Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe
-
Size
512KB
-
MD5
e303c45b47964eac4a963ec7fe22f8b2
-
SHA1
96ab3045af9c00022b95e4da1a71620c2851c7b9
-
SHA256
c4117dfef9be658345231f2f3dd057b553e18bea36068856c5bda1d2b9d36853
-
SHA512
2ccbf25f7c304c4e810662e977a56c1196fa135cdd46bc7e4c4eecc11a8f695592650c09e2e289f0168364660e3723ab8db1232fdcdad50bb21e2f3d1bf01304
-
SSDEEP
12288:CbuGaAwHLj7L3E5nfDLuYGLgcSxXFX1VAcpkDO6ufo7Kt:CFIbDE9fH0tO/ic+DO6u5
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 4548 kvbyrha.exe 2472 kvbyrha.exe 956 vnrvwfc.exe 220 vnrvwfc.exe 1204 dgqwcmg.exe 3772 dgqwcmg.exe 1396 nrfgxpn.exe 4408 nrfgxpn.exe 1356 dvnbbuj.exe 4528 dvnbbuj.exe 3316 pxtrnhw.exe 4512 pxtrnhw.exe 4088 dklgtlv.exe 3540 dklgtlv.exe 3196 konlcwx.exe 2104 konlcwx.exe 4112 apkbdfv.exe 5000 apkbdfv.exe 1008 ixguxuf.exe 2572 ixguxuf.exe 4472 qbgptzc.exe 4156 qbgptzc.exe 4828 xjbhoxl.exe 1216 xjbhoxl.exe 1456 lsirrod.exe 760 lsirrod.exe 668 voacyje.exe 1372 voacyje.exe 4144 indfhrj.exe 3340 indfhrj.exe 2096 siwxwlk.exe 2916 siwxwlk.exe 4036 chiuhks.exe 4284 chiuhks.exe 1888 qrpxkks.exe 1640 qrpxkks.exe 2256 dhjatsx.exe 4728 dhjatsx.exe 4176 ndksimy.exe 3924 ndksimy.exe 3668 xnavvpe.exe 4808 xnavvpe.exe 4332 kajsbld.exe 4236 kajsbld.exe 1596 xnbihpk.exe 1468 xnbihpk.exe 2612 kphqsco.exe 1820 kphqsco.exe 4388 xcynyyn.exe 4764 xcynyyn.exe 920 kttqhgt.exe 4108 kttqhgt.exe 4100 upubwat.exe 2200 upubwat.exe 4540 hnpdfiz.exe 4664 hnpdfiz.exe 4992 vagtlmy.exe 4488 vagtlmy.exe 112 inqjriw.exe 1264 inqjriw.exe 2188 vahywmv.exe 4812 vahywmv.exe 3648 flxjkpj.exe 3216 flxjkpj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hiakhge.exe xnzaalw.exe File opened for modification C:\Windows\SysWOW64\vhokckl.exe ijthtkf.exe File created C:\Windows\SysWOW64\stkxanr.exe iufahok.exe File created C:\Windows\SysWOW64\xwrjmnx.exe jjztyjz.exe File created C:\Windows\SysWOW64\iwlwhtp.exe Process not Found File opened for modification C:\Windows\SysWOW64\ntespgd.exe agncbcx.exe File opened for modification C:\Windows\SysWOW64\rryprsv.exe hstrzto.exe File created C:\Windows\SysWOW64\knuxaqm.exe Process not Found File opened for modification C:\Windows\SysWOW64\uolsexu.exe Process not Found File opened for modification C:\Windows\SysWOW64\ugkmkyw.exe Process not Found File created C:\Windows\SysWOW64\apkbdfv.exe konlcwx.exe File opened for modification C:\Windows\SysWOW64\rwyvumy.exe ejhxpiz.exe File created C:\Windows\SysWOW64\wmpwgxl.exe jzxgatn.exe File created C:\Windows\SysWOW64\ghhmswm.exe tuxwmsn.exe File created C:\Windows\SysWOW64\sdstnme.exe isdjzrp.exe File opened for modification C:\Windows\SysWOW64\cbzlbsf.exe sycaopy.exe File created C:\Windows\SysWOW64\wepmxwu.exe rryprsv.exe File opened for modification C:\Windows\SysWOW64\ntgfagb.exe agopukc.exe File created C:\Windows\SysWOW64\lnvuqml.exe yaefkqm.exe File created C:\Windows\SysWOW64\nqjmeir.exe dotcrfl.exe File opened for modification C:\Windows\SysWOW64\rtsoaqo.exe egayuup.exe File opened for modification C:\Windows\SysWOW64\jqsicrb.exe zgcghom.exe File opened for modification C:\Windows\SysWOW64\ryzzziv.exe hzntpkn.exe File opened for modification C:\Windows\SysWOW64\yqcfxuy.exe ofnujrr.exe File created C:\Windows\SysWOW64\wnlyvjo.exe jxqvmai.exe File opened for modification C:\Windows\SysWOW64\npnpdfi.exe acwrxjb.exe File opened for modification C:\Windows\SysWOW64\shflbya.exe ffzeqmw.exe File opened for modification C:\Windows\SysWOW64\vleddti.exe Process not Found File created C:\Windows\SysWOW64\suxvbjg.exe ehgfvfh.exe File created C:\Windows\SysWOW64\fexwiqq.exe srggdmr.exe File opened for modification C:\Windows\SysWOW64\kkjmhzp.exe xmhjzrr.exe File created C:\Windows\SysWOW64\hnovgtv.exe uawfapo.exe File created C:\Windows\SysWOW64\hrxpkit.exe ubunbio.exe File opened for modification C:\Windows\SysWOW64\xrdmrrj.exe Process not Found File opened for modification C:\Windows\SysWOW64\ubwwvza.exe krhmzwu.exe File created C:\Windows\SysWOW64\hplbboz.exe uriztgt.exe File opened for modification C:\Windows\SysWOW64\ldvioyc.exe ytoxlgc.exe File opened for modification C:\Windows\SysWOW64\qsfbyyy.exe dbdzqqs.exe File opened for modification C:\Windows\SysWOW64\nfygzqx.exe Process not Found File opened for modification C:\Windows\SysWOW64\konlcwx.exe dklgtlv.exe File opened for modification C:\Windows\SysWOW64\tltlapy.exe gycouls.exe File opened for modification C:\Windows\SysWOW64\suoiakh.exe ijzynpb.exe File created C:\Windows\SysWOW64\amyrkxq.exe nzobftr.exe File opened for modification C:\Windows\SysWOW64\ygbazko.exe ohpdglo.exe File opened for modification C:\Windows\SysWOW64\tzdqufe.exe gmttpjg.exe File created C:\Windows\SysWOW64\ycbrqbw.exe Process not Found File opened for modification C:\Windows\SysWOW64\unpqpmz.exe Process not Found File created C:\Windows\SysWOW64\oojnwug.exe bbzpqyh.exe File opened for modification C:\Windows\SysWOW64\xjipwsa.exe koraqoc.exe File created C:\Windows\SysWOW64\utthqaq.exe hgjskej.exe File created C:\Windows\SysWOW64\lvssvqf.exe clcianq.exe File created C:\Windows\SysWOW64\ewxiwbx.exe qjgsqxy.exe File opened for modification C:\Windows\SysWOW64\ohpdglo.exe bugnaih.exe File created C:\Windows\SysWOW64\xgxkpsa.exe Process not Found File opened for modification C:\Windows\SysWOW64\indfhrj.exe voacyje.exe File opened for modification C:\Windows\SysWOW64\mtzhvpj.exe cxywfvj.exe File opened for modification C:\Windows\SysWOW64\qrauyny.exe deqesjz.exe File opened for modification C:\Windows\SysWOW64\ikuvjty.exe yafkvps.exe File opened for modification C:\Windows\SysWOW64\vznxqkn.exe kajzglg.exe File created C:\Windows\SysWOW64\lblyeom.exe ygbazko.exe File opened for modification C:\Windows\SysWOW64\npebrfd.exe deprecw.exe File opened for modification C:\Windows\SysWOW64\zbqjlic.exe pqbhyfw.exe File created C:\Windows\SysWOW64\hnksxdb.exe uwppodd.exe File opened for modification C:\Windows\SysWOW64\ejicdqd.exe racrazl.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1388 set thread context of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 4548 set thread context of 2472 4548 kvbyrha.exe 86 PID 956 set thread context of 220 956 vnrvwfc.exe 88 PID 1204 set thread context of 3772 1204 dgqwcmg.exe 90 PID 1396 set thread context of 4408 1396 nrfgxpn.exe 92 PID 1356 set thread context of 4528 1356 dvnbbuj.exe 94 PID 3316 set thread context of 4512 3316 pxtrnhw.exe 96 PID 4088 set thread context of 3540 4088 dklgtlv.exe 98 PID 3196 set thread context of 2104 3196 konlcwx.exe 100 PID 4112 set thread context of 5000 4112 apkbdfv.exe 102 PID 1008 set thread context of 2572 1008 ixguxuf.exe 104 PID 4472 set thread context of 4156 4472 qbgptzc.exe 106 PID 4828 set thread context of 1216 4828 xjbhoxl.exe 108 PID 1456 set thread context of 760 1456 lsirrod.exe 112 PID 668 set thread context of 1372 668 voacyje.exe 114 PID 4144 set thread context of 3340 4144 indfhrj.exe 116 PID 2096 set thread context of 2916 2096 siwxwlk.exe 118 PID 4036 set thread context of 4284 4036 chiuhks.exe 121 PID 1888 set thread context of 1640 1888 qrpxkks.exe 124 PID 2256 set thread context of 4728 2256 dhjatsx.exe 126 PID 4176 set thread context of 3924 4176 ndksimy.exe 128 PID 3668 set thread context of 4808 3668 xnavvpe.exe 130 PID 4332 set thread context of 4236 4332 kajsbld.exe 132 PID 1596 set thread context of 1468 1596 xnbihpk.exe 134 PID 2612 set thread context of 1820 2612 kphqsco.exe 136 PID 4388 set thread context of 4764 4388 xcynyyn.exe 138 PID 920 set thread context of 4108 920 kttqhgt.exe 140 PID 4100 set thread context of 2200 4100 upubwat.exe 142 PID 4540 set thread context of 4664 4540 hnpdfiz.exe 144 PID 4992 set thread context of 4488 4992 vagtlmy.exe 146 PID 112 set thread context of 1264 112 inqjriw.exe 148 PID 2188 set thread context of 4812 2188 vahywmv.exe 151 PID 3648 set thread context of 3216 3648 flxjkpj.exe 153 PID 2896 set thread context of 4404 2896 syogpti.exe 155 PID 1476 set thread context of 4208 1476 flywvph.exe 157 PID 2500 set thread context of 5028 2500 sypmjsg.exe 159 PID 4340 set thread context of 4836 4340 cfujtrn.exe 161 PID 4084 set thread context of 2164 4084 pvwmczt.exe 163 PID 3716 set thread context of 3644 3716 dfdpfzl.exe 165 PID 1956 set thread context of 3928 1956 qvxrozq.exe 167 PID 1356 set thread context of 3568 1356 agncbcx.exe 169 PID 4256 set thread context of 3500 4256 ntespgd.exe 171 PID 1028 set thread context of 2756 1028 agopukc.exe 173 PID 2160 set thread context of 4112 2160 ntgfagb.exe 175 PID 4724 set thread context of 1008 4724 xdvpnjh.exe 177 PID 4432 set thread context of 3112 4432 kqmftng.exe 180 PID 1800 set thread context of 1384 1800 xdwvzrn.exe 183 PID 1456 set thread context of 4064 1456 kqokfum.exe 185 PID 1944 set thread context of 3348 1944 ubdvaps.exe 187 PID 5104 set thread context of 3132 5104 houlgtr.exe 189 PID 4584 set thread context of 1656 4584 uepnocw.exe 191 PID 4864 set thread context of 3140 4864 faqgwwx.exe 193 PID 2928 set thread context of 440 2928 szlifed.exe 195 PID 2256 set thread context of 1496 2256 fmcykab.exe 197 PID 1824 set thread context of 708 1824 szmoqea.exe 199 PID 4716 set thread context of 4392 4716 fmedwih.exe 201 PID 2944 set thread context of 1684 2944 hwtorln.exe 203 PID 1604 set thread context of 400 1604 ujlexpm.exe 205 PID 1968 set thread context of 4972 1968 hwutdkl.exe 207 PID 2360 set thread context of 4724 2360 vjmrjok.exe 209 PID 5092 set thread context of 2684 5092 eubtwry.exe 211 PID 4048 set thread context of 4468 4048 vvyjxso.exe 213 PID 944 set thread context of 1080 944 exnusvc.exe 215 PID 2032 set thread context of 4144 2032 shuxvvu.exe 217 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apkbdfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egayuup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oojnwug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffvgfxq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjbhoxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqufnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niurddl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oompmmw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hplbboz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtkhjgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnovgtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfmyjeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubsrybi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rqbnchb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wepmxwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgqwcmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdwvzrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxmkowx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyuossb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhplbok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijthtkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mktztjw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utthqaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flywvph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxqvmai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hymnfvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilzfvvm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvluluf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtstfcu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language faqgwwx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ckfbzuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zijibme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcahhcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwyvumy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wceqhca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldmccye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhokckl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdidhbs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emxvuno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apkbdfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zwxijeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chpyuii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsmaivx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbsqgxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubunbio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbaqnrk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhnglij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohoyvmj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 1388 wrote to memory of 4752 1388 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 84 PID 4752 wrote to memory of 4548 4752 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 85 PID 4752 wrote to memory of 4548 4752 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 85 PID 4752 wrote to memory of 4548 4752 e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe 85 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 4548 wrote to memory of 2472 4548 kvbyrha.exe 86 PID 2472 wrote to memory of 956 2472 kvbyrha.exe 87 PID 2472 wrote to memory of 956 2472 kvbyrha.exe 87 PID 2472 wrote to memory of 956 2472 kvbyrha.exe 87 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 956 wrote to memory of 220 956 vnrvwfc.exe 88 PID 220 wrote to memory of 1204 220 vnrvwfc.exe 89 PID 220 wrote to memory of 1204 220 vnrvwfc.exe 89 PID 220 wrote to memory of 1204 220 vnrvwfc.exe 89 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 1204 wrote to memory of 3772 1204 dgqwcmg.exe 90 PID 3772 wrote to memory of 1396 3772 dgqwcmg.exe 91 PID 3772 wrote to memory of 1396 3772 dgqwcmg.exe 91 PID 3772 wrote to memory of 1396 3772 dgqwcmg.exe 91 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 1396 wrote to memory of 4408 1396 nrfgxpn.exe 92 PID 4408 wrote to memory of 1356 4408 nrfgxpn.exe 93 PID 4408 wrote to memory of 1356 4408 nrfgxpn.exe 93 PID 4408 wrote to memory of 1356 4408 nrfgxpn.exe 93 PID 1356 wrote to memory of 4528 1356 dvnbbuj.exe 94 PID 1356 wrote to memory of 4528 1356 dvnbbuj.exe 94 PID 1356 wrote to memory of 4528 1356 dvnbbuj.exe 94 PID 1356 wrote to memory of 4528 1356 dvnbbuj.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\kvbyrha.exeC:\Windows\system32\kvbyrha.exe 1120 "C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\kvbyrha.exeC:\Windows\system32\kvbyrha.exe 1120 "C:\Users\Admin\AppData\Local\Temp\e303c45b47964eac4a963ec7fe22f8b2_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\vnrvwfc.exeC:\Windows\system32\vnrvwfc.exe 1120 "C:\Windows\SysWOW64\kvbyrha.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\vnrvwfc.exeC:\Windows\system32\vnrvwfc.exe 1120 "C:\Windows\SysWOW64\kvbyrha.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\dgqwcmg.exeC:\Windows\system32\dgqwcmg.exe 1120 "C:\Windows\SysWOW64\vnrvwfc.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\dgqwcmg.exeC:\Windows\system32\dgqwcmg.exe 1120 "C:\Windows\SysWOW64\vnrvwfc.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\nrfgxpn.exeC:\Windows\system32\nrfgxpn.exe 1128 "C:\Windows\SysWOW64\dgqwcmg.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\nrfgxpn.exeC:\Windows\system32\nrfgxpn.exe 1128 "C:\Windows\SysWOW64\dgqwcmg.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\dvnbbuj.exeC:\Windows\system32\dvnbbuj.exe 1120 "C:\Windows\SysWOW64\nrfgxpn.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\dvnbbuj.exeC:\Windows\system32\dvnbbuj.exe 1120 "C:\Windows\SysWOW64\nrfgxpn.exe"12⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\pxtrnhw.exeC:\Windows\system32\pxtrnhw.exe 1120 "C:\Windows\SysWOW64\dvnbbuj.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3316 -
C:\Windows\SysWOW64\pxtrnhw.exeC:\Windows\system32\pxtrnhw.exe 1120 "C:\Windows\SysWOW64\dvnbbuj.exe"14⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\dklgtlv.exeC:\Windows\system32\dklgtlv.exe 1120 "C:\Windows\SysWOW64\pxtrnhw.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4088 -
C:\Windows\SysWOW64\dklgtlv.exeC:\Windows\system32\dklgtlv.exe 1120 "C:\Windows\SysWOW64\pxtrnhw.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3540 -
C:\Windows\SysWOW64\konlcwx.exeC:\Windows\system32\konlcwx.exe 1120 "C:\Windows\SysWOW64\dklgtlv.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3196 -
C:\Windows\SysWOW64\konlcwx.exeC:\Windows\system32\konlcwx.exe 1120 "C:\Windows\SysWOW64\dklgtlv.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\apkbdfv.exeC:\Windows\system32\apkbdfv.exe 1092 "C:\Windows\SysWOW64\konlcwx.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4112 -
C:\Windows\SysWOW64\apkbdfv.exeC:\Windows\system32\apkbdfv.exe 1092 "C:\Windows\SysWOW64\konlcwx.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\SysWOW64\ixguxuf.exeC:\Windows\system32\ixguxuf.exe 1128 "C:\Windows\SysWOW64\apkbdfv.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1008 -
C:\Windows\SysWOW64\ixguxuf.exeC:\Windows\system32\ixguxuf.exe 1128 "C:\Windows\SysWOW64\apkbdfv.exe"22⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\qbgptzc.exeC:\Windows\system32\qbgptzc.exe 1120 "C:\Windows\SysWOW64\ixguxuf.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4472 -
C:\Windows\SysWOW64\qbgptzc.exeC:\Windows\system32\qbgptzc.exe 1120 "C:\Windows\SysWOW64\ixguxuf.exe"24⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\xjbhoxl.exeC:\Windows\system32\xjbhoxl.exe 1120 "C:\Windows\SysWOW64\qbgptzc.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4828 -
C:\Windows\SysWOW64\xjbhoxl.exeC:\Windows\system32\xjbhoxl.exe 1120 "C:\Windows\SysWOW64\qbgptzc.exe"26⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\lsirrod.exeC:\Windows\system32\lsirrod.exe 1120 "C:\Windows\SysWOW64\xjbhoxl.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1456 -
C:\Windows\SysWOW64\lsirrod.exeC:\Windows\system32\lsirrod.exe 1120 "C:\Windows\SysWOW64\xjbhoxl.exe"28⤵
- Executes dropped EXE
PID:760 -
C:\Windows\SysWOW64\voacyje.exeC:\Windows\system32\voacyje.exe 1120 "C:\Windows\SysWOW64\lsirrod.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:668 -
C:\Windows\SysWOW64\voacyje.exeC:\Windows\system32\voacyje.exe 1120 "C:\Windows\SysWOW64\lsirrod.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\indfhrj.exeC:\Windows\system32\indfhrj.exe 1120 "C:\Windows\SysWOW64\voacyje.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4144 -
C:\Windows\SysWOW64\indfhrj.exeC:\Windows\system32\indfhrj.exe 1120 "C:\Windows\SysWOW64\voacyje.exe"32⤵
- Executes dropped EXE
PID:3340 -
C:\Windows\SysWOW64\siwxwlk.exeC:\Windows\system32\siwxwlk.exe 1120 "C:\Windows\SysWOW64\indfhrj.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2096 -
C:\Windows\SysWOW64\siwxwlk.exeC:\Windows\system32\siwxwlk.exe 1120 "C:\Windows\SysWOW64\indfhrj.exe"34⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\chiuhks.exeC:\Windows\system32\chiuhks.exe 1168 "C:\Windows\SysWOW64\siwxwlk.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4036 -
C:\Windows\SysWOW64\chiuhks.exeC:\Windows\system32\chiuhks.exe 1168 "C:\Windows\SysWOW64\siwxwlk.exe"36⤵
- Executes dropped EXE
PID:4284 -
C:\Windows\SysWOW64\qrpxkks.exeC:\Windows\system32\qrpxkks.exe 1120 "C:\Windows\SysWOW64\chiuhks.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1888 -
C:\Windows\SysWOW64\qrpxkks.exeC:\Windows\system32\qrpxkks.exe 1120 "C:\Windows\SysWOW64\chiuhks.exe"38⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\dhjatsx.exeC:\Windows\system32\dhjatsx.exe 1120 "C:\Windows\SysWOW64\qrpxkks.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2256 -
C:\Windows\SysWOW64\dhjatsx.exeC:\Windows\system32\dhjatsx.exe 1120 "C:\Windows\SysWOW64\qrpxkks.exe"40⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\ndksimy.exeC:\Windows\system32\ndksimy.exe 1120 "C:\Windows\SysWOW64\dhjatsx.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4176 -
C:\Windows\SysWOW64\ndksimy.exeC:\Windows\system32\ndksimy.exe 1120 "C:\Windows\SysWOW64\dhjatsx.exe"42⤵
- Executes dropped EXE
PID:3924 -
C:\Windows\SysWOW64\xnavvpe.exeC:\Windows\system32\xnavvpe.exe 1080 "C:\Windows\SysWOW64\ndksimy.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3668 -
C:\Windows\SysWOW64\xnavvpe.exeC:\Windows\system32\xnavvpe.exe 1080 "C:\Windows\SysWOW64\ndksimy.exe"44⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\kajsbld.exeC:\Windows\system32\kajsbld.exe 1120 "C:\Windows\SysWOW64\xnavvpe.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4332 -
C:\Windows\SysWOW64\kajsbld.exeC:\Windows\system32\kajsbld.exe 1120 "C:\Windows\SysWOW64\xnavvpe.exe"46⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\xnbihpk.exeC:\Windows\system32\xnbihpk.exe 1120 "C:\Windows\SysWOW64\kajsbld.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1596 -
C:\Windows\SysWOW64\xnbihpk.exeC:\Windows\system32\xnbihpk.exe 1120 "C:\Windows\SysWOW64\kajsbld.exe"48⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\kphqsco.exeC:\Windows\system32\kphqsco.exe 1124 "C:\Windows\SysWOW64\xnbihpk.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2612 -
C:\Windows\SysWOW64\kphqsco.exeC:\Windows\system32\kphqsco.exe 1124 "C:\Windows\SysWOW64\xnbihpk.exe"50⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\xcynyyn.exeC:\Windows\system32\xcynyyn.exe 1120 "C:\Windows\SysWOW64\kphqsco.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4388 -
C:\Windows\SysWOW64\xcynyyn.exeC:\Windows\system32\xcynyyn.exe 1120 "C:\Windows\SysWOW64\kphqsco.exe"52⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\kttqhgt.exeC:\Windows\system32\kttqhgt.exe 1120 "C:\Windows\SysWOW64\xcynyyn.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:920 -
C:\Windows\SysWOW64\kttqhgt.exeC:\Windows\system32\kttqhgt.exe 1120 "C:\Windows\SysWOW64\xcynyyn.exe"54⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\SysWOW64\upubwat.exeC:\Windows\system32\upubwat.exe 1112 "C:\Windows\SysWOW64\kttqhgt.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4100 -
C:\Windows\SysWOW64\upubwat.exeC:\Windows\system32\upubwat.exe 1112 "C:\Windows\SysWOW64\kttqhgt.exe"56⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\hnpdfiz.exeC:\Windows\system32\hnpdfiz.exe 1136 "C:\Windows\SysWOW64\upubwat.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4540 -
C:\Windows\SysWOW64\hnpdfiz.exeC:\Windows\system32\hnpdfiz.exe 1136 "C:\Windows\SysWOW64\upubwat.exe"58⤵
- Executes dropped EXE
PID:4664 -
C:\Windows\SysWOW64\vagtlmy.exeC:\Windows\system32\vagtlmy.exe 1120 "C:\Windows\SysWOW64\hnpdfiz.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4992 -
C:\Windows\SysWOW64\vagtlmy.exeC:\Windows\system32\vagtlmy.exe 1120 "C:\Windows\SysWOW64\hnpdfiz.exe"60⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\inqjriw.exeC:\Windows\system32\inqjriw.exe 1120 "C:\Windows\SysWOW64\vagtlmy.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:112 -
C:\Windows\SysWOW64\inqjriw.exeC:\Windows\system32\inqjriw.exe 1120 "C:\Windows\SysWOW64\vagtlmy.exe"62⤵
- Executes dropped EXE
PID:1264 -
C:\Windows\SysWOW64\vahywmv.exeC:\Windows\system32\vahywmv.exe 1120 "C:\Windows\SysWOW64\inqjriw.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2188 -
C:\Windows\SysWOW64\vahywmv.exeC:\Windows\system32\vahywmv.exe 1120 "C:\Windows\SysWOW64\inqjriw.exe"64⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\flxjkpj.exeC:\Windows\system32\flxjkpj.exe 1120 "C:\Windows\SysWOW64\vahywmv.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3648 -
C:\Windows\SysWOW64\flxjkpj.exeC:\Windows\system32\flxjkpj.exe 1120 "C:\Windows\SysWOW64\vahywmv.exe"66⤵
- Executes dropped EXE
PID:3216 -
C:\Windows\SysWOW64\syogpti.exeC:\Windows\system32\syogpti.exe 1120 "C:\Windows\SysWOW64\flxjkpj.exe"67⤵
- Suspicious use of SetThreadContext
PID:2896 -
C:\Windows\SysWOW64\syogpti.exeC:\Windows\system32\syogpti.exe 1120 "C:\Windows\SysWOW64\flxjkpj.exe"68⤵PID:4404
-
C:\Windows\SysWOW64\flywvph.exeC:\Windows\system32\flywvph.exe 1120 "C:\Windows\SysWOW64\syogpti.exe"69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\flywvph.exeC:\Windows\system32\flywvph.exe 1120 "C:\Windows\SysWOW64\syogpti.exe"70⤵PID:4208
-
C:\Windows\SysWOW64\sypmjsg.exeC:\Windows\system32\sypmjsg.exe 1120 "C:\Windows\SysWOW64\flywvph.exe"71⤵
- Suspicious use of SetThreadContext
PID:2500 -
C:\Windows\SysWOW64\sypmjsg.exeC:\Windows\system32\sypmjsg.exe 1120 "C:\Windows\SysWOW64\flywvph.exe"72⤵PID:5028
-
C:\Windows\SysWOW64\cfujtrn.exeC:\Windows\system32\cfujtrn.exe 1120 "C:\Windows\SysWOW64\sypmjsg.exe"73⤵
- Suspicious use of SetThreadContext
PID:4340 -
C:\Windows\SysWOW64\cfujtrn.exeC:\Windows\system32\cfujtrn.exe 1120 "C:\Windows\SysWOW64\sypmjsg.exe"74⤵PID:4836
-
C:\Windows\SysWOW64\pvwmczt.exeC:\Windows\system32\pvwmczt.exe 1120 "C:\Windows\SysWOW64\cfujtrn.exe"75⤵
- Suspicious use of SetThreadContext
PID:4084 -
C:\Windows\SysWOW64\pvwmczt.exeC:\Windows\system32\pvwmczt.exe 1120 "C:\Windows\SysWOW64\cfujtrn.exe"76⤵PID:2164
-
C:\Windows\SysWOW64\dfdpfzl.exeC:\Windows\system32\dfdpfzl.exe 1120 "C:\Windows\SysWOW64\pvwmczt.exe"77⤵
- Suspicious use of SetThreadContext
PID:3716 -
C:\Windows\SysWOW64\dfdpfzl.exeC:\Windows\system32\dfdpfzl.exe 1120 "C:\Windows\SysWOW64\pvwmczt.exe"78⤵PID:3644
-
C:\Windows\SysWOW64\qvxrozq.exeC:\Windows\system32\qvxrozq.exe 1128 "C:\Windows\SysWOW64\dfdpfzl.exe"79⤵
- Suspicious use of SetThreadContext
PID:1956 -
C:\Windows\SysWOW64\qvxrozq.exeC:\Windows\system32\qvxrozq.exe 1128 "C:\Windows\SysWOW64\dfdpfzl.exe"80⤵PID:3928
-
C:\Windows\SysWOW64\agncbcx.exeC:\Windows\system32\agncbcx.exe 1120 "C:\Windows\SysWOW64\qvxrozq.exe"81⤵
- Suspicious use of SetThreadContext
PID:1356 -
C:\Windows\SysWOW64\agncbcx.exeC:\Windows\system32\agncbcx.exe 1120 "C:\Windows\SysWOW64\qvxrozq.exe"82⤵
- Drops file in System32 directory
PID:3568 -
C:\Windows\SysWOW64\ntespgd.exeC:\Windows\system32\ntespgd.exe 1128 "C:\Windows\SysWOW64\agncbcx.exe"83⤵
- Suspicious use of SetThreadContext
PID:4256 -
C:\Windows\SysWOW64\ntespgd.exeC:\Windows\system32\ntespgd.exe 1128 "C:\Windows\SysWOW64\agncbcx.exe"84⤵PID:3500
-
C:\Windows\SysWOW64\agopukc.exeC:\Windows\system32\agopukc.exe 1120 "C:\Windows\SysWOW64\ntespgd.exe"85⤵
- Suspicious use of SetThreadContext
PID:1028 -
C:\Windows\SysWOW64\agopukc.exeC:\Windows\system32\agopukc.exe 1120 "C:\Windows\SysWOW64\ntespgd.exe"86⤵
- Drops file in System32 directory
PID:2756 -
C:\Windows\SysWOW64\ntgfagb.exeC:\Windows\system32\ntgfagb.exe 1120 "C:\Windows\SysWOW64\agopukc.exe"87⤵
- Suspicious use of SetThreadContext
PID:2160 -
C:\Windows\SysWOW64\ntgfagb.exeC:\Windows\system32\ntgfagb.exe 1120 "C:\Windows\SysWOW64\agopukc.exe"88⤵PID:4112
-
C:\Windows\SysWOW64\xdvpnjh.exeC:\Windows\system32\xdvpnjh.exe 1120 "C:\Windows\SysWOW64\ntgfagb.exe"89⤵
- Suspicious use of SetThreadContext
PID:4724 -
C:\Windows\SysWOW64\xdvpnjh.exeC:\Windows\system32\xdvpnjh.exe 1120 "C:\Windows\SysWOW64\ntgfagb.exe"90⤵PID:1008
-
C:\Windows\SysWOW64\kqmftng.exeC:\Windows\system32\kqmftng.exe 1120 "C:\Windows\SysWOW64\xdvpnjh.exe"91⤵
- Suspicious use of SetThreadContext
PID:4432 -
C:\Windows\SysWOW64\kqmftng.exeC:\Windows\system32\kqmftng.exe 1120 "C:\Windows\SysWOW64\xdvpnjh.exe"92⤵PID:3112
-
C:\Windows\SysWOW64\xdwvzrn.exeC:\Windows\system32\xdwvzrn.exe 1120 "C:\Windows\SysWOW64\kqmftng.exe"93⤵
- Suspicious use of SetThreadContext
PID:1800 -
C:\Windows\SysWOW64\xdwvzrn.exeC:\Windows\system32\xdwvzrn.exe 1120 "C:\Windows\SysWOW64\kqmftng.exe"94⤵
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\SysWOW64\kqokfum.exeC:\Windows\system32\kqokfum.exe 1120 "C:\Windows\SysWOW64\xdwvzrn.exe"95⤵
- Suspicious use of SetThreadContext
PID:1456 -
C:\Windows\SysWOW64\kqokfum.exeC:\Windows\system32\kqokfum.exe 1120 "C:\Windows\SysWOW64\xdwvzrn.exe"96⤵PID:4064
-
C:\Windows\SysWOW64\ubdvaps.exeC:\Windows\system32\ubdvaps.exe 1104 "C:\Windows\SysWOW64\kqokfum.exe"97⤵
- Suspicious use of SetThreadContext
PID:1944 -
C:\Windows\SysWOW64\ubdvaps.exeC:\Windows\system32\ubdvaps.exe 1104 "C:\Windows\SysWOW64\kqokfum.exe"98⤵PID:3348
-
C:\Windows\SysWOW64\houlgtr.exeC:\Windows\system32\houlgtr.exe 1120 "C:\Windows\SysWOW64\ubdvaps.exe"99⤵
- Suspicious use of SetThreadContext
PID:5104 -
C:\Windows\SysWOW64\houlgtr.exeC:\Windows\system32\houlgtr.exe 1120 "C:\Windows\SysWOW64\ubdvaps.exe"100⤵PID:3132
-
C:\Windows\SysWOW64\uepnocw.exeC:\Windows\system32\uepnocw.exe 1120 "C:\Windows\SysWOW64\houlgtr.exe"101⤵
- Suspicious use of SetThreadContext
PID:4584 -
C:\Windows\SysWOW64\uepnocw.exeC:\Windows\system32\uepnocw.exe 1120 "C:\Windows\SysWOW64\houlgtr.exe"102⤵PID:1656
-
C:\Windows\SysWOW64\faqgwwx.exeC:\Windows\system32\faqgwwx.exe 1120 "C:\Windows\SysWOW64\uepnocw.exe"103⤵
- Suspicious use of SetThreadContext
PID:4864 -
C:\Windows\SysWOW64\faqgwwx.exeC:\Windows\system32\faqgwwx.exe 1120 "C:\Windows\SysWOW64\uepnocw.exe"104⤵
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Windows\SysWOW64\szlifed.exeC:\Windows\system32\szlifed.exe 1120 "C:\Windows\SysWOW64\faqgwwx.exe"105⤵
- Suspicious use of SetThreadContext
PID:2928 -
C:\Windows\SysWOW64\szlifed.exeC:\Windows\system32\szlifed.exe 1120 "C:\Windows\SysWOW64\faqgwwx.exe"106⤵PID:440
-
C:\Windows\SysWOW64\fmcykab.exeC:\Windows\system32\fmcykab.exe 1120 "C:\Windows\SysWOW64\szlifed.exe"107⤵
- Suspicious use of SetThreadContext
PID:2256 -
C:\Windows\SysWOW64\fmcykab.exeC:\Windows\system32\fmcykab.exe 1120 "C:\Windows\SysWOW64\szlifed.exe"108⤵PID:1496
-
C:\Windows\SysWOW64\szmoqea.exeC:\Windows\system32\szmoqea.exe 1128 "C:\Windows\SysWOW64\fmcykab.exe"109⤵
- Suspicious use of SetThreadContext
PID:1824 -
C:\Windows\SysWOW64\szmoqea.exeC:\Windows\system32\szmoqea.exe 1128 "C:\Windows\SysWOW64\fmcykab.exe"110⤵PID:708
-
C:\Windows\SysWOW64\fmedwih.exeC:\Windows\system32\fmedwih.exe 1128 "C:\Windows\SysWOW64\szmoqea.exe"111⤵
- Suspicious use of SetThreadContext
PID:4716 -
C:\Windows\SysWOW64\fmedwih.exeC:\Windows\system32\fmedwih.exe 1128 "C:\Windows\SysWOW64\szmoqea.exe"112⤵PID:4392
-
C:\Windows\SysWOW64\hwtorln.exeC:\Windows\system32\hwtorln.exe 1120 "C:\Windows\SysWOW64\fmedwih.exe"113⤵
- Suspicious use of SetThreadContext
PID:2944 -
C:\Windows\SysWOW64\hwtorln.exeC:\Windows\system32\hwtorln.exe 1120 "C:\Windows\SysWOW64\fmedwih.exe"114⤵PID:1684
-
C:\Windows\SysWOW64\ujlexpm.exeC:\Windows\system32\ujlexpm.exe 1120 "C:\Windows\SysWOW64\hwtorln.exe"115⤵
- Suspicious use of SetThreadContext
PID:1604 -
C:\Windows\SysWOW64\ujlexpm.exeC:\Windows\system32\ujlexpm.exe 1120 "C:\Windows\SysWOW64\hwtorln.exe"116⤵PID:400
-
C:\Windows\SysWOW64\hwutdkl.exeC:\Windows\system32\hwutdkl.exe 1120 "C:\Windows\SysWOW64\ujlexpm.exe"117⤵
- Suspicious use of SetThreadContext
PID:1968 -
C:\Windows\SysWOW64\hwutdkl.exeC:\Windows\system32\hwutdkl.exe 1120 "C:\Windows\SysWOW64\ujlexpm.exe"118⤵PID:4972
-
C:\Windows\SysWOW64\vjmrjok.exeC:\Windows\system32\vjmrjok.exe 1112 "C:\Windows\SysWOW64\hwutdkl.exe"119⤵
- Suspicious use of SetThreadContext
PID:2360 -
C:\Windows\SysWOW64\vjmrjok.exeC:\Windows\system32\vjmrjok.exe 1112 "C:\Windows\SysWOW64\hwutdkl.exe"120⤵PID:4724
-
C:\Windows\SysWOW64\eubtwry.exeC:\Windows\system32\eubtwry.exe 1120 "C:\Windows\SysWOW64\vjmrjok.exe"121⤵
- Suspicious use of SetThreadContext
PID:5092 -
C:\Windows\SysWOW64\eubtwry.exeC:\Windows\system32\eubtwry.exe 1120 "C:\Windows\SysWOW64\vjmrjok.exe"122⤵PID:2684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-