:\Windows\SysWOW64\otepelj.exe"C:\Windows\SysWOW64\otepelj.exe" 528 "C:\Windows\SysWOW64\bdjnvdm.exe"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\Windows\SysWOW64\xhencsx.exeC:\Windows\system32\xhencsx.exe 536 "C:\Windows\SysWOW64\otepelj.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2956 -
C:\Windows\SysWOW64\xhencsx.exe"C:\Windows\SysWOW64\xhencsx.exe" 536 "C:\Windows\SysWOW64\otepelj.exe"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2872 -
C:\Windows\SysWOW64\kyhpktc.exeC:\Windows\system32\kyhpktc.exe 544 "C:\Windows\SysWOW64\xhencsx.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1336 -
C:\Windows\SysWOW64\kyhpktc.exe"C:\Windows\SysWOW64\kyhpktc.exe" 544 "C:\Windows\SysWOW64\xhencsx.exe"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1008 -
C:\Windows\SysWOW64\ylrfqwb.exeC:\Windows\system32\ylrfqwb.exe 528 "C:\Windows\SysWOW64\kyhpktc.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2328 -
C:\Windows\SysWOW64\ylrfqwb.exe"C:\Windows\SysWOW64\ylrfqwb.exe" 528 "C:\Windows\SysWOW64\kyhpktc.exe"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764 -
C:\Windows\SysWOW64\hzrcgeo.exeC:\Windows\system32\hzrcgeo.exe 532 "C:\Windows\SysWOW64\ylrfqwb.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2916 -
C:\Windows\SysWOW64\hzrcgeo.exe"C:\Windows\SysWOW64\hzrcgeo.exe" 532 "C:\Windows\SysWOW64\ylrfqwb.exe"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Windows\SysWOW64\uxmfpeu.exeC:\Windows\system32\uxmfpeu.exe 532 "C:\Windows\SysWOW64\hzrcgeo.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1136 -
C:\Windows\SysWOW64\uxmfpeu.exe"C:\Windows\SysWOW64\uxmfpeu.exe" 532 "C:\Windows\SysWOW64\hzrcgeo.exe"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1376 -
C:\Windows\SysWOW64\hkevvis.exeC:\Windows\system32\hkevvis.exe 536 "C:\Windows\SysWOW64\uxmfpeu.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2192 -
C:\Windows\SysWOW64\hkevvis.exe"C:\Windows\SysWOW64\hkevvis.exe" 536 "C:\Windows\SysWOW64\uxmfpeu.exe"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2572 -
C:\Windows\SysWOW64\ryektpf.exeC:\Windows\system32\ryektpf.exe 536 "C:\Windows\SysWOW64\hkevvis.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2140 -
C:\Windows\SysWOW64\ryektpf.exe"C:\Windows\SysWOW64\ryektpf.exe" 536 "C:\Windows\SysWOW64\hkevvis.exe"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1264 -
C:\Windows\SysWOW64\eloiyte.exeC:\Windows\system32\eloiyte.exe 532 "C:\Windows\SysWOW64\ryektpf.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1172 -
C:\Windows\SysWOW64\eloiyte.exe"C:\Windows\SysWOW64\eloiyte.exe" 532 "C:\Windows\SysWOW64\ryektpf.exe"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2156 -
C:\Windows\SysWOW64\oolsmwl.exeC:\Windows\system32\oolsmwl.exe 536 "C:\Windows\SysWOW64\eloiyte.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1756 -
C:\Windows\SysWOW64\oolsmwl.exe"C:\Windows\SysWOW64\oolsmwl.exe" 536 "C:\Windows\SysWOW64\eloiyte.exe"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Windows\SysWOW64\tbvirsj.exeC:\Windows\system32\tbvirsj.exe 536 "C:\Windows\SysWOW64\oolsmwl.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1740 -
C:\Windows\SysWOW64\tbvirsj.exe"C:\Windows\SysWOW64\tbvirsj.exe" 536 "C:\Windows\SysWOW64\oolsmwl.exe"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2228 -
C:\Windows\SysWOW64\dmksnvy.exeC:\Windows\system32\dmksnvy.exe 540 "C:\Windows\SysWOW64\tbvirsj.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1032 -
C:\Windows\SysWOW64\dmksnvy.exe"C:\Windows\SysWOW64\dmksnvy.exe" 540 "C:\Windows\SysWOW64\tbvirsj.exe"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2312 -
C:\Windows\SysWOW64\qzcitzw.exeC:\Windows\system32\qzcitzw.exe 540 "C:\Windows\SysWOW64\dmksnvy.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1036 -
C:\Windows\SysWOW64\qzcitzw.exe"C:\Windows\SysWOW64\qzcitzw.exe" 540 "C:\Windows\SysWOW64\dmksnvy.exe"64⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\ancyjgj.exeC:\Windows\system32\ancyjgj.exe 536 "C:\Windows\SysWOW64\qzcitzw.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2288 -
C:\Windows\SysWOW64\ancyjgj.exe"C:\Windows\SysWOW64\ancyjgj.exe" 536 "C:\Windows\SysWOW64\qzcitzw.exe"66⤵
- Executes dropped EXE
PID:2772 -
C:\Windows\SysWOW64\ndxarhh.exeC:\Windows\system32\ndxarhh.exe 532 "C:\Windows\SysWOW64\ancyjgj.exe"67⤵
- Suspicious use of SetThreadContext
PID:2728 -
C:\Windows\SysWOW64\ndxarhh.exe"C:\Windows\SysWOW64\ndxarhh.exe" 532 "C:\Windows\SysWOW64\ancyjgj.exe"68⤵PID:2844
-
C:\Windows\SysWOW64\xzythjq.exeC:\Windows\system32\xzythjq.exe 536 "C:\Windows\SysWOW64\ndxarhh.exe"69⤵
- Suspicious use of SetThreadContext
PID:2656 -
C:\Windows\SysWOW64\xzythjq.exe"C:\Windows\SysWOW64\xzythjq.exe" 536 "C:\Windows\SysWOW64\ndxarhh.exe"70⤵PID:1452
-
C:\Windows\SysWOW64\hjnduew.exeC:\Windows\system32\hjnduew.exe 532 "C:\Windows\SysWOW64\xzythjq.exe"71⤵
- Suspicious use of SetThreadContext
PID:2928 -
C:\Windows\SysWOW64\hjnduew.exe"C:\Windows\SysWOW64\hjnduew.exe" 532 "C:\Windows\SysWOW64\xzythjq.exe"72⤵PID:2952
-
C:\Windows\SysWOW64\rjraede.exeC:\Windows\system32\rjraede.exe 544 "C:\Windows\SysWOW64\hjnduew.exe"73⤵
- Suspicious use of SetThreadContext
PID:2008 -
C:\Windows\SysWOW64\rjraede.exe"C:\Windows\SysWOW64\rjraede.exe" 544 "C:\Windows\SysWOW64\hjnduew.exe"74⤵PID:1652
-
C:\Windows\SysWOW64\hqlilvz.exeC:\Windows\system32\hqlilvz.exe 540 "C:\Windows\SysWOW64\rjraede.exe"75⤵
- Suspicious use of SetThreadContext
PID:1716 -
C:\Windows\SysWOW64\hqlilvz.exe"C:\Windows\SysWOW64\hqlilvz.exe" 540 "C:\Windows\SysWOW64\rjraede.exe"76⤵PID:2328
-
C:\Windows\SysWOW64\rbalgyo.exeC:\Windows\system32\rbalgyo.exe 532 "C:\Windows\SysWOW64\hqlilvz.exe"77⤵
- Suspicious use of SetThreadContext
PID:1108 -
C:\Windows\SysWOW64\rbalgyo.exe"C:\Windows\SysWOW64\rbalgyo.exe" 532 "C:\Windows\SysWOW64\hqlilvz.exe"78⤵PID:2964
-
C:\Windows\SysWOW64\eokjmum.exeC:\Windows\system32\eokjmum.exe 536 "C:\Windows\SysWOW64\rbalgyo.exe"79⤵
- Suspicious use of SetThreadContext
PID:2296 -
C:\Windows\SysWOW64\eokjmum.exe"C:\Windows\SysWOW64\eokjmum.exe" 536 "C:\Windows\SysWOW64\rbalgyo.exe"80⤵PID:1260
-
C:\Windows\SysWOW64\ozhtzxt.exeC:\Windows\system32\ozhtzxt.exe 540 "C:\Windows\SysWOW64\eokjmum.exe"81⤵
- Suspicious use of SetThreadContext
PID:1520 -
C:\Windows\SysWOW64\ozhtzxt.exe"C:\Windows\SysWOW64\ozhtzxt.exe" 540 "C:\Windows\SysWOW64\eokjmum.exe"82⤵PID:496
-
C:\Windows\SysWOW64\atnbljx.exeC:\Windows\system32\atnbljx.exe 544 "C:\Windows\SysWOW64\ozhtzxt.exe"83⤵
- Suspicious use of SetThreadContext
PID:2404 -
C:\Windows\SysWOW64\atnbljx.exe"C:\Windows\SysWOW64\atnbljx.exe" 544 "C:\Windows\SysWOW64\ozhtzxt.exe"84⤵
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\ogxqrnw.exeC:\Windows\system32\ogxqrnw.exe 540 "C:\Windows\SysWOW64\atnbljx.exe"85⤵
- Suspicious use of SetThreadContext
PID:2032 -
C:\Windows\SysWOW64\ogxqrnw.exe"C:\Windows\SysWOW64\ogxqrnw.exe" 540 "C:\Windows\SysWOW64\atnbljx.exe"86⤵PID:1948
-
C:\Windows\SysWOW64\yqmbmik.exeC:\Windows\system32\yqmbmik.exe 548 "C:\Windows\SysWOW64\ogxqrnw.exe"87⤵
- Suspicious use of SetThreadContext
PID:1756 -
C:\Windows\SysWOW64\yqmbmik.exe"C:\Windows\SysWOW64\yqmbmik.exe" 548 "C:\Windows\SysWOW64\ogxqrnw.exe"88⤵PID:2232
-
C:\Windows\SysWOW64\htklzlq.exeC:\Windows\system32\htklzlq.exe 540 "C:\Windows\SysWOW64\yqmbmik.exe"89⤵
- Suspicious use of SetThreadContext
PID:2792 -
C:\Windows\SysWOW64\htklzlq.exe"C:\Windows\SysWOW64\htklzlq.exe" 540 "C:\Windows\SysWOW64\yqmbmik.exe"90⤵PID:2248
-
C:\Windows\SysWOW64\ureoitw.exeC:\Windows\system32\ureoitw.exe 528 "C:\Windows\SysWOW64\htklzlq.exe"91⤵
- Suspicious use of SetThreadContext
PID:2120 -
C:\Windows\SysWOW64\ureoitw.exe"C:\Windows\SysWOW64\ureoitw.exe" 528 "C:\Windows\SysWOW64\htklzlq.exe"92⤵PID:2492
-
C:\Windows\SysWOW64\hizqqcb.exeC:\Windows\system32\hizqqcb.exe 528 "C:\Windows\SysWOW64\ureoitw.exe"93⤵
- Suspicious use of SetThreadContext
PID:2820 -
C:\Windows\SysWOW64\hizqqcb.exe"C:\Windows\SysWOW64\hizqqcb.exe" 528 "C:\Windows\SysWOW64\ureoitw.exe"94⤵PID:2828
-
C:\Windows\SysWOW64\ugctzcz.exeC:\Windows\system32\ugctzcz.exe 528 "C:\Windows\SysWOW64\hizqqcb.exe"95⤵
- Suspicious use of SetThreadContext
PID:2752 -
C:\Windows\SysWOW64\ugctzcz.exe"C:\Windows\SysWOW64\ugctzcz.exe" 528 "C:\Windows\SysWOW64\hizqqcb.exe"96⤵PID:2480
-
C:\Windows\SysWOW64\ejreufn.exeC:\Windows\system32\ejreufn.exe 536 "C:\Windows\SysWOW64\ugctzcz.exe"97⤵
- Suspicious use of SetThreadContext
PID:2644 -
C:\Windows\SysWOW64\ejreufn.exe"C:\Windows\SysWOW64\ejreufn.exe" 536 "C:\Windows\SysWOW64\ugctzcz.exe"98⤵PID:2632
-
C:\Windows\SysWOW64\rlxtgrs.exeC:\Windows\system32\rlxtgrs.exe 536 "C:\Windows\SysWOW64\ejreufn.exe"99⤵
- Suspicious use of SetThreadContext
PID:672 -
C:\Windows\SysWOW64\rlxtgrs.exe"C:\Windows\SysWOW64\rlxtgrs.exe" 536 "C:\Windows\SysWOW64\ejreufn.exe"100⤵PID:2992
-
C:\Windows\SysWOW64\bkcrqqz.exeC:\Windows\system32\bkcrqqz.exe 548 "C:\Windows\SysWOW64\rlxtgrs.exe"101⤵
- Suspicious use of SetThreadContext
PID:3020 -
C:\Windows\SysWOW64\bkcrqqz.exe"C:\Windows\SysWOW64\bkcrqqz.exe" 548 "C:\Windows\SysWOW64\rlxtgrs.exe"102⤵
- Drops file in System32 directory
PID:1028 -
C:\Windows\SysWOW64\rokmuvw.exeC:\Windows\system32\rokmuvw.exe 536 "C:\Windows\SysWOW64\bkcrqqz.exe"103⤵
- Suspicious use of SetThreadContext
PID:2364 -
C:\Windows\SysWOW64\rokmuvw.exe"C:\Windows\SysWOW64\rokmuvw.exe" 536 "C:\Windows\SysWOW64\bkcrqqz.exe"104⤵PID:344
-
C:\Windows\SysWOW64\ackbkdb.exeC:\Windows\system32\ackbkdb.exe 544 "C:\Windows\SysWOW64\rokmuvw.exe"105⤵
- Suspicious use of SetThreadContext
PID:2016 -
C:\Windows\SysWOW64\ackbkdb.exe"C:\Windows\SysWOW64\ackbkdb.exe" 544 "C:\Windows\SysWOW64\rokmuvw.exe"106⤵PID:1956
-
C:\Windows\SysWOW64\nbfetlh.exeC:\Windows\system32\nbfetlh.exe 536 "C:\Windows\SysWOW64\ackbkdb.exe"107⤵
- Suspicious use of SetThreadContext
PID:1772 -
C:\Windows\SysWOW64\nbfetlh.exe"C:\Windows\SysWOW64\nbfetlh.exe" 536 "C:\Windows\SysWOW64\ackbkdb.exe"108⤵PID:1328
-
C:\Windows\SysWOW64\boptghf.exeC:\Windows\system32\boptghf.exe 544 "C:\Windows\SysWOW64\nbfetlh.exe"109⤵
- Suspicious use of SetThreadContext
PID:1876 -
C:\Windows\SysWOW64\boptghf.exe"C:\Windows\SysWOW64\boptghf.exe" 544 "C:\Windows\SysWOW64\nbfetlh.exe"110⤵PID:1548
-
C:\Windows\SysWOW64\krmeuku.exeC:\Windows\system32\krmeuku.exe 536 "C:\Windows\SysWOW64\boptghf.exe"111⤵
- Suspicious use of SetThreadContext
PID:912 -
C:\Windows\SysWOW64\krmeuku.exe"C:\Windows\SysWOW64\krmeuku.exe" 536 "C:\Windows\SysWOW64\boptghf.exe"112⤵PID:1560
-
C:\Windows\SysWOW64\xphgcsr.exeC:\Windows\system32\xphgcsr.exe 528 "C:\Windows\SysWOW64\krmeuku.exe"113⤵
- Suspicious use of SetThreadContext
PID:2508 -
C:\Windows\SysWOW64\xphgcsr.exe"C:\Windows\SysWOW64\xphgcsr.exe" 528 "C:\Windows\SysWOW64\krmeuku.exe"114⤵PID:1752
-
C:\Windows\SysWOW64\kjnwoee.exeC:\Windows\system32\kjnwoee.exe 540 "C:\Windows\SysWOW64\xphgcsr.exe"115⤵
- Suspicious use of SetThreadContext
PID:1276 -
C:\Windows\SysWOW64\kjnwoee.exe"C:\Windows\SysWOW64\kjnwoee.exe" 540 "C:\Windows\SysWOW64\xphgcsr.exe"116⤵PID:1924
-
C:\Windows\SysWOW64\uqruydd.exeC:\Windows\system32\uqruydd.exe 540 "C:\Windows\SysWOW64\kjnwoee.exe"117⤵
- Suspicious use of SetThreadContext
PID:2440 -
C:\Windows\SysWOW64\uqruydd.exe"C:\Windows\SysWOW64\uqruydd.exe" 540 "C:\Windows\SysWOW64\kjnwoee.exe"118⤵PID:2236
-
C:\Windows\SysWOW64\hkfjriq.exeC:\Windows\system32\hkfjriq.exe 528 "C:\Windows\SysWOW64\uqruydd.exe"119⤵
- Suspicious use of SetThreadContext
PID:2704 -
C:\Windows\SysWOW64\hkfjriq.exe"C:\Windows\SysWOW64\hkfjriq.exe" 528 "C:\Windows\SysWOW64\uqruydd.exe"120⤵PID:3068
-
C:\Windows\SysWOW64\rjjhchp.exeC:\Windows\system32\rjjhchp.exe 540 "C:\Windows\SysWOW64\hkfjriq.exe"121⤵
- Suspicious use of SetThreadContext
PID:2840 -
C:\Windows\SysWOW64\rjjhchp.exe"C:\Windows\SysWOW64\rjjhchp.exe" 540 "C:\Windows\SysWOW64\hkfjriq.exe"122⤵PID:2820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-