Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe
-
Size
512KB
-
MD5
e303c45b47964eac4a963ec7fe22f8b2
-
SHA1
96ab3045af9c00022b95e4da1a71620c2851c7b9
-
SHA256
c4117dfef9be658345231f2f3dd057b553e18bea36068856c5bda1d2b9d36853
-
SHA512
2ccbf25f7c304c4e810662e977a56c1196fa135cdd46bc7e4c4eecc11a8f695592650c09e2e289f0168364660e3723ab8db1232fdcdad50bb21e2f3d1bf01304
-
SSDEEP
12288:CbuGaAwHLj7L3E5nfDLuYGLgcSxXFX1VAcpkDO6ufo7Kt:CFIbDE9fH0tO/ic+DO6u5
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2920 cgqxphc.exe 2868 cgqxphc.exe 2116 zsmsnci.exe 484 zsmsnci.exe 2272 opuszcr.exe 2192 opuszcr.exe 2784 eegayln.exe 2128 eegayln.exe 352 oesxqku.exe 1932 oesxqku.exe 2252 yohienb.exe 1964 yohienb.exe 2980 lbzxjrh.exe 2004 lbzxjrh.exe 952 vprnhrn.exe 2668 vprnhrn.exe 1676 icjknut.exe 2732 icjknut.exe 1568 sfyvbya.exe 2584 sfyvbya.exe 2704 fsqkgby.exe 536 fsqkgby.exe 2140 suwssgd.exe 2480 suwssgd.exe 2940 fkrvaoi.exe 400 fkrvaoi.exe 2948 ovgfwrp.exe 2780 ovgfwrp.exe 2464 bljiezu.exe 3004 bljiezu.exe 2440 okelnza.exe 1508 okelnza.exe 300 ymtvadg.exe 1356 ymtvadg.exe 896 ixifvgm.exe 1496 ixifvgm.exe 2108 volieos.exe 1848 volieos.exe 2408 fnpfonz.exe 2912 fnpfonz.exe 2648 putdzlh.exe 1972 putdzlh.exe 1744 ztgarkh.exe 1924 ztgarkh.exe 568 kogtzfp.exe 1928 kogtzfp.exe 1548 xfbvhfn.exe 2672 xfbvhfn.exe 528 hqrgcib.exe 2880 hqrgcib.exe 1768 oxmypxl.exe 2456 oxmypxl.exe 1464 bohbxgi.exe 268 bohbxgi.exe 1300 lvlyqeq.exe 1936 lvlyqeq.exe 2012 vxiidhw.exe 2388 vxiidhw.exe 1032 iksyjlv.exe 1612 iksyjlv.exe 2404 svhjwoj.exe 2336 svhjwoj.exe 2052 flklnph.exe 1568 flklnph.exe -
Loads dropped DLL 64 IoCs
pid Process 2860 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 2860 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 2920 cgqxphc.exe 2920 cgqxphc.exe 2868 cgqxphc.exe 2868 cgqxphc.exe 2116 zsmsnci.exe 2116 zsmsnci.exe 484 zsmsnci.exe 484 zsmsnci.exe 2272 opuszcr.exe 2272 opuszcr.exe 2192 opuszcr.exe 2192 opuszcr.exe 2784 eegayln.exe 2784 eegayln.exe 2128 eegayln.exe 2128 eegayln.exe 352 oesxqku.exe 352 oesxqku.exe 1932 oesxqku.exe 1932 oesxqku.exe 2252 yohienb.exe 2252 yohienb.exe 1964 yohienb.exe 1964 yohienb.exe 2980 lbzxjrh.exe 2980 lbzxjrh.exe 2004 lbzxjrh.exe 2004 lbzxjrh.exe 952 vprnhrn.exe 952 vprnhrn.exe 2668 vprnhrn.exe 2668 vprnhrn.exe 1676 icjknut.exe 1676 icjknut.exe 2732 icjknut.exe 2732 icjknut.exe 1568 sfyvbya.exe 1568 sfyvbya.exe 2584 sfyvbya.exe 2584 sfyvbya.exe 2704 fsqkgby.exe 2704 fsqkgby.exe 536 fsqkgby.exe 536 fsqkgby.exe 2140 suwssgd.exe 2140 suwssgd.exe 2480 suwssgd.exe 2480 suwssgd.exe 2940 fkrvaoi.exe 2940 fkrvaoi.exe 400 fkrvaoi.exe 400 fkrvaoi.exe 2948 ovgfwrp.exe 2948 ovgfwrp.exe 2780 ovgfwrp.exe 2780 ovgfwrp.exe 2464 bljiezu.exe 2464 bljiezu.exe 3004 bljiezu.exe 3004 bljiezu.exe 2440 okelnza.exe 2440 okelnza.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sdxpkrm.exe Process not Found File opened for modification C:\Windows\SysWOW64\wxouigp.exe khmszgs.exe File created C:\Windows\SysWOW64\wqpfctz.exe jzukttu.exe File opened for modification C:\Windows\SysWOW64\qhahgco.exe digfyti.exe File opened for modification C:\Windows\SysWOW64\jiibzxx.exe eknyqxr.exe File opened for modification C:\Windows\SysWOW64\xvjbmgs.exe kwhydym.exe File created C:\Windows\SysWOW64\uppjaru.exe Process not Found File opened for modification C:\Windows\SysWOW64\vcncgga.exe Process not Found File created C:\Windows\SysWOW64\pigjanu.exe Process not Found File opened for modification C:\Windows\SysWOW64\fkrvaoi.exe suwssgd.exe File created C:\Windows\SysWOW64\deqhhgl.exe rkkzwtz.exe File opened for modification C:\Windows\SysWOW64\fjoijjn.exe sttftbq.exe File created C:\Windows\SysWOW64\xawtmsi.exe Process not Found File opened for modification C:\Windows\SysWOW64\fxmnzff.exe Process not Found File created C:\Windows\SysWOW64\kvrfwqp.exe Process not Found File created C:\Windows\SysWOW64\ufffdor.exe Process not Found File opened for modification C:\Windows\SysWOW64\opuszcr.exe zsmsnci.exe File created C:\Windows\SysWOW64\dcpacxp.exe qduxtpj.exe File opened for modification C:\Windows\SysWOW64\thogfsa.exe gjudxsu.exe File created C:\Windows\SysWOW64\czsocjf.exe slzrebs.exe File opened for modification C:\Windows\SysWOW64\fbgklbt.exe vnfnnbo.exe File created C:\Windows\SysWOW64\pihqfrw.exe gchspkj.exe File opened for modification C:\Windows\SysWOW64\ptchhuw.exe Process not Found File created C:\Windows\SysWOW64\opuszcr.exe zsmsnci.exe File created C:\Windows\SysWOW64\fnpfonz.exe volieos.exe File created C:\Windows\SysWOW64\qzcitzw.exe autnpua.exe File opened for modification C:\Windows\SysWOW64\ifhceaf.exe Process not Found File created C:\Windows\SysWOW64\hvmquzq.exe Process not Found File created C:\Windows\SysWOW64\oesxqku.exe eegayln.exe File created C:\Windows\SysWOW64\lvlyqeq.exe bohbxgi.exe File created C:\Windows\SysWOW64\nddwurv.exe dpdzekq.exe File created C:\Windows\SysWOW64\uthschw.exe Process not Found File created C:\Windows\SysWOW64\jwzderx.exe Process not Found File created C:\Windows\SysWOW64\acsdapn.exe ndxarhh.exe File opened for modification C:\Windows\SysWOW64\lastklj.exe ykyrcld.exe File created C:\Windows\SysWOW64\dhdjzpn.exe Process not Found File created C:\Windows\SysWOW64\qslcpld.exe dtizhlf.exe File created C:\Windows\SysWOW64\zcqrnrp.exe Process not Found File opened for modification C:\Windows\SysWOW64\qzylbmm.exe Process not Found File created C:\Windows\SysWOW64\lkhwlry.exe ypxgfvz.exe File created C:\Windows\SysWOW64\zmoadbx.exe nwtxvaa.exe File created C:\Windows\SysWOW64\iugoans.exe yrrdmke.exe File created C:\Windows\SysWOW64\csifoho.exe pcfdgzr.exe File created C:\Windows\SysWOW64\mloegcj.exe Process not Found File opened for modification C:\Windows\SysWOW64\nhhzflr.exe armwxll.exe File opened for modification C:\Windows\SysWOW64\hggmcdi.exe uhdjtvk.exe File opened for modification C:\Windows\SysWOW64\xxajwkv.exe kvtckyr.exe File created C:\Windows\SysWOW64\rwxpwzz.exe djfzrva.exe File opened for modification C:\Windows\SysWOW64\cqlfdtp.exe paqdvls.exe File opened for modification C:\Windows\SysWOW64\uxsytjq.exe kjradjl.exe File created C:\Windows\SysWOW64\kwhydym.exe auroqdg.exe File opened for modification C:\Windows\SysWOW64\hpeosdx.exe Process not Found File created C:\Windows\SysWOW64\ljooapz.exe bdnrkhm.exe File opened for modification C:\Windows\SysWOW64\deqhhgl.exe rkkzwtz.exe File opened for modification C:\Windows\SysWOW64\uthschw.exe Process not Found File opened for modification C:\Windows\SysWOW64\dcccxqd.exe qmzzphy.exe File opened for modification C:\Windows\SysWOW64\snvnraf.exe Process not Found File created C:\Windows\SysWOW64\iqmikzg.exe Process not Found File created C:\Windows\SysWOW64\tzxglhn.exe Process not Found File opened for modification C:\Windows\SysWOW64\yezsdlv.exe lfwpukx.exe File opened for modification C:\Windows\SysWOW64\jxgyqoa.exe wzdwhgc.exe File created C:\Windows\SysWOW64\mlqdkzl.exe zvvicyn.exe File opened for modification C:\Windows\SysWOW64\uhksakx.exe hqppscs.exe File opened for modification C:\Windows\SysWOW64\nhvsekp.exe dsvuodc.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2852 set thread context of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2920 set thread context of 2868 2920 cgqxphc.exe 33 PID 2116 set thread context of 484 2116 zsmsnci.exe 35 PID 2272 set thread context of 2192 2272 opuszcr.exe 37 PID 2784 set thread context of 2128 2784 eegayln.exe 39 PID 352 set thread context of 1932 352 oesxqku.exe 41 PID 2252 set thread context of 1964 2252 yohienb.exe 43 PID 2980 set thread context of 2004 2980 lbzxjrh.exe 45 PID 952 set thread context of 2668 952 vprnhrn.exe 47 PID 1676 set thread context of 2732 1676 icjknut.exe 49 PID 1568 set thread context of 2584 1568 sfyvbya.exe 51 PID 2704 set thread context of 536 2704 fsqkgby.exe 53 PID 2140 set thread context of 2480 2140 suwssgd.exe 55 PID 2940 set thread context of 400 2940 fkrvaoi.exe 57 PID 2948 set thread context of 2780 2948 ovgfwrp.exe 59 PID 2464 set thread context of 3004 2464 bljiezu.exe 61 PID 2440 set thread context of 1508 2440 okelnza.exe 63 PID 300 set thread context of 1356 300 ymtvadg.exe 65 PID 896 set thread context of 1496 896 ixifvgm.exe 67 PID 2108 set thread context of 1848 2108 volieos.exe 69 PID 2408 set thread context of 2912 2408 fnpfonz.exe 71 PID 2648 set thread context of 1972 2648 putdzlh.exe 73 PID 1744 set thread context of 1924 1744 ztgarkh.exe 75 PID 568 set thread context of 1928 568 kogtzfp.exe 77 PID 1548 set thread context of 2672 1548 xfbvhfn.exe 79 PID 528 set thread context of 2880 528 hqrgcib.exe 81 PID 1768 set thread context of 2456 1768 oxmypxl.exe 83 PID 1464 set thread context of 268 1464 bohbxgi.exe 85 PID 1300 set thread context of 1936 1300 lvlyqeq.exe 87 PID 2012 set thread context of 2388 2012 vxiidhw.exe 89 PID 1032 set thread context of 1612 1032 iksyjlv.exe 91 PID 2404 set thread context of 2336 2404 svhjwoj.exe 93 PID 2052 set thread context of 1568 2052 flklnph.exe 95 PID 2644 set thread context of 2964 2644 pwawasv.exe 97 PID 1920 set thread context of 1288 1920 cjjlgwu.exe 99 PID 2028 set thread context of 2968 2028 mivjqub.exe 101 PID 1624 set thread context of 2820 1624 wtltlxi.exe 103 PID 2200 set thread context of 1768 2200 jjfwuyn.exe 105 PID 1840 set thread context of 2444 1840 waizcgl.exe 107 PID 1660 set thread context of 1784 1660 gkyjqjz.exe 109 PID 3024 set thread context of 1268 3024 txhzvny.exe 111 PID 1760 set thread context of 1428 1760 dliwuml.exe 113 PID 2712 set thread context of 2520 2712 pclzcur.exe 115 PID 264 set thread context of 2596 264 uafblco.exe 117 PID 1716 set thread context of 2876 1716 edvmygc.exe 119 PID 2796 set thread context of 2204 2796 ruqghga.exe 121 PID 1444 set thread context of 1528 1444 essjxof.exe 123 PID 2324 set thread context of 1596 2324 ruyzjak.exe 125 PID 2472 set thread context of 2284 2472 ektcrbp.exe 127 PID 684 set thread context of 2424 684 onjmeew.exe 129 PID 1340 set thread context of 376 1340 ezrhirs.exe 131 PID 3040 set thread context of 2836 3040 norwyqg.exe 133 PID 2604 set thread context of 2432 2604 xnwcrpn.exe 135 PID 2752 set thread context of 3064 2752 nvhcyhr.exe 137 PID 1620 set thread context of 2140 1620 xfwmlkx.exe 139 PID 2760 set thread context of 1548 2760 kwzptkd.exe 141 PID 2568 set thread context of 1644 2568 xuurcsa.exe 143 PID 3012 set thread context of 1144 3012 hxjcxvo.exe 145 PID 1732 set thread context of 2476 1732 uvmegdm.exe 147 PID 1796 set thread context of 1908 1796 gmhhpes.exe 149 PID 1996 set thread context of 2536 1996 qwwschy.exe 151 PID 1320 set thread context of 2016 1320 dnrukpd.exe 153 PID 2664 set thread context of 2744 2664 qduxtpj.exe 155 PID 2904 set thread context of 2920 2904 dcpacxp.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bohbxgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtlihej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuyvnub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuyvnub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjxshmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahhcnna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jajugtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlfpouz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhzkfqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqnnzot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xirprym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxwsumw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslgfqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zsmsnci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxouigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qkedbrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnbzrgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iorwrve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrcupm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbrinp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gkyjqjz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language essjxof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmmajrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ncmolmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fuwovbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thogfsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgqxphc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kogtzfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxkqtci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qsfgnjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qduxtpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrlilbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcsnqxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uihuhei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gytiytv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zfpkfvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywqbuol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kpprxtw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxjcxvo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qchdrzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnzrvks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbrkbtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcfdgzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drshpgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lydtaxk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgbaipx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uyswrnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xogisnb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2860 2852 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 31 PID 2860 wrote to memory of 2920 2860 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2920 2860 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2920 2860 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2920 2860 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 32 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2920 wrote to memory of 2868 2920 cgqxphc.exe 33 PID 2868 wrote to memory of 2116 2868 cgqxphc.exe 34 PID 2868 wrote to memory of 2116 2868 cgqxphc.exe 34 PID 2868 wrote to memory of 2116 2868 cgqxphc.exe 34 PID 2868 wrote to memory of 2116 2868 cgqxphc.exe 34 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 2116 wrote to memory of 484 2116 zsmsnci.exe 35 PID 484 wrote to memory of 2272 484 zsmsnci.exe 36 PID 484 wrote to memory of 2272 484 zsmsnci.exe 36 PID 484 wrote to memory of 2272 484 zsmsnci.exe 36 PID 484 wrote to memory of 2272 484 zsmsnci.exe 36 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2272 wrote to memory of 2192 2272 opuszcr.exe 37 PID 2192 wrote to memory of 2784 2192 opuszcr.exe 38 PID 2192 wrote to memory of 2784 2192 opuszcr.exe 38 PID 2192 wrote to memory of 2784 2192 opuszcr.exe 38 PID 2192 wrote to memory of 2784 2192 opuszcr.exe 38 PID 2784 wrote to memory of 2128 2784 eegayln.exe 39 PID 2784 wrote to memory of 2128 2784 eegayln.exe 39 PID 2784 wrote to memory of 2128 2784 eegayln.exe 39 PID 2784 wrote to memory of 2128 2784 eegayln.exe 39 PID 2784 wrote to memory of 2128 2784 eegayln.exe 39 PID 2784 wrote to memory of 2128 2784 eegayln.exe 39 PID 2784 wrote to memory of 2128 2784 eegayln.exe 39 PID 2784 wrote to memory of 2128 2784 eegayln.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cgqxphc.exeC:\Windows\system32\cgqxphc.exe 468 "C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cgqxphc.exeC:\Windows\system32\cgqxphc.exe 468 "C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\zsmsnci.exeC:\Windows\system32\zsmsnci.exe 452 "C:\Windows\SysWOW64\cgqxphc.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\zsmsnci.exeC:\Windows\system32\zsmsnci.exe 452 "C:\Windows\SysWOW64\cgqxphc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\opuszcr.exeC:\Windows\system32\opuszcr.exe 528 "C:\Windows\SysWOW64\zsmsnci.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\opuszcr.exeC:\Windows\system32\opuszcr.exe 528 "C:\Windows\SysWOW64\zsmsnci.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\eegayln.exeC:\Windows\system32\eegayln.exe 528 "C:\Windows\SysWOW64\opuszcr.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\eegayln.exeC:\Windows\system32\eegayln.exe 528 "C:\Windows\SysWOW64\opuszcr.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2128 -
C:\Windows\SysWOW64\oesxqku.exeC:\Windows\system32\oesxqku.exe 528 "C:\Windows\SysWOW64\eegayln.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:352 -
C:\Windows\SysWOW64\oesxqku.exeC:\Windows\system32\oesxqku.exe 528 "C:\Windows\SysWOW64\eegayln.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932 -
C:\Windows\SysWOW64\yohienb.exeC:\Windows\system32\yohienb.exe 528 "C:\Windows\SysWOW64\oesxqku.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2252 -
C:\Windows\SysWOW64\yohienb.exeC:\Windows\system32\yohienb.exe 528 "C:\Windows\SysWOW64\oesxqku.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Windows\SysWOW64\lbzxjrh.exeC:\Windows\system32\lbzxjrh.exe 528 "C:\Windows\SysWOW64\yohienb.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2980 -
C:\Windows\SysWOW64\lbzxjrh.exeC:\Windows\system32\lbzxjrh.exe 528 "C:\Windows\SysWOW64\yohienb.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Windows\SysWOW64\vprnhrn.exeC:\Windows\system32\vprnhrn.exe 528 "C:\Windows\SysWOW64\lbzxjrh.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:952 -
C:\Windows\SysWOW64\vprnhrn.exeC:\Windows\system32\vprnhrn.exe 528 "C:\Windows\SysWOW64\lbzxjrh.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668 -
C:\Windows\SysWOW64\icjknut.exeC:\Windows\system32\icjknut.exe 528 "C:\Windows\SysWOW64\vprnhrn.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1676 -
C:\Windows\SysWOW64\icjknut.exeC:\Windows\system32\icjknut.exe 528 "C:\Windows\SysWOW64\vprnhrn.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2732 -
C:\Windows\SysWOW64\sfyvbya.exeC:\Windows\system32\sfyvbya.exe 528 "C:\Windows\SysWOW64\icjknut.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1568 -
C:\Windows\SysWOW64\sfyvbya.exeC:\Windows\system32\sfyvbya.exe 528 "C:\Windows\SysWOW64\icjknut.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2584 -
C:\Windows\SysWOW64\fsqkgby.exeC:\Windows\system32\fsqkgby.exe 528 "C:\Windows\SysWOW64\sfyvbya.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2704 -
C:\Windows\SysWOW64\fsqkgby.exeC:\Windows\system32\fsqkgby.exe 528 "C:\Windows\SysWOW64\sfyvbya.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:536 -
C:\Windows\SysWOW64\suwssgd.exeC:\Windows\system32\suwssgd.exe 528 "C:\Windows\SysWOW64\fsqkgby.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2140 -
C:\Windows\SysWOW64\suwssgd.exeC:\Windows\system32\suwssgd.exe 528 "C:\Windows\SysWOW64\fsqkgby.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\fkrvaoi.exeC:\Windows\system32\fkrvaoi.exe 528 "C:\Windows\SysWOW64\suwssgd.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2940 -
C:\Windows\SysWOW64\fkrvaoi.exeC:\Windows\system32\fkrvaoi.exe 528 "C:\Windows\SysWOW64\suwssgd.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:400 -
C:\Windows\SysWOW64\ovgfwrp.exeC:\Windows\system32\ovgfwrp.exe 528 "C:\Windows\SysWOW64\fkrvaoi.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2948 -
C:\Windows\SysWOW64\ovgfwrp.exeC:\Windows\system32\ovgfwrp.exe 528 "C:\Windows\SysWOW64\fkrvaoi.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2780 -
C:\Windows\SysWOW64\bljiezu.exeC:\Windows\system32\bljiezu.exe 528 "C:\Windows\SysWOW64\ovgfwrp.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2464 -
C:\Windows\SysWOW64\bljiezu.exeC:\Windows\system32\bljiezu.exe 528 "C:\Windows\SysWOW64\ovgfwrp.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Windows\SysWOW64\okelnza.exeC:\Windows\system32\okelnza.exe 528 "C:\Windows\SysWOW64\bljiezu.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2440 -
C:\Windows\SysWOW64\okelnza.exeC:\Windows\system32\okelnza.exe 528 "C:\Windows\SysWOW64\bljiezu.exe"34⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\ymtvadg.exeC:\Windows\system32\ymtvadg.exe 536 "C:\Windows\SysWOW64\okelnza.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:300 -
C:\Windows\SysWOW64\ymtvadg.exeC:\Windows\system32\ymtvadg.exe 536 "C:\Windows\SysWOW64\okelnza.exe"36⤵
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\ixifvgm.exeC:\Windows\system32\ixifvgm.exe 528 "C:\Windows\SysWOW64\ymtvadg.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:896 -
C:\Windows\SysWOW64\ixifvgm.exeC:\Windows\system32\ixifvgm.exe 528 "C:\Windows\SysWOW64\ymtvadg.exe"38⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\volieos.exeC:\Windows\system32\volieos.exe 536 "C:\Windows\SysWOW64\ixifvgm.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2108 -
C:\Windows\SysWOW64\volieos.exeC:\Windows\system32\volieos.exe 536 "C:\Windows\SysWOW64\ixifvgm.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1848 -
C:\Windows\SysWOW64\fnpfonz.exeC:\Windows\system32\fnpfonz.exe 528 "C:\Windows\SysWOW64\volieos.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2408 -
C:\Windows\SysWOW64\fnpfonz.exeC:\Windows\system32\fnpfonz.exe 528 "C:\Windows\SysWOW64\volieos.exe"42⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\putdzlh.exeC:\Windows\system32\putdzlh.exe 528 "C:\Windows\SysWOW64\fnpfonz.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2648 -
C:\Windows\SysWOW64\putdzlh.exeC:\Windows\system32\putdzlh.exe 528 "C:\Windows\SysWOW64\fnpfonz.exe"44⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\ztgarkh.exeC:\Windows\system32\ztgarkh.exe 528 "C:\Windows\SysWOW64\putdzlh.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1744 -
C:\Windows\SysWOW64\ztgarkh.exeC:\Windows\system32\ztgarkh.exe 528 "C:\Windows\SysWOW64\putdzlh.exe"46⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\kogtzfp.exeC:\Windows\system32\kogtzfp.exe 528 "C:\Windows\SysWOW64\ztgarkh.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:568 -
C:\Windows\SysWOW64\kogtzfp.exeC:\Windows\system32\kogtzfp.exe 528 "C:\Windows\SysWOW64\ztgarkh.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\xfbvhfn.exeC:\Windows\system32\xfbvhfn.exe 528 "C:\Windows\SysWOW64\kogtzfp.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1548 -
C:\Windows\SysWOW64\xfbvhfn.exeC:\Windows\system32\xfbvhfn.exe 528 "C:\Windows\SysWOW64\kogtzfp.exe"50⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\hqrgcib.exeC:\Windows\system32\hqrgcib.exe 528 "C:\Windows\SysWOW64\xfbvhfn.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:528 -
C:\Windows\SysWOW64\hqrgcib.exeC:\Windows\system32\hqrgcib.exe 528 "C:\Windows\SysWOW64\xfbvhfn.exe"52⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\oxmypxl.exeC:\Windows\system32\oxmypxl.exe 528 "C:\Windows\SysWOW64\hqrgcib.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1768 -
C:\Windows\SysWOW64\oxmypxl.exeC:\Windows\system32\oxmypxl.exe 528 "C:\Windows\SysWOW64\hqrgcib.exe"54⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\bohbxgi.exeC:\Windows\system32\bohbxgi.exe 536 "C:\Windows\SysWOW64\oxmypxl.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\bohbxgi.exeC:\Windows\system32\bohbxgi.exe 536 "C:\Windows\SysWOW64\oxmypxl.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:268 -
C:\Windows\SysWOW64\lvlyqeq.exeC:\Windows\system32\lvlyqeq.exe 528 "C:\Windows\SysWOW64\bohbxgi.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1300 -
C:\Windows\SysWOW64\lvlyqeq.exeC:\Windows\system32\lvlyqeq.exe 528 "C:\Windows\SysWOW64\bohbxgi.exe"58⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\vxiidhw.exeC:\Windows\system32\vxiidhw.exe 520 "C:\Windows\SysWOW64\lvlyqeq.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2012 -
C:\Windows\SysWOW64\vxiidhw.exeC:\Windows\system32\vxiidhw.exe 520 "C:\Windows\SysWOW64\lvlyqeq.exe"60⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\iksyjlv.exeC:\Windows\system32\iksyjlv.exe 536 "C:\Windows\SysWOW64\vxiidhw.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1032 -
C:\Windows\SysWOW64\iksyjlv.exeC:\Windows\system32\iksyjlv.exe 536 "C:\Windows\SysWOW64\vxiidhw.exe"62⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\svhjwoj.exeC:\Windows\system32\svhjwoj.exe 528 "C:\Windows\SysWOW64\iksyjlv.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2404 -
C:\Windows\SysWOW64\svhjwoj.exeC:\Windows\system32\svhjwoj.exe 528 "C:\Windows\SysWOW64\iksyjlv.exe"64⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\flklnph.exeC:\Windows\system32\flklnph.exe 528 "C:\Windows\SysWOW64\svhjwoj.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2052 -
C:\Windows\SysWOW64\flklnph.exeC:\Windows\system32\flklnph.exe 528 "C:\Windows\SysWOW64\svhjwoj.exe"66⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\pwawasv.exeC:\Windows\system32\pwawasv.exe 528 "C:\Windows\SysWOW64\flklnph.exe"67⤵
- Suspicious use of SetThreadContext
PID:2644 -
C:\Windows\SysWOW64\pwawasv.exeC:\Windows\system32\pwawasv.exe 528 "C:\Windows\SysWOW64\flklnph.exe"68⤵PID:2964
-
C:\Windows\SysWOW64\cjjlgwu.exeC:\Windows\system32\cjjlgwu.exe 528 "C:\Windows\SysWOW64\pwawasv.exe"69⤵
- Suspicious use of SetThreadContext
PID:1920 -
C:\Windows\SysWOW64\cjjlgwu.exeC:\Windows\system32\cjjlgwu.exe 528 "C:\Windows\SysWOW64\pwawasv.exe"70⤵PID:1288
-
C:\Windows\SysWOW64\mivjqub.exeC:\Windows\system32\mivjqub.exe 528 "C:\Windows\SysWOW64\cjjlgwu.exe"71⤵
- Suspicious use of SetThreadContext
PID:2028 -
C:\Windows\SysWOW64\mivjqub.exeC:\Windows\system32\mivjqub.exe 528 "C:\Windows\SysWOW64\cjjlgwu.exe"72⤵PID:2968
-
C:\Windows\SysWOW64\wtltlxi.exeC:\Windows\system32\wtltlxi.exe 528 "C:\Windows\SysWOW64\mivjqub.exe"73⤵
- Suspicious use of SetThreadContext
PID:1624 -
C:\Windows\SysWOW64\wtltlxi.exeC:\Windows\system32\wtltlxi.exe 528 "C:\Windows\SysWOW64\mivjqub.exe"74⤵PID:2820
-
C:\Windows\SysWOW64\jjfwuyn.exeC:\Windows\system32\jjfwuyn.exe 528 "C:\Windows\SysWOW64\wtltlxi.exe"75⤵
- Suspicious use of SetThreadContext
PID:2200 -
C:\Windows\SysWOW64\jjfwuyn.exeC:\Windows\system32\jjfwuyn.exe 528 "C:\Windows\SysWOW64\wtltlxi.exe"76⤵PID:1768
-
C:\Windows\SysWOW64\waizcgl.exeC:\Windows\system32\waizcgl.exe 528 "C:\Windows\SysWOW64\jjfwuyn.exe"77⤵
- Suspicious use of SetThreadContext
PID:1840 -
C:\Windows\SysWOW64\waizcgl.exeC:\Windows\system32\waizcgl.exe 528 "C:\Windows\SysWOW64\jjfwuyn.exe"78⤵PID:2444
-
C:\Windows\SysWOW64\gkyjqjz.exeC:\Windows\system32\gkyjqjz.exe 528 "C:\Windows\SysWOW64\waizcgl.exe"79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\gkyjqjz.exeC:\Windows\system32\gkyjqjz.exe 528 "C:\Windows\SysWOW64\waizcgl.exe"80⤵PID:1784
-
C:\Windows\SysWOW64\txhzvny.exeC:\Windows\system32\txhzvny.exe 528 "C:\Windows\SysWOW64\gkyjqjz.exe"81⤵
- Suspicious use of SetThreadContext
PID:3024 -
C:\Windows\SysWOW64\txhzvny.exeC:\Windows\system32\txhzvny.exe 528 "C:\Windows\SysWOW64\gkyjqjz.exe"82⤵PID:1268
-
C:\Windows\SysWOW64\dliwuml.exeC:\Windows\system32\dliwuml.exe 528 "C:\Windows\SysWOW64\txhzvny.exe"83⤵
- Suspicious use of SetThreadContext
PID:1760 -
C:\Windows\SysWOW64\dliwuml.exeC:\Windows\system32\dliwuml.exe 528 "C:\Windows\SysWOW64\txhzvny.exe"84⤵PID:1428
-
C:\Windows\SysWOW64\pclzcur.exeC:\Windows\system32\pclzcur.exe 528 "C:\Windows\SysWOW64\dliwuml.exe"85⤵
- Suspicious use of SetThreadContext
PID:2712 -
C:\Windows\SysWOW64\pclzcur.exeC:\Windows\system32\pclzcur.exe 528 "C:\Windows\SysWOW64\dliwuml.exe"86⤵PID:2520
-
C:\Windows\SysWOW64\uafblco.exeC:\Windows\system32\uafblco.exe 528 "C:\Windows\SysWOW64\pclzcur.exe"87⤵
- Suspicious use of SetThreadContext
PID:264 -
C:\Windows\SysWOW64\uafblco.exeC:\Windows\system32\uafblco.exe 528 "C:\Windows\SysWOW64\pclzcur.exe"88⤵PID:2596
-
C:\Windows\SysWOW64\edvmygc.exeC:\Windows\system32\edvmygc.exe 528 "C:\Windows\SysWOW64\uafblco.exe"89⤵
- Suspicious use of SetThreadContext
PID:1716 -
C:\Windows\SysWOW64\edvmygc.exeC:\Windows\system32\edvmygc.exe 528 "C:\Windows\SysWOW64\uafblco.exe"90⤵PID:2876
-
C:\Windows\SysWOW64\ruqghga.exeC:\Windows\system32\ruqghga.exe 528 "C:\Windows\SysWOW64\edvmygc.exe"91⤵
- Suspicious use of SetThreadContext
PID:2796 -
C:\Windows\SysWOW64\ruqghga.exeC:\Windows\system32\ruqghga.exe 528 "C:\Windows\SysWOW64\edvmygc.exe"92⤵PID:2204
-
C:\Windows\SysWOW64\essjxof.exeC:\Windows\system32\essjxof.exe 528 "C:\Windows\SysWOW64\ruqghga.exe"93⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\essjxof.exeC:\Windows\system32\essjxof.exe 528 "C:\Windows\SysWOW64\ruqghga.exe"94⤵PID:1528
-
C:\Windows\SysWOW64\ruyzjak.exeC:\Windows\system32\ruyzjak.exe 528 "C:\Windows\SysWOW64\essjxof.exe"95⤵
- Suspicious use of SetThreadContext
PID:2324 -
C:\Windows\SysWOW64\ruyzjak.exeC:\Windows\system32\ruyzjak.exe 528 "C:\Windows\SysWOW64\essjxof.exe"96⤵PID:1596
-
C:\Windows\SysWOW64\ektcrbp.exeC:\Windows\system32\ektcrbp.exe 536 "C:\Windows\SysWOW64\ruyzjak.exe"97⤵
- Suspicious use of SetThreadContext
PID:2472 -
C:\Windows\SysWOW64\ektcrbp.exeC:\Windows\system32\ektcrbp.exe 536 "C:\Windows\SysWOW64\ruyzjak.exe"98⤵PID:2284
-
C:\Windows\SysWOW64\onjmeew.exeC:\Windows\system32\onjmeew.exe 528 "C:\Windows\SysWOW64\ektcrbp.exe"99⤵
- Suspicious use of SetThreadContext
PID:684 -
C:\Windows\SysWOW64\onjmeew.exeC:\Windows\system32\onjmeew.exe 528 "C:\Windows\SysWOW64\ektcrbp.exe"100⤵PID:2424
-
C:\Windows\SysWOW64\ezrhirs.exeC:\Windows\system32\ezrhirs.exe 528 "C:\Windows\SysWOW64\onjmeew.exe"101⤵
- Suspicious use of SetThreadContext
PID:1340 -
C:\Windows\SysWOW64\ezrhirs.exeC:\Windows\system32\ezrhirs.exe 528 "C:\Windows\SysWOW64\onjmeew.exe"102⤵PID:376
-
C:\Windows\SysWOW64\norwyqg.exeC:\Windows\system32\norwyqg.exe 528 "C:\Windows\SysWOW64\ezrhirs.exe"103⤵
- Suspicious use of SetThreadContext
PID:3040 -
C:\Windows\SysWOW64\norwyqg.exeC:\Windows\system32\norwyqg.exe 528 "C:\Windows\SysWOW64\ezrhirs.exe"104⤵PID:2836
-
C:\Windows\SysWOW64\xnwcrpn.exeC:\Windows\system32\xnwcrpn.exe 536 "C:\Windows\SysWOW64\norwyqg.exe"105⤵
- Suspicious use of SetThreadContext
PID:2604 -
C:\Windows\SysWOW64\xnwcrpn.exeC:\Windows\system32\xnwcrpn.exe 536 "C:\Windows\SysWOW64\norwyqg.exe"106⤵PID:2432
-
C:\Windows\SysWOW64\nvhcyhr.exeC:\Windows\system32\nvhcyhr.exe 536 "C:\Windows\SysWOW64\xnwcrpn.exe"107⤵
- Suspicious use of SetThreadContext
PID:2752 -
C:\Windows\SysWOW64\nvhcyhr.exeC:\Windows\system32\nvhcyhr.exe 536 "C:\Windows\SysWOW64\xnwcrpn.exe"108⤵PID:3064
-
C:\Windows\SysWOW64\xfwmlkx.exeC:\Windows\system32\xfwmlkx.exe 528 "C:\Windows\SysWOW64\nvhcyhr.exe"109⤵
- Suspicious use of SetThreadContext
PID:1620 -
C:\Windows\SysWOW64\xfwmlkx.exeC:\Windows\system32\xfwmlkx.exe 528 "C:\Windows\SysWOW64\nvhcyhr.exe"110⤵PID:2140
-
C:\Windows\SysWOW64\kwzptkd.exeC:\Windows\system32\kwzptkd.exe 528 "C:\Windows\SysWOW64\xfwmlkx.exe"111⤵
- Suspicious use of SetThreadContext
PID:2760 -
C:\Windows\SysWOW64\kwzptkd.exeC:\Windows\system32\kwzptkd.exe 528 "C:\Windows\SysWOW64\xfwmlkx.exe"112⤵PID:1548
-
C:\Windows\SysWOW64\xuurcsa.exeC:\Windows\system32\xuurcsa.exe 528 "C:\Windows\SysWOW64\kwzptkd.exe"113⤵
- Suspicious use of SetThreadContext
PID:2568 -
C:\Windows\SysWOW64\xuurcsa.exeC:\Windows\system32\xuurcsa.exe 528 "C:\Windows\SysWOW64\kwzptkd.exe"114⤵PID:1644
-
C:\Windows\SysWOW64\hxjcxvo.exeC:\Windows\system32\hxjcxvo.exe 528 "C:\Windows\SysWOW64\xuurcsa.exe"115⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\hxjcxvo.exeC:\Windows\system32\hxjcxvo.exe 528 "C:\Windows\SysWOW64\xuurcsa.exe"116⤵PID:1144
-
C:\Windows\SysWOW64\uvmegdm.exeC:\Windows\system32\uvmegdm.exe 528 "C:\Windows\SysWOW64\hxjcxvo.exe"117⤵
- Suspicious use of SetThreadContext
PID:1732 -
C:\Windows\SysWOW64\uvmegdm.exeC:\Windows\system32\uvmegdm.exe 528 "C:\Windows\SysWOW64\hxjcxvo.exe"118⤵PID:2476
-
C:\Windows\SysWOW64\gmhhpes.exeC:\Windows\system32\gmhhpes.exe 528 "C:\Windows\SysWOW64\uvmegdm.exe"119⤵
- Suspicious use of SetThreadContext
PID:1796 -
C:\Windows\SysWOW64\gmhhpes.exeC:\Windows\system32\gmhhpes.exe 528 "C:\Windows\SysWOW64\uvmegdm.exe"120⤵PID:1908
-
C:\Windows\SysWOW64\qwwschy.exeC:\Windows\system32\qwwschy.exe 528 "C:\Windows\SysWOW64\gmhhpes.exe"121⤵
- Suspicious use of SetThreadContext
PID:1996 -
C:\Windows\SysWOW64\qwwschy.exeC:\Windows\system32\qwwschy.exe 528 "C:\Windows\SysWOW64\gmhhpes.exe"122⤵PID:2536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-