Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe
-
Size
362KB
-
MD5
f2a2a1ff78930e3465c115672b5992da
-
SHA1
8b8ec549638496c5933d579cc1a429ebceffee96
-
SHA256
976cb27f27db00e77ffc592a8fa5e03668b2bf13e709531e60ea6911b15ec306
-
SHA512
9cdea4f7cd75f5f92fab819e4f2934f89b1cec2ed2353c0b2f5a9196d9bb469a205eb1278b30189d7834df094a34829d4f3da93c9b2bc6249389dd946cd42b05
-
SSDEEP
6144:5S6p7C/ZzSBw6q6shq6sUbN+WnQcj1LzcvZvAMa8+5KrJERbKzQ:8ZmC6sY6sUbEWnnj9CZYM/TQ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2028 fmyrrtqb.exe 2140 fmyrrtqb.exe 3704 yiyjnuut.exe 1756 yiyjnuut.exe 2424 djgedzaz.exe 3444 djgedzaz.exe 3376 vfgpabfs.exe 3964 vfgpabfs.exe 1364 dkqcjuii.exe 4928 dkqcjuii.exe 3592 nugawkkl.exe 1528 nugawkkl.exe 540 yphsdeki.exe 3584 yphsdeki.exe 5000 ilaclzln.exe 3676 ilaclzln.exe 3432 swpngcrh.exe 1188 swpngcrh.exe 3296 dofslstk.exe 4800 dofslstk.exe 4532 nyuqqivn.exe 3184 nyuqqivn.exe 4084 xisadlch.exe 512 xisadlch.exe 1608 iahgqcek.exe 5068 iahgqcek.exe 3320 vnrvwfcx.exe 4840 vnrvwfcx.exe 2644 ihxlhkhy.exe 396 ihxlhkhy.exe 3956 vrdokjhj.exe 776 vrdokjhj.exe 2680 dzzoezqb.exe 2556 dzzoezqb.exe 3608 nroljpse.exe 3392 nroljpse.exe 3668 yjeronmz.exe 2760 yjeronmz.exe 4444 frrjicwr.exe 2992 frrjicwr.exe 4984 qjhontyu.exe 2732 qjhontyu.exe 1184 seihunyr.exe 640 seihunyr.exe 4420 dajrkizw.exe 4148 dajrkizw.exe 4256 nznpugho.exe 2384 nznpugho.exe 3572 ameeakfb.exe 2740 ameeakfb.exe 3972 nzouggmn.exe 2820 nzouggmn.exe 1252 xgazrfmn.exe 3432 xgazrfmn.exe 4860 ktkpwjts.exe 4764 ktkpwjts.exe 4260 vswnphss.exe 3460 vswnphss.exe 4776 iccpshsc.exe 3664 iccpshsc.exe 3540 serafkyw.exe 3192 serafkyw.exe 4700 fzbploxj.exe 1924 fzbploxj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jngdznur.exe wsxntjvn.exe File opened for modification C:\Windows\SysWOW64\boydgpca.exe obhoaldv.exe File opened for modification C:\Windows\SysWOW64\kjjhbpfe.exe Process not Found File opened for modification C:\Windows\SysWOW64\azadgrrn.exe nafixqug.exe File created C:\Windows\SysWOW64\sdxgtxih.exe ftrwqxix.exe File opened for modification C:\Windows\SysWOW64\uhhhgsfk.exe khcbnugk.exe File opened for modification C:\Windows\SysWOW64\qibemezw.exe Process not Found File created C:\Windows\SysWOW64\fvdrfepe.exe Process not Found File opened for modification C:\Windows\SysWOW64\dweinbqk.exe nvhalass.exe File opened for modification C:\Windows\SysWOW64\adwcwjjp.exe Process not Found File opened for modification C:\Windows\SysWOW64\bagbvwxa.exe Process not Found File created C:\Windows\SysWOW64\eoteqrnb.exe uhhhgsfk.exe File opened for modification C:\Windows\SysWOW64\ahihwkrb.exe qlhoopiv.exe File created C:\Windows\SysWOW64\iglijhyz.exe Process not Found File opened for modification C:\Windows\SysWOW64\feybuqvu.exe susyrqvj.exe File created C:\Windows\SysWOW64\hunqprgs.exe ukhfmagh.exe File opened for modification C:\Windows\SysWOW64\yzhdvesi.exe lpbssfsy.exe File opened for modification C:\Windows\SysWOW64\naetjvnw.exe dxojosgc.exe File created C:\Windows\SysWOW64\lczqbhst.exe yhhbvdlg.exe File opened for modification C:\Windows\SysWOW64\sarhufxv.exe iankkopw.exe File opened for modification C:\Windows\SysWOW64\qrfzdcpc.exe denjxyqx.exe File created C:\Windows\SysWOW64\rcbtnusk.exe gdpwcvtk.exe File opened for modification C:\Windows\SysWOW64\fvkplchf.exe Process not Found File created C:\Windows\SysWOW64\ndrvtwxu.exe ziafnsyq.exe File opened for modification C:\Windows\SysWOW64\wevkytiz.exe lfrfgujz.exe File opened for modification C:\Windows\SysWOW64\yhhbvdlg.exe omhqfjkj.exe File created C:\Windows\SysWOW64\sylpyuah.exe Process not Found File created C:\Windows\SysWOW64\tiqrwpwg.exe imqhguvi.exe File created C:\Windows\SysWOW64\adwcwjjp.exe Process not Found File opened for modification C:\Windows\SysWOW64\uvnoapme.exe Process not Found File opened for modification C:\Windows\SysWOW64\rcwymtcp.exe edbwdtxh.exe File created C:\Windows\SysWOW64\jgwrzexw.exe zhsuggqw.exe File opened for modification C:\Windows\SysWOW64\lefzteny.exe jfbbifgz.exe File created C:\Windows\SysWOW64\kaauueaw.exe aqkkzbut.exe File opened for modification C:\Windows\SysWOW64\ijsuhcig.exe xkgxxdag.exe File created C:\Windows\SysWOW64\uhhhgsfk.exe khcbnugk.exe File created C:\Windows\SysWOW64\bqtljzxa.exe roeawvrf.exe File created C:\Windows\SysWOW64\rwiqmcfc.exe exfneczu.exe File created C:\Windows\SysWOW64\cvnobciw.exe rlxjxmgt.exe File opened for modification C:\Windows\SysWOW64\mrfajnsh.exe zenkdklu.exe File created C:\Windows\SysWOW64\jplacuxo.exe wuukwryb.exe File created C:\Windows\SysWOW64\blwatele.exe rmsubfee.exe File created C:\Windows\SysWOW64\claqooug.exe Process not Found File opened for modification C:\Windows\SysWOW64\utirqyfx.exe ktetgaxx.exe File opened for modification C:\Windows\SysWOW64\cmvtedma.exe potzwdgl.exe File created C:\Windows\SysWOW64\ytjmrqqw.exe kkcjoqqm.exe File opened for modification C:\Windows\SysWOW64\ktetgaxx.exe xdjrxaaq.exe File opened for modification C:\Windows\SysWOW64\lmhutbou.exe Process not Found File created C:\Windows\SysWOW64\yrxwzaml.exe lefzteny.exe File created C:\Windows\SysWOW64\tmdrjnfh.exe Process not Found File created C:\Windows\SysWOW64\edbwdtxh.exe uepytuxi.exe File opened for modification C:\Windows\SysWOW64\bvdkitmk.exe roqexuel.exe File opened for modification C:\Windows\SysWOW64\jtpjutjf.exe vkigjuku.exe File created C:\Windows\SysWOW64\xuyqbdtj.exe nvmsrelj.exe File created C:\Windows\SysWOW64\pgisylnv.exe hznsewel.exe File created C:\Windows\SysWOW64\umqgajsl.exe knmjqkkm.exe File created C:\Windows\SysWOW64\elcdsizd.exe umqgajsl.exe File opened for modification C:\Windows\SysWOW64\cvrtvgdo.exe raqjglcq.exe File opened for modification C:\Windows\SysWOW64\uqcgdgbq.exe nignjqry.exe File created C:\Windows\SysWOW64\susyrqvj.exe hvobhsok.exe File created C:\Windows\SysWOW64\zzitjuym.exe pawvrwqn.exe File created C:\Windows\SysWOW64\zvdwtujf.exe lithnqks.exe File created C:\Windows\SysWOW64\voptkiiz.exe Process not Found File created C:\Windows\SysWOW64\yvcrhven.exe listbrfb.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3904 set thread context of 4592 3904 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 82 PID 2028 set thread context of 2140 2028 fmyrrtqb.exe 84 PID 3704 set thread context of 1756 3704 yiyjnuut.exe 86 PID 2424 set thread context of 3444 2424 djgedzaz.exe 88 PID 3376 set thread context of 3964 3376 vfgpabfs.exe 90 PID 1364 set thread context of 4928 1364 dkqcjuii.exe 92 PID 3592 set thread context of 1528 3592 nugawkkl.exe 94 PID 540 set thread context of 3584 540 yphsdeki.exe 96 PID 5000 set thread context of 3676 5000 ilaclzln.exe 98 PID 3432 set thread context of 1188 3432 swpngcrh.exe 102 PID 3296 set thread context of 4800 3296 dofslstk.exe 104 PID 4532 set thread context of 3184 4532 nyuqqivn.exe 106 PID 4084 set thread context of 512 4084 xisadlch.exe 108 PID 1608 set thread context of 5068 1608 iahgqcek.exe 111 PID 3320 set thread context of 4840 3320 vnrvwfcx.exe 114 PID 2644 set thread context of 396 2644 ihxlhkhy.exe 116 PID 3956 set thread context of 776 3956 vrdokjhj.exe 118 PID 2680 set thread context of 2556 2680 dzzoezqb.exe 120 PID 3608 set thread context of 3392 3608 nroljpse.exe 122 PID 3668 set thread context of 2760 3668 yjeronmz.exe 124 PID 4444 set thread context of 2992 4444 frrjicwr.exe 126 PID 4984 set thread context of 2732 4984 qjhontyu.exe 128 PID 1184 set thread context of 640 1184 seihunyr.exe 130 PID 4420 set thread context of 4148 4420 dajrkizw.exe 132 PID 4256 set thread context of 2384 4256 nznpugho.exe 134 PID 3572 set thread context of 2740 3572 ameeakfb.exe 137 PID 3972 set thread context of 2820 3972 nzouggmn.exe 139 PID 1252 set thread context of 3432 1252 xgazrfmn.exe 141 PID 4860 set thread context of 4764 4860 ktkpwjts.exe 143 PID 4260 set thread context of 3460 4260 vswnphss.exe 145 PID 4776 set thread context of 3664 4776 iccpshsc.exe 147 PID 3540 set thread context of 3192 3540 serafkyw.exe 149 PID 4700 set thread context of 1924 4700 fzbploxj.exe 151 PID 3320 set thread context of 4988 3320 pynvdnfj.exe 153 PID 3176 set thread context of 448 3176 fzcdwodb.exe 155 PID 1160 set thread context of 3216 1160 qyoapmka.exe 157 PID 2344 set thread context of 4408 2344 axsyzlka.exe 159 PID 3988 set thread context of 2028 3988 nsknfprn.exe 161 PID 2556 set thread context of 1676 2556 afblltpr.exe 163 PID 4476 set thread context of 1584 4476 nslbrpoe.exe 167 PID 2812 set thread context of 3868 2812 xvalmsuy.exe 169 PID 2592 set thread context of 3964 2592 ktdouaag.exe 171 PID 4520 set thread context of 4688 4520 xdjrxaaq.exe 173 PID 4324 set thread context of 4832 4324 ktetgaxx.exe 175 PID 2660 set thread context of 3584 2660 utirqyfx.exe 177 PID 5044 set thread context of 4724 5044 icpttyfh.exe 179 PID 392 set thread context of 3908 392 sypmjsgm.exe 181 PID 364 set thread context of 5104 364 cifwwwmh.exe 183 PID 3512 set thread context of 1156 3512 qslzzvmr.exe 185 PID 1696 set thread context of 3892 1696 dfdpfzle.exe 187 PID 1148 set thread context of 3048 1148 nhszsczy.exe 189 PID 3488 set thread context of 1760 3488 accpyyyl.exe 191 PID 1552 set thread context of 2876 1552 kbouqxfk.exe 193 PID 1160 set thread context of 5116 1160 acdcsgvc.exe 195 PID 2324 set thread context of 3608 2324 kbpacedc.exe 197 PID 2680 set thread context of 4344 2680 vuefhvfx.exe 199 PID 932 set thread context of 1540 932 ftjdztfw.exe 201 PID 1216 set thread context of 2912 1216 psvaksmw.exe 203 PID 4028 set thread context of 3768 4028 cfeqpwlj.exe 205 PID 2732 set thread context of 4068 2732 nafixqug.exe 207 PID 3736 set thread context of 1528 3736 azadgrrn.exe 209 PID 4632 set thread context of 2716 4632 nignjqry.exe 211 PID 3396 set thread context of 2952 3396 uqcgdgbq.exe 213 PID 3784 set thread context of 1368 3784 fmcykabn.exe 215 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilaclzln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtoheiwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nopnsgao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zfbrttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azadgrrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggwiatzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjlggglw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sspokqxq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvnobciw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geolmjwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmyrrtqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgbuuirn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojfjmdrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djgedzaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edbwdtxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rddgxjcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpxzhwey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ypiohdqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggwiatzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcyqdqgc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prabibxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efscuvea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjksdafh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvussxjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijthtkfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raqjglcq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuzimtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waytfjte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oslokrma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language naetjvnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjxsxfxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyootsic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmnppfjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usmbpgsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alxopahy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nignjqry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zenkdklu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zueulyfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jngdznur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzxbaflw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nopnsgao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmvtedma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geolmjwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swpngcrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfbbifgz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twphdjwl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swagtalg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rcbtnusk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslbrpoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jydckwei.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3904 wrote to memory of 4592 3904 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 82 PID 3904 wrote to memory of 4592 3904 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 82 PID 3904 wrote to memory of 4592 3904 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 82 PID 3904 wrote to memory of 4592 3904 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 82 PID 3904 wrote to memory of 4592 3904 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 82 PID 4592 wrote to memory of 2028 4592 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 83 PID 4592 wrote to memory of 2028 4592 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 83 PID 4592 wrote to memory of 2028 4592 f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe 83 PID 2028 wrote to memory of 2140 2028 fmyrrtqb.exe 84 PID 2028 wrote to memory of 2140 2028 fmyrrtqb.exe 84 PID 2028 wrote to memory of 2140 2028 fmyrrtqb.exe 84 PID 2028 wrote to memory of 2140 2028 fmyrrtqb.exe 84 PID 2028 wrote to memory of 2140 2028 fmyrrtqb.exe 84 PID 2140 wrote to memory of 3704 2140 fmyrrtqb.exe 85 PID 2140 wrote to memory of 3704 2140 fmyrrtqb.exe 85 PID 2140 wrote to memory of 3704 2140 fmyrrtqb.exe 85 PID 3704 wrote to memory of 1756 3704 yiyjnuut.exe 86 PID 3704 wrote to memory of 1756 3704 yiyjnuut.exe 86 PID 3704 wrote to memory of 1756 3704 yiyjnuut.exe 86 PID 3704 wrote to memory of 1756 3704 yiyjnuut.exe 86 PID 3704 wrote to memory of 1756 3704 yiyjnuut.exe 86 PID 1756 wrote to memory of 2424 1756 yiyjnuut.exe 87 PID 1756 wrote to memory of 2424 1756 yiyjnuut.exe 87 PID 1756 wrote to memory of 2424 1756 yiyjnuut.exe 87 PID 2424 wrote to memory of 3444 2424 djgedzaz.exe 88 PID 2424 wrote to memory of 3444 2424 djgedzaz.exe 88 PID 2424 wrote to memory of 3444 2424 djgedzaz.exe 88 PID 2424 wrote to memory of 3444 2424 djgedzaz.exe 88 PID 2424 wrote to memory of 3444 2424 djgedzaz.exe 88 PID 3444 wrote to memory of 3376 3444 djgedzaz.exe 89 PID 3444 wrote to memory of 3376 3444 djgedzaz.exe 89 PID 3444 wrote to memory of 3376 3444 djgedzaz.exe 89 PID 3376 wrote to memory of 3964 3376 vfgpabfs.exe 90 PID 3376 wrote to memory of 3964 3376 vfgpabfs.exe 90 PID 3376 wrote to memory of 3964 3376 vfgpabfs.exe 90 PID 3376 wrote to memory of 3964 3376 vfgpabfs.exe 90 PID 3376 wrote to memory of 3964 3376 vfgpabfs.exe 90 PID 3964 wrote to memory of 1364 3964 vfgpabfs.exe 91 PID 3964 wrote to memory of 1364 3964 vfgpabfs.exe 91 PID 3964 wrote to memory of 1364 3964 vfgpabfs.exe 91 PID 1364 wrote to memory of 4928 1364 dkqcjuii.exe 92 PID 1364 wrote to memory of 4928 1364 dkqcjuii.exe 92 PID 1364 wrote to memory of 4928 1364 dkqcjuii.exe 92 PID 1364 wrote to memory of 4928 1364 dkqcjuii.exe 92 PID 1364 wrote to memory of 4928 1364 dkqcjuii.exe 92 PID 4928 wrote to memory of 3592 4928 dkqcjuii.exe 93 PID 4928 wrote to memory of 3592 4928 dkqcjuii.exe 93 PID 4928 wrote to memory of 3592 4928 dkqcjuii.exe 93 PID 3592 wrote to memory of 1528 3592 nugawkkl.exe 94 PID 3592 wrote to memory of 1528 3592 nugawkkl.exe 94 PID 3592 wrote to memory of 1528 3592 nugawkkl.exe 94 PID 3592 wrote to memory of 1528 3592 nugawkkl.exe 94 PID 3592 wrote to memory of 1528 3592 nugawkkl.exe 94 PID 1528 wrote to memory of 540 1528 nugawkkl.exe 95 PID 1528 wrote to memory of 540 1528 nugawkkl.exe 95 PID 1528 wrote to memory of 540 1528 nugawkkl.exe 95 PID 540 wrote to memory of 3584 540 yphsdeki.exe 96 PID 540 wrote to memory of 3584 540 yphsdeki.exe 96 PID 540 wrote to memory of 3584 540 yphsdeki.exe 96 PID 540 wrote to memory of 3584 540 yphsdeki.exe 96 PID 540 wrote to memory of 3584 540 yphsdeki.exe 96 PID 3584 wrote to memory of 5000 3584 yphsdeki.exe 97 PID 3584 wrote to memory of 5000 3584 yphsdeki.exe 97 PID 3584 wrote to memory of 5000 3584 yphsdeki.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe D:\Hex Proje2⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\fmyrrtqb.exeC:\Windows\system32\fmyrrtqb.exe 1128 "C:\Users\Admin\AppData\Local\Temp\f2a2a1ff78930e3465c115672b5992da_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\fmyrrtqb.exeC:\Windows\SysWOW64\fmyrrtqb.exe D:\Hex Proje4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\yiyjnuut.exeC:\Windows\system32\yiyjnuut.exe 1148 "C:\Windows\SysWOW64\fmyrrtqb.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\yiyjnuut.exeC:\Windows\SysWOW64\yiyjnuut.exe D:\Hex Proje6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\djgedzaz.exeC:\Windows\system32\djgedzaz.exe 1016 "C:\Windows\SysWOW64\yiyjnuut.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\djgedzaz.exeC:\Windows\SysWOW64\djgedzaz.exe D:\Hex Proje8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\vfgpabfs.exeC:\Windows\system32\vfgpabfs.exe 1040 "C:\Windows\SysWOW64\djgedzaz.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\vfgpabfs.exeC:\Windows\SysWOW64\vfgpabfs.exe D:\Hex Proje10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\dkqcjuii.exeC:\Windows\system32\dkqcjuii.exe 1144 "C:\Windows\SysWOW64\vfgpabfs.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\dkqcjuii.exeC:\Windows\SysWOW64\dkqcjuii.exe D:\Hex Proje12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\nugawkkl.exeC:\Windows\system32\nugawkkl.exe 1032 "C:\Windows\SysWOW64\dkqcjuii.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\nugawkkl.exeC:\Windows\SysWOW64\nugawkkl.exe D:\Hex Proje14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\yphsdeki.exeC:\Windows\system32\yphsdeki.exe 1016 "C:\Windows\SysWOW64\nugawkkl.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\yphsdeki.exeC:\Windows\SysWOW64\yphsdeki.exe D:\Hex Proje16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\ilaclzln.exeC:\Windows\system32\ilaclzln.exe 1148 "C:\Windows\SysWOW64\yphsdeki.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\SysWOW64\ilaclzln.exeC:\Windows\SysWOW64\ilaclzln.exe D:\Hex Proje18⤵
- Executes dropped EXE
PID:3676 -
C:\Windows\SysWOW64\swpngcrh.exeC:\Windows\system32\swpngcrh.exe 1044 "C:\Windows\SysWOW64\ilaclzln.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3432 -
C:\Windows\SysWOW64\swpngcrh.exeC:\Windows\SysWOW64\swpngcrh.exe D:\Hex Proje20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\dofslstk.exeC:\Windows\system32\dofslstk.exe 1032 "C:\Windows\SysWOW64\swpngcrh.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3296 -
C:\Windows\SysWOW64\dofslstk.exeC:\Windows\SysWOW64\dofslstk.exe D:\Hex Proje22⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\nyuqqivn.exeC:\Windows\system32\nyuqqivn.exe 1016 "C:\Windows\SysWOW64\dofslstk.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4532 -
C:\Windows\SysWOW64\nyuqqivn.exeC:\Windows\SysWOW64\nyuqqivn.exe D:\Hex Proje24⤵
- Executes dropped EXE
PID:3184 -
C:\Windows\SysWOW64\xisadlch.exeC:\Windows\system32\xisadlch.exe 1016 "C:\Windows\SysWOW64\nyuqqivn.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4084 -
C:\Windows\SysWOW64\xisadlch.exeC:\Windows\SysWOW64\xisadlch.exe D:\Hex Proje26⤵
- Executes dropped EXE
PID:512 -
C:\Windows\SysWOW64\iahgqcek.exeC:\Windows\system32\iahgqcek.exe 1044 "C:\Windows\SysWOW64\xisadlch.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1608 -
C:\Windows\SysWOW64\iahgqcek.exeC:\Windows\SysWOW64\iahgqcek.exe D:\Hex Proje28⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\vnrvwfcx.exeC:\Windows\system32\vnrvwfcx.exe 1148 "C:\Windows\SysWOW64\iahgqcek.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3320 -
C:\Windows\SysWOW64\vnrvwfcx.exeC:\Windows\SysWOW64\vnrvwfcx.exe D:\Hex Proje30⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\ihxlhkhy.exeC:\Windows\system32\ihxlhkhy.exe 1148 "C:\Windows\SysWOW64\vnrvwfcx.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2644 -
C:\Windows\SysWOW64\ihxlhkhy.exeC:\Windows\SysWOW64\ihxlhkhy.exe D:\Hex Proje32⤵
- Executes dropped EXE
PID:396 -
C:\Windows\SysWOW64\vrdokjhj.exeC:\Windows\system32\vrdokjhj.exe 1148 "C:\Windows\SysWOW64\ihxlhkhy.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3956 -
C:\Windows\SysWOW64\vrdokjhj.exeC:\Windows\SysWOW64\vrdokjhj.exe D:\Hex Proje34⤵
- Executes dropped EXE
PID:776 -
C:\Windows\SysWOW64\dzzoezqb.exeC:\Windows\system32\dzzoezqb.exe 1016 "C:\Windows\SysWOW64\vrdokjhj.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2680 -
C:\Windows\SysWOW64\dzzoezqb.exeC:\Windows\SysWOW64\dzzoezqb.exe D:\Hex Proje36⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\nroljpse.exeC:\Windows\system32\nroljpse.exe 1148 "C:\Windows\SysWOW64\dzzoezqb.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3608 -
C:\Windows\SysWOW64\nroljpse.exeC:\Windows\SysWOW64\nroljpse.exe D:\Hex Proje38⤵
- Executes dropped EXE
PID:3392 -
C:\Windows\SysWOW64\yjeronmz.exeC:\Windows\system32\yjeronmz.exe 1040 "C:\Windows\SysWOW64\nroljpse.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3668 -
C:\Windows\SysWOW64\yjeronmz.exeC:\Windows\SysWOW64\yjeronmz.exe D:\Hex Proje40⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\SysWOW64\frrjicwr.exeC:\Windows\system32\frrjicwr.exe 1044 "C:\Windows\SysWOW64\yjeronmz.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4444 -
C:\Windows\SysWOW64\frrjicwr.exeC:\Windows\SysWOW64\frrjicwr.exe D:\Hex Proje42⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\qjhontyu.exeC:\Windows\system32\qjhontyu.exe 1032 "C:\Windows\SysWOW64\frrjicwr.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4984 -
C:\Windows\SysWOW64\qjhontyu.exeC:\Windows\SysWOW64\qjhontyu.exe D:\Hex Proje44⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\seihunyr.exeC:\Windows\system32\seihunyr.exe 1040 "C:\Windows\SysWOW64\qjhontyu.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1184 -
C:\Windows\SysWOW64\seihunyr.exeC:\Windows\SysWOW64\seihunyr.exe D:\Hex Proje46⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\dajrkizw.exeC:\Windows\system32\dajrkizw.exe 1040 "C:\Windows\SysWOW64\seihunyr.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4420 -
C:\Windows\SysWOW64\dajrkizw.exeC:\Windows\SysWOW64\dajrkizw.exe D:\Hex Proje48⤵
- Executes dropped EXE
PID:4148 -
C:\Windows\SysWOW64\nznpugho.exeC:\Windows\system32\nznpugho.exe 1148 "C:\Windows\SysWOW64\dajrkizw.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4256 -
C:\Windows\SysWOW64\nznpugho.exeC:\Windows\SysWOW64\nznpugho.exe D:\Hex Proje50⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\ameeakfb.exeC:\Windows\system32\ameeakfb.exe 1028 "C:\Windows\SysWOW64\nznpugho.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3572 -
C:\Windows\SysWOW64\ameeakfb.exeC:\Windows\SysWOW64\ameeakfb.exe D:\Hex Proje52⤵
- Executes dropped EXE
PID:2740 -
C:\Windows\SysWOW64\nzouggmn.exeC:\Windows\system32\nzouggmn.exe 1040 "C:\Windows\SysWOW64\ameeakfb.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3972 -
C:\Windows\SysWOW64\nzouggmn.exeC:\Windows\SysWOW64\nzouggmn.exe D:\Hex Proje54⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\xgazrfmn.exeC:\Windows\system32\xgazrfmn.exe 1152 "C:\Windows\SysWOW64\nzouggmn.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1252 -
C:\Windows\SysWOW64\xgazrfmn.exeC:\Windows\SysWOW64\xgazrfmn.exe D:\Hex Proje56⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\SysWOW64\ktkpwjts.exeC:\Windows\system32\ktkpwjts.exe 1152 "C:\Windows\SysWOW64\xgazrfmn.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4860 -
C:\Windows\SysWOW64\ktkpwjts.exeC:\Windows\SysWOW64\ktkpwjts.exe D:\Hex Proje58⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\vswnphss.exeC:\Windows\system32\vswnphss.exe 1148 "C:\Windows\SysWOW64\ktkpwjts.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4260 -
C:\Windows\SysWOW64\vswnphss.exeC:\Windows\SysWOW64\vswnphss.exe D:\Hex Proje60⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\SysWOW64\iccpshsc.exeC:\Windows\system32\iccpshsc.exe 1028 "C:\Windows\SysWOW64\vswnphss.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4776 -
C:\Windows\SysWOW64\iccpshsc.exeC:\Windows\SysWOW64\iccpshsc.exe D:\Hex Proje62⤵
- Executes dropped EXE
PID:3664 -
C:\Windows\SysWOW64\serafkyw.exeC:\Windows\system32\serafkyw.exe 1084 "C:\Windows\SysWOW64\iccpshsc.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3540 -
C:\Windows\SysWOW64\serafkyw.exeC:\Windows\SysWOW64\serafkyw.exe D:\Hex Proje64⤵
- Executes dropped EXE
PID:3192 -
C:\Windows\SysWOW64\fzbploxj.exeC:\Windows\system32\fzbploxj.exe 1148 "C:\Windows\SysWOW64\serafkyw.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4700 -
C:\Windows\SysWOW64\fzbploxj.exeC:\Windows\SysWOW64\fzbploxj.exe D:\Hex Proje66⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\pynvdnfj.exeC:\Windows\system32\pynvdnfj.exe 1036 "C:\Windows\SysWOW64\fzbploxj.exe"67⤵
- Suspicious use of SetThreadContext
PID:3320 -
C:\Windows\SysWOW64\pynvdnfj.exeC:\Windows\SysWOW64\pynvdnfj.exe D:\Hex Proje68⤵PID:4988
-
C:\Windows\SysWOW64\fzcdwodb.exeC:\Windows\system32\fzcdwodb.exe 1044 "C:\Windows\SysWOW64\pynvdnfj.exe"69⤵
- Suspicious use of SetThreadContext
PID:3176 -
C:\Windows\SysWOW64\fzcdwodb.exeC:\Windows\SysWOW64\fzcdwodb.exe D:\Hex Proje70⤵PID:448
-
C:\Windows\SysWOW64\qyoapmka.exeC:\Windows\system32\qyoapmka.exe 1052 "C:\Windows\SysWOW64\fzcdwodb.exe"71⤵
- Suspicious use of SetThreadContext
PID:1160 -
C:\Windows\SysWOW64\qyoapmka.exeC:\Windows\SysWOW64\qyoapmka.exe D:\Hex Proje72⤵PID:3216
-
C:\Windows\SysWOW64\axsyzlka.exeC:\Windows\system32\axsyzlka.exe 1148 "C:\Windows\SysWOW64\qyoapmka.exe"73⤵
- Suspicious use of SetThreadContext
PID:2344 -
C:\Windows\SysWOW64\axsyzlka.exeC:\Windows\SysWOW64\axsyzlka.exe D:\Hex Proje74⤵PID:4408
-
C:\Windows\SysWOW64\nsknfprn.exeC:\Windows\system32\nsknfprn.exe 1148 "C:\Windows\SysWOW64\axsyzlka.exe"75⤵
- Suspicious use of SetThreadContext
PID:3988 -
C:\Windows\SysWOW64\nsknfprn.exeC:\Windows\SysWOW64\nsknfprn.exe D:\Hex Proje76⤵PID:2028
-
C:\Windows\SysWOW64\afblltpr.exeC:\Windows\system32\afblltpr.exe 1112 "C:\Windows\SysWOW64\nsknfprn.exe"77⤵
- Suspicious use of SetThreadContext
PID:2556 -
C:\Windows\SysWOW64\afblltpr.exeC:\Windows\SysWOW64\afblltpr.exe D:\Hex Proje78⤵PID:1676
-
C:\Windows\SysWOW64\nslbrpoe.exeC:\Windows\system32\nslbrpoe.exe 1032 "C:\Windows\SysWOW64\afblltpr.exe"79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\nslbrpoe.exeC:\Windows\SysWOW64\nslbrpoe.exe D:\Hex Proje80⤵PID:1584
-
C:\Windows\SysWOW64\xvalmsuy.exeC:\Windows\system32\xvalmsuy.exe 1044 "C:\Windows\SysWOW64\nslbrpoe.exe"81⤵
- Suspicious use of SetThreadContext
PID:2812 -
C:\Windows\SysWOW64\xvalmsuy.exeC:\Windows\SysWOW64\xvalmsuy.exe D:\Hex Proje82⤵PID:3868
-
C:\Windows\SysWOW64\ktdouaag.exeC:\Windows\system32\ktdouaag.exe 1044 "C:\Windows\SysWOW64\xvalmsuy.exe"83⤵
- Suspicious use of SetThreadContext
PID:2592 -
C:\Windows\SysWOW64\ktdouaag.exeC:\Windows\SysWOW64\ktdouaag.exe D:\Hex Proje84⤵PID:3964
-
C:\Windows\SysWOW64\xdjrxaaq.exeC:\Windows\system32\xdjrxaaq.exe 1040 "C:\Windows\SysWOW64\ktdouaag.exe"85⤵
- Suspicious use of SetThreadContext
PID:4520 -
C:\Windows\SysWOW64\xdjrxaaq.exeC:\Windows\SysWOW64\xdjrxaaq.exe D:\Hex Proje86⤵
- Drops file in System32 directory
PID:4688 -
C:\Windows\SysWOW64\ktetgaxx.exeC:\Windows\system32\ktetgaxx.exe 1148 "C:\Windows\SysWOW64\xdjrxaaq.exe"87⤵
- Suspicious use of SetThreadContext
PID:4324 -
C:\Windows\SysWOW64\ktetgaxx.exeC:\Windows\SysWOW64\ktetgaxx.exe D:\Hex Proje88⤵
- Drops file in System32 directory
PID:4832 -
C:\Windows\SysWOW64\utirqyfx.exeC:\Windows\system32\utirqyfx.exe 1152 "C:\Windows\SysWOW64\ktetgaxx.exe"89⤵
- Suspicious use of SetThreadContext
PID:2660 -
C:\Windows\SysWOW64\utirqyfx.exeC:\Windows\SysWOW64\utirqyfx.exe D:\Hex Proje90⤵PID:3584
-
C:\Windows\SysWOW64\icpttyfh.exeC:\Windows\system32\icpttyfh.exe 1128 "C:\Windows\SysWOW64\utirqyfx.exe"91⤵
- Suspicious use of SetThreadContext
PID:5044 -
C:\Windows\SysWOW64\icpttyfh.exeC:\Windows\SysWOW64\icpttyfh.exe D:\Hex Proje92⤵PID:4724
-
C:\Windows\SysWOW64\sypmjsgm.exeC:\Windows\system32\sypmjsgm.exe 1048 "C:\Windows\SysWOW64\icpttyfh.exe"93⤵
- Suspicious use of SetThreadContext
PID:392 -
C:\Windows\SysWOW64\sypmjsgm.exeC:\Windows\SysWOW64\sypmjsgm.exe D:\Hex Proje94⤵PID:3908
-
C:\Windows\SysWOW64\cifwwwmh.exeC:\Windows\system32\cifwwwmh.exe 1032 "C:\Windows\SysWOW64\sypmjsgm.exe"95⤵
- Suspicious use of SetThreadContext
PID:364 -
C:\Windows\SysWOW64\cifwwwmh.exeC:\Windows\SysWOW64\cifwwwmh.exe D:\Hex Proje96⤵PID:5104
-
C:\Windows\SysWOW64\qslzzvmr.exeC:\Windows\system32\qslzzvmr.exe 1044 "C:\Windows\SysWOW64\cifwwwmh.exe"97⤵
- Suspicious use of SetThreadContext
PID:3512 -
C:\Windows\SysWOW64\qslzzvmr.exeC:\Windows\SysWOW64\qslzzvmr.exe D:\Hex Proje98⤵PID:1156
-
C:\Windows\SysWOW64\dfdpfzle.exeC:\Windows\system32\dfdpfzle.exe 1148 "C:\Windows\SysWOW64\qslzzvmr.exe"99⤵
- Suspicious use of SetThreadContext
PID:1696 -
C:\Windows\SysWOW64\dfdpfzle.exeC:\Windows\SysWOW64\dfdpfzle.exe D:\Hex Proje100⤵PID:3892
-
C:\Windows\SysWOW64\nhszsczy.exeC:\Windows\system32\nhszsczy.exe 1040 "C:\Windows\SysWOW64\dfdpfzle.exe"101⤵
- Suspicious use of SetThreadContext
PID:1148 -
C:\Windows\SysWOW64\nhszsczy.exeC:\Windows\SysWOW64\nhszsczy.exe D:\Hex Proje102⤵PID:3048
-
C:\Windows\SysWOW64\accpyyyl.exeC:\Windows\system32\accpyyyl.exe 1148 "C:\Windows\SysWOW64\nhszsczy.exe"103⤵
- Suspicious use of SetThreadContext
PID:3488 -
C:\Windows\SysWOW64\accpyyyl.exeC:\Windows\SysWOW64\accpyyyl.exe D:\Hex Proje104⤵PID:1760
-
C:\Windows\SysWOW64\kbouqxfk.exeC:\Windows\system32\kbouqxfk.exe 1148 "C:\Windows\SysWOW64\accpyyyl.exe"105⤵
- Suspicious use of SetThreadContext
PID:1552 -
C:\Windows\SysWOW64\kbouqxfk.exeC:\Windows\SysWOW64\kbouqxfk.exe D:\Hex Proje106⤵PID:2876
-
C:\Windows\SysWOW64\acdcsgvc.exeC:\Windows\system32\acdcsgvc.exe 1152 "C:\Windows\SysWOW64\kbouqxfk.exe"107⤵
- Suspicious use of SetThreadContext
PID:1160 -
C:\Windows\SysWOW64\acdcsgvc.exeC:\Windows\SysWOW64\acdcsgvc.exe D:\Hex Proje108⤵PID:5116
-
C:\Windows\SysWOW64\kbpacedc.exeC:\Windows\system32\kbpacedc.exe 1152 "C:\Windows\SysWOW64\acdcsgvc.exe"109⤵
- Suspicious use of SetThreadContext
PID:2324 -
C:\Windows\SysWOW64\kbpacedc.exeC:\Windows\SysWOW64\kbpacedc.exe D:\Hex Proje110⤵PID:3608
-
C:\Windows\SysWOW64\vuefhvfx.exeC:\Windows\system32\vuefhvfx.exe 1140 "C:\Windows\SysWOW64\kbpacedc.exe"111⤵
- Suspicious use of SetThreadContext
PID:2680 -
C:\Windows\SysWOW64\vuefhvfx.exeC:\Windows\SysWOW64\vuefhvfx.exe D:\Hex Proje112⤵PID:4344
-
C:\Windows\SysWOW64\ftjdztfw.exeC:\Windows\system32\ftjdztfw.exe 1016 "C:\Windows\SysWOW64\vuefhvfx.exe"113⤵
- Suspicious use of SetThreadContext
PID:932 -
C:\Windows\SysWOW64\ftjdztfw.exeC:\Windows\SysWOW64\ftjdztfw.exe D:\Hex Proje114⤵PID:1540
-
C:\Windows\SysWOW64\psvaksmw.exeC:\Windows\system32\psvaksmw.exe 1148 "C:\Windows\SysWOW64\ftjdztfw.exe"115⤵
- Suspicious use of SetThreadContext
PID:1216 -
C:\Windows\SysWOW64\psvaksmw.exeC:\Windows\SysWOW64\psvaksmw.exe D:\Hex Proje116⤵PID:2912
-
C:\Windows\SysWOW64\cfeqpwlj.exeC:\Windows\system32\cfeqpwlj.exe 1148 "C:\Windows\SysWOW64\psvaksmw.exe"117⤵
- Suspicious use of SetThreadContext
PID:4028 -
C:\Windows\SysWOW64\cfeqpwlj.exeC:\Windows\SysWOW64\cfeqpwlj.exe D:\Hex Proje118⤵PID:3768
-
C:\Windows\SysWOW64\nafixqug.exeC:\Windows\system32\nafixqug.exe 1148 "C:\Windows\SysWOW64\cfeqpwlj.exe"119⤵
- Suspicious use of SetThreadContext
PID:2732 -
C:\Windows\SysWOW64\nafixqug.exeC:\Windows\SysWOW64\nafixqug.exe D:\Hex Proje120⤵
- Drops file in System32 directory
PID:4068 -
C:\Windows\SysWOW64\azadgrrn.exeC:\Windows\system32\azadgrrn.exe 1148 "C:\Windows\SysWOW64\nafixqug.exe"121⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Windows\SysWOW64\azadgrrn.exeC:\Windows\SysWOW64\azadgrrn.exe D:\Hex Proje122⤵PID:1528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-