Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe
-
Size
552KB
-
MD5
17f04436d0d51b7e95655299a8ba30dd
-
SHA1
a5448c84681e2edfce234b0c5efaba5280df6d03
-
SHA256
185c9a62e294e9c6793152ef0be8372d36d05cb73b5873b4fd90b63541d75d64
-
SHA512
524de2e0393d7403cb7de955b4e42264a119da469d3af81bc3139aa513e82f63659122e0ab9d2041e73a35d267ea5524b86bdb529e7e42e6691fa96ceb09ff00
-
SSDEEP
6144:dwVPqTSTVFhaae3OR3wxJXSMaAA4OUi1DZyRn5ERmnfN/05YacxIBnn8H2QYvM4d:Gxfw3OR3cdAV51ch5ERa/3nxIl4i6AAe
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2896 xltmzj.exe 2516 xltmzj.exe 2680 plejyx.exe 2056 plejyx.exe 2752 mmowca.exe 2856 mmowca.exe 2016 tqycll.exe 2568 tqycll.exe 844 abxhin.exe 2104 abxhin.exe 2236 lxyzqh.exe 2200 lxyzqh.exe 464 vznkdk.exe 1240 vznkdk.exe 2328 hyimuk.exe 752 hyimuk.exe 1976 uolpct.exe 1648 uolpct.exe 2192 cakurm.exe 2656 cakurm.exe 2764 ukxmzk.exe 2824 ukxmzk.exe 2440 hjspis.exe 2676 hjspis.exe 2496 riemsq.exe 2852 riemsq.exe 1492 dkkcmv.exe 2004 dkkcmv.exe 1776 qeqkxh.exe 2840 qeqkxh.exe 2908 ddlmgq.exe 1312 ddlmgq.exe 3032 iqdcll.exe 1332 iqdcll.exe 912 sasnzp.exe 2324 sasnzp.exe 2184 cdhxus.exe 1640 cdhxus.exe 1352 pqrnaw.exe 1844 pqrnaw.exe 2952 coupiw.exe 1372 coupiw.exe 2364 piafui.exe 2636 piafui.exe 2540 ztpphl.exe 2616 ztpphl.exe 2576 jstnzk.exe 2532 jstnzk.exe 2216 wiwpis.exe 2864 wiwpis.exe 1492 jhrsrs.exe 632 jhrsrs.exe 3044 sjgdew.exe 2004 sjgdew.exe 2112 fijfme.exe 1828 fijfme.exe 1864 syeive.exe 900 syeive.exe 2904 cjtsqh.exe 1524 cjtsqh.exe 1624 paovzp.exe 1852 paovzp.exe 1512 cqrqhx.exe 2696 cqrqhx.exe -
Loads dropped DLL 64 IoCs
pid Process 2980 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 2980 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 2896 xltmzj.exe 2896 xltmzj.exe 2516 xltmzj.exe 2516 xltmzj.exe 2680 plejyx.exe 2680 plejyx.exe 2056 plejyx.exe 2056 plejyx.exe 2752 mmowca.exe 2752 mmowca.exe 2856 mmowca.exe 2856 mmowca.exe 2016 tqycll.exe 2016 tqycll.exe 2568 tqycll.exe 2568 tqycll.exe 844 abxhin.exe 844 abxhin.exe 2104 abxhin.exe 2104 abxhin.exe 2236 lxyzqh.exe 2236 lxyzqh.exe 2200 lxyzqh.exe 2200 lxyzqh.exe 464 vznkdk.exe 464 vznkdk.exe 1240 vznkdk.exe 1240 vznkdk.exe 2328 hyimuk.exe 2328 hyimuk.exe 752 hyimuk.exe 752 hyimuk.exe 1976 uolpct.exe 1976 uolpct.exe 1648 uolpct.exe 1648 uolpct.exe 2192 cakurm.exe 2192 cakurm.exe 2656 cakurm.exe 2656 cakurm.exe 2764 ukxmzk.exe 2764 ukxmzk.exe 2824 ukxmzk.exe 2824 ukxmzk.exe 2440 hjspis.exe 2440 hjspis.exe 2676 hjspis.exe 2676 hjspis.exe 2496 riemsq.exe 2496 riemsq.exe 2852 riemsq.exe 2852 riemsq.exe 1492 dkkcmv.exe 1492 dkkcmv.exe 2004 dkkcmv.exe 2004 dkkcmv.exe 1776 qeqkxh.exe 1776 qeqkxh.exe 2840 qeqkxh.exe 2840 qeqkxh.exe 2908 ddlmgq.exe 2908 ddlmgq.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\vpuaqe.exe iqrxie.exe File created C:\Windows\SysWOW64\ntyjuw.exe acdglw.exe File created C:\Windows\SysWOW64\uozlzj.exe hqeiqa.exe File opened for modification C:\Windows\SysWOW64\xirxdt.exe nuqzft.exe File opened for modification C:\Windows\SysWOW64\ogohlm.exe Process not Found File created C:\Windows\SysWOW64\llxbkr.exe Process not Found File opened for modification C:\Windows\SysWOW64\axvybx.exe nhawtp.exe File created C:\Windows\SysWOW64\ibuxjh.exe vkrubz.exe File created C:\Windows\SysWOW64\vzzemy.exe Process not Found File created C:\Windows\SysWOW64\ukqrri.exe Process not Found File opened for modification C:\Windows\SysWOW64\qujsds.exe Process not Found File created C:\Windows\SysWOW64\zgzicr.exe lthsxn.exe File created C:\Windows\SysWOW64\rmkwow.exe mvptgw.exe File opened for modification C:\Windows\SysWOW64\iqrxie.exe yobmub.exe File created C:\Windows\SysWOW64\vrthar.exe mkakkk.exe File opened for modification C:\Windows\SysWOW64\zxoyfe.exe pjnapw.exe File opened for modification C:\Windows\SysWOW64\xvfugd.exe hrwzcq.exe File opened for modification C:\Windows\SysWOW64\umarux.exe hstbik.exe File opened for modification C:\Windows\SysWOW64\zpujsj.exe Process not Found File opened for modification C:\Windows\SysWOW64\npcbhr.exe ebbmrk.exe File created C:\Windows\SysWOW64\togmou.exe gpejfl.exe File created C:\Windows\SysWOW64\hqeiqa.exe xcdlst.exe File opened for modification C:\Windows\SysWOW64\oisnee.exe bjxkve.exe File created C:\Windows\SysWOW64\tfrrhf.exe gpwoyf.exe File opened for modification C:\Windows\SysWOW64\lxlbea.exe yhjzvr.exe File created C:\Windows\SysWOW64\vqriba.exe Process not Found File created C:\Windows\SysWOW64\iqrxie.exe yobmub.exe File created C:\Windows\SysWOW64\sphjzk.exe gzmgqk.exe File opened for modification C:\Windows\SysWOW64\qeftfx.exe drvdzb.exe File opened for modification C:\Windows\SysWOW64\bhhsdz.exe ouycyv.exe File created C:\Windows\SysWOW64\ojnzxq.exe Process not Found File created C:\Windows\SysWOW64\bflxck.exe Process not Found File created C:\Windows\SysWOW64\oonhfx.exe cylewx.exe File opened for modification C:\Windows\SysWOW64\gpwoyf.exe tyblpw.exe File created C:\Windows\SysWOW64\ugfxru.exe hpkvil.exe File opened for modification C:\Windows\SysWOW64\sujcgy.exe fegaxy.exe File created C:\Windows\SysWOW64\dsjixl.exe ruofod.exe File created C:\Windows\SysWOW64\cxyobg.exe Process not Found File created C:\Windows\SysWOW64\fmsrem.exe Process not Found File opened for modification C:\Windows\SysWOW64\xkicsa.exe Process not Found File opened for modification C:\Windows\SysWOW64\aliyhe.exe Process not Found File created C:\Windows\SysWOW64\supqij.exe igpbsb.exe File opened for modification C:\Windows\SysWOW64\nyxbuk.exe dvhqhh.exe File opened for modification C:\Windows\SysWOW64\yagbcm.exe oyqrpj.exe File opened for modification C:\Windows\SysWOW64\qhjvwf.exe Process not Found File opened for modification C:\Windows\SysWOW64\juoyjb.exe Process not Found File created C:\Windows\SysWOW64\rgtwoe.exe Process not Found File created C:\Windows\SysWOW64\pjagwi.exe fvzrga.exe File created C:\Windows\SysWOW64\kahmjk.exe Process not Found File created C:\Windows\SysWOW64\sasnzp.exe iqdcll.exe File opened for modification C:\Windows\SysWOW64\agxeqr.exe npcbhr.exe File opened for modification C:\Windows\SysWOW64\gyzbxb.exe tzezob.exe File created C:\Windows\SysWOW64\qjmlfl.exe dsjixl.exe File created C:\Windows\SysWOW64\xbaxbo.exe kkfvto.exe File opened for modification C:\Windows\SysWOW64\gcdkgv.exe Process not Found File created C:\Windows\SysWOW64\rulspj.exe eeipgj.exe File opened for modification C:\Windows\SysWOW64\byvpnm.exe oisnee.exe File created C:\Windows\SysWOW64\cnpbfu.exe ppvypt.exe File opened for modification C:\Windows\SysWOW64\ddgpvj.exe Process not Found File created C:\Windows\SysWOW64\biqtgy.exe Process not Found File opened for modification C:\Windows\SysWOW64\srlryn.exe Process not Found File created C:\Windows\SysWOW64\qkayxb.exe gilnky.exe File created C:\Windows\SysWOW64\xbdmhe.exe kkiryw.exe File opened for modification C:\Windows\SysWOW64\zgdxby.exe miiuty.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2160 set thread context of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2896 set thread context of 2516 2896 xltmzj.exe 32 PID 2680 set thread context of 2056 2680 plejyx.exe 34 PID 2752 set thread context of 2856 2752 mmowca.exe 36 PID 2016 set thread context of 2568 2016 tqycll.exe 38 PID 844 set thread context of 2104 844 abxhin.exe 40 PID 2236 set thread context of 2200 2236 lxyzqh.exe 42 PID 464 set thread context of 1240 464 vznkdk.exe 44 PID 2328 set thread context of 752 2328 hyimuk.exe 46 PID 1976 set thread context of 1648 1976 uolpct.exe 48 PID 2192 set thread context of 2656 2192 cakurm.exe 50 PID 2764 set thread context of 2824 2764 ukxmzk.exe 52 PID 2440 set thread context of 2676 2440 hjspis.exe 54 PID 2496 set thread context of 2852 2496 riemsq.exe 56 PID 1492 set thread context of 2004 1492 dkkcmv.exe 58 PID 1776 set thread context of 2840 1776 qeqkxh.exe 60 PID 2908 set thread context of 1312 2908 ddlmgq.exe 62 PID 3032 set thread context of 1332 3032 iqdcll.exe 64 PID 912 set thread context of 2324 912 sasnzp.exe 66 PID 2184 set thread context of 1640 2184 cdhxus.exe 68 PID 1352 set thread context of 1844 1352 pqrnaw.exe 70 PID 2952 set thread context of 1372 2952 coupiw.exe 72 PID 2364 set thread context of 2636 2364 piafui.exe 74 PID 2540 set thread context of 2616 2540 ztpphl.exe 76 PID 2576 set thread context of 2532 2576 jstnzk.exe 78 PID 2216 set thread context of 2864 2216 wiwpis.exe 80 PID 1492 set thread context of 632 1492 jhrsrs.exe 82 PID 3044 set thread context of 2004 3044 sjgdew.exe 84 PID 2112 set thread context of 1828 2112 fijfme.exe 86 PID 1864 set thread context of 900 1864 syeive.exe 88 PID 2904 set thread context of 1524 2904 cjtsqh.exe 90 PID 1624 set thread context of 1852 1624 paovzp.exe 92 PID 1512 set thread context of 2696 1512 cqrqhx.exe 94 PID 2648 set thread context of 2192 2648 mbgava.exe 96 PID 2008 set thread context of 2632 2008 zrbddb.exe 98 PID 2872 set thread context of 2724 2872 lthsxn.exe 100 PID 2496 set thread context of 1724 2496 zgzicr.exe 102 PID 1652 set thread context of 1684 1652 iuzgtq.exe 104 PID 1412 set thread context of 1796 1412 vluibz.exe 106 PID 2604 set thread context of 2452 2604 ijplkh.exe 108 PID 1420 set thread context of 2000 1420 vasosh.exe 110 PID 1772 set thread context of 1528 1772 iynqbp.exe 112 PID 2420 set thread context of 2340 2420 sengzw.exe 114 PID 1576 set thread context of 1708 1576 fdiiif.exe 116 PID 2924 set thread context of 2992 2924 sqayna.exe 118 PID 2580 set thread context of 3060 2580 beavdi.exe 120 PID 2844 set thread context of 2868 2844 ouvyuq.exe 122 PID 2216 set thread context of 2812 2216 blqbdq.exe 124 PID 1728 set thread context of 1560 1728 ojtdly.exe 126 PID 3044 set thread context of 2068 3044 ymioyb.exe 128 PID 844 set thread context of 532 844 lkdrhk.exe 130 PID 2236 set thread context of 1344 2236 ybglqk.exe 132 PID 1772 set thread context of 860 1772 lzaoys.exe 134 PID 2420 set thread context of 1204 2420 ugblwz.exe 136 PID 2180 set thread context of 336 2180 ksbgaf.exe 138 PID 1352 set thread context of 2376 1352 uvrroi.exe 140 PID 2828 set thread context of 2536 2828 htttwq.exe 142 PID 2040 set thread context of 264 2040 ukowfy.exe 144 PID 480 set thread context of 1272 480 euegat.exe 146 PID 1632 set thread context of 1152 1632 rokolg.exe 148 PID 1960 set thread context of 2112 1960 ebbmrk.exe 150 PID 2344 set thread context of 1420 2344 npcbhr.exe 152 PID 2276 set thread context of 1044 2276 agxeqr.exe 154 PID 308 set thread context of 1600 308 nerhyz.exe 156 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lthsxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netvvz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language togmou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nzgkvz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language czvjfq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcofbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lmbhdi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuzzak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hyimuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ybglqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agywse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oonhfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlfato.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zsgivf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seysvq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhxzsl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vplknu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdqptb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfigry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgualb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxzwxq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blqbdq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sefoqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeftfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhdouv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tiqbxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqycll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhrrdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exmomr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rulspj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvbqyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jmrgru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iudsvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysbkcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttwgx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kblscc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfigry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dytyxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taxyaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awsdcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvtqkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sibqga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvkmhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language supqij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqdbrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upyzdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qffkqu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2980 2160 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2896 2980 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2896 2980 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2896 2980 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 31 PID 2980 wrote to memory of 2896 2980 17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe 31 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2896 wrote to memory of 2516 2896 xltmzj.exe 32 PID 2516 wrote to memory of 2680 2516 xltmzj.exe 33 PID 2516 wrote to memory of 2680 2516 xltmzj.exe 33 PID 2516 wrote to memory of 2680 2516 xltmzj.exe 33 PID 2516 wrote to memory of 2680 2516 xltmzj.exe 33 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2680 wrote to memory of 2056 2680 plejyx.exe 34 PID 2056 wrote to memory of 2752 2056 plejyx.exe 35 PID 2056 wrote to memory of 2752 2056 plejyx.exe 35 PID 2056 wrote to memory of 2752 2056 plejyx.exe 35 PID 2056 wrote to memory of 2752 2056 plejyx.exe 35 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2752 wrote to memory of 2856 2752 mmowca.exe 36 PID 2856 wrote to memory of 2016 2856 mmowca.exe 37 PID 2856 wrote to memory of 2016 2856 mmowca.exe 37 PID 2856 wrote to memory of 2016 2856 mmowca.exe 37 PID 2856 wrote to memory of 2016 2856 mmowca.exe 37 PID 2016 wrote to memory of 2568 2016 tqycll.exe 38 PID 2016 wrote to memory of 2568 2016 tqycll.exe 38 PID 2016 wrote to memory of 2568 2016 tqycll.exe 38 PID 2016 wrote to memory of 2568 2016 tqycll.exe 38 PID 2016 wrote to memory of 2568 2016 tqycll.exe 38 PID 2016 wrote to memory of 2568 2016 tqycll.exe 38 PID 2016 wrote to memory of 2568 2016 tqycll.exe 38 PID 2016 wrote to memory of 2568 2016 tqycll.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\xltmzj.exeC:\Windows\system32\xltmzj.exe 472 "C:\Users\Admin\AppData\Local\Temp\17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\xltmzj.exeC:\Windows\system32\xltmzj.exe 472 "C:\Users\Admin\AppData\Local\Temp\17f04436d0d51b7e95655299a8ba30dd_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\plejyx.exeC:\Windows\system32\plejyx.exe 528 "C:\Windows\SysWOW64\xltmzj.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\plejyx.exeC:\Windows\system32\plejyx.exe 528 "C:\Windows\SysWOW64\xltmzj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\mmowca.exeC:\Windows\system32\mmowca.exe 452 "C:\Windows\SysWOW64\plejyx.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\mmowca.exeC:\Windows\system32\mmowca.exe 452 "C:\Windows\SysWOW64\plejyx.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\tqycll.exeC:\Windows\system32\tqycll.exe 452 "C:\Windows\SysWOW64\mmowca.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\tqycll.exeC:\Windows\system32\tqycll.exe 452 "C:\Windows\SysWOW64\mmowca.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Windows\SysWOW64\abxhin.exeC:\Windows\system32\abxhin.exe 496 "C:\Windows\SysWOW64\tqycll.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:844 -
C:\Windows\SysWOW64\abxhin.exeC:\Windows\system32\abxhin.exe 496 "C:\Windows\SysWOW64\tqycll.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2104 -
C:\Windows\SysWOW64\lxyzqh.exeC:\Windows\system32\lxyzqh.exe 528 "C:\Windows\SysWOW64\abxhin.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2236 -
C:\Windows\SysWOW64\lxyzqh.exeC:\Windows\system32\lxyzqh.exe 528 "C:\Windows\SysWOW64\abxhin.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2200 -
C:\Windows\SysWOW64\vznkdk.exeC:\Windows\system32\vznkdk.exe 496 "C:\Windows\SysWOW64\lxyzqh.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:464 -
C:\Windows\SysWOW64\vznkdk.exeC:\Windows\system32\vznkdk.exe 496 "C:\Windows\SysWOW64\lxyzqh.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1240 -
C:\Windows\SysWOW64\hyimuk.exeC:\Windows\system32\hyimuk.exe 496 "C:\Windows\SysWOW64\vznkdk.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\hyimuk.exeC:\Windows\system32\hyimuk.exe 496 "C:\Windows\SysWOW64\vznkdk.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:752 -
C:\Windows\SysWOW64\uolpct.exeC:\Windows\system32\uolpct.exe 504 "C:\Windows\SysWOW64\hyimuk.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1976 -
C:\Windows\SysWOW64\uolpct.exeC:\Windows\system32\uolpct.exe 504 "C:\Windows\SysWOW64\hyimuk.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648 -
C:\Windows\SysWOW64\cakurm.exeC:\Windows\system32\cakurm.exe 496 "C:\Windows\SysWOW64\uolpct.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2192 -
C:\Windows\SysWOW64\cakurm.exeC:\Windows\system32\cakurm.exe 496 "C:\Windows\SysWOW64\uolpct.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2656 -
C:\Windows\SysWOW64\ukxmzk.exeC:\Windows\system32\ukxmzk.exe 528 "C:\Windows\SysWOW64\cakurm.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2764 -
C:\Windows\SysWOW64\ukxmzk.exeC:\Windows\system32\ukxmzk.exe 528 "C:\Windows\SysWOW64\cakurm.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824 -
C:\Windows\SysWOW64\hjspis.exeC:\Windows\system32\hjspis.exe 528 "C:\Windows\SysWOW64\ukxmzk.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2440 -
C:\Windows\SysWOW64\hjspis.exeC:\Windows\system32\hjspis.exe 528 "C:\Windows\SysWOW64\ukxmzk.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2676 -
C:\Windows\SysWOW64\riemsq.exeC:\Windows\system32\riemsq.exe 528 "C:\Windows\SysWOW64\hjspis.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2496 -
C:\Windows\SysWOW64\riemsq.exeC:\Windows\system32\riemsq.exe 528 "C:\Windows\SysWOW64\hjspis.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Windows\SysWOW64\dkkcmv.exeC:\Windows\system32\dkkcmv.exe 528 "C:\Windows\SysWOW64\riemsq.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\SysWOW64\dkkcmv.exeC:\Windows\system32\dkkcmv.exe 528 "C:\Windows\SysWOW64\riemsq.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Windows\SysWOW64\qeqkxh.exeC:\Windows\system32\qeqkxh.exe 528 "C:\Windows\SysWOW64\dkkcmv.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1776 -
C:\Windows\SysWOW64\qeqkxh.exeC:\Windows\system32\qeqkxh.exe 528 "C:\Windows\SysWOW64\dkkcmv.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Windows\SysWOW64\ddlmgq.exeC:\Windows\system32\ddlmgq.exe 528 "C:\Windows\SysWOW64\qeqkxh.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2908 -
C:\Windows\SysWOW64\ddlmgq.exeC:\Windows\system32\ddlmgq.exe 528 "C:\Windows\SysWOW64\qeqkxh.exe"34⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\iqdcll.exeC:\Windows\system32\iqdcll.exe 528 "C:\Windows\SysWOW64\ddlmgq.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3032 -
C:\Windows\SysWOW64\iqdcll.exeC:\Windows\system32\iqdcll.exe 528 "C:\Windows\SysWOW64\ddlmgq.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1332 -
C:\Windows\SysWOW64\sasnzp.exeC:\Windows\system32\sasnzp.exe 528 "C:\Windows\SysWOW64\iqdcll.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:912 -
C:\Windows\SysWOW64\sasnzp.exeC:\Windows\system32\sasnzp.exe 528 "C:\Windows\SysWOW64\iqdcll.exe"38⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\cdhxus.exeC:\Windows\system32\cdhxus.exe 528 "C:\Windows\SysWOW64\sasnzp.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2184 -
C:\Windows\SysWOW64\cdhxus.exeC:\Windows\system32\cdhxus.exe 528 "C:\Windows\SysWOW64\sasnzp.exe"40⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\pqrnaw.exeC:\Windows\system32\pqrnaw.exe 528 "C:\Windows\SysWOW64\cdhxus.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1352 -
C:\Windows\SysWOW64\pqrnaw.exeC:\Windows\system32\pqrnaw.exe 528 "C:\Windows\SysWOW64\cdhxus.exe"42⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\coupiw.exeC:\Windows\system32\coupiw.exe 528 "C:\Windows\SysWOW64\pqrnaw.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2952 -
C:\Windows\SysWOW64\coupiw.exeC:\Windows\system32\coupiw.exe 528 "C:\Windows\SysWOW64\pqrnaw.exe"44⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\piafui.exeC:\Windows\system32\piafui.exe 528 "C:\Windows\SysWOW64\coupiw.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2364 -
C:\Windows\SysWOW64\piafui.exeC:\Windows\system32\piafui.exe 528 "C:\Windows\SysWOW64\coupiw.exe"46⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\ztpphl.exeC:\Windows\system32\ztpphl.exe 528 "C:\Windows\SysWOW64\piafui.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2540 -
C:\Windows\SysWOW64\ztpphl.exeC:\Windows\system32\ztpphl.exe 528 "C:\Windows\SysWOW64\piafui.exe"48⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\jstnzk.exeC:\Windows\system32\jstnzk.exe 528 "C:\Windows\SysWOW64\ztpphl.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2576 -
C:\Windows\SysWOW64\jstnzk.exeC:\Windows\system32\jstnzk.exe 528 "C:\Windows\SysWOW64\ztpphl.exe"50⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\wiwpis.exeC:\Windows\system32\wiwpis.exe 528 "C:\Windows\SysWOW64\jstnzk.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2216 -
C:\Windows\SysWOW64\wiwpis.exeC:\Windows\system32\wiwpis.exe 528 "C:\Windows\SysWOW64\jstnzk.exe"52⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\jhrsrs.exeC:\Windows\system32\jhrsrs.exe 528 "C:\Windows\SysWOW64\wiwpis.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\SysWOW64\jhrsrs.exeC:\Windows\system32\jhrsrs.exe 528 "C:\Windows\SysWOW64\wiwpis.exe"54⤵
- Executes dropped EXE
PID:632 -
C:\Windows\SysWOW64\sjgdew.exeC:\Windows\system32\sjgdew.exe 528 "C:\Windows\SysWOW64\jhrsrs.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\SysWOW64\sjgdew.exeC:\Windows\system32\sjgdew.exe 528 "C:\Windows\SysWOW64\jhrsrs.exe"56⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\fijfme.exeC:\Windows\system32\fijfme.exe 528 "C:\Windows\SysWOW64\sjgdew.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2112 -
C:\Windows\SysWOW64\fijfme.exeC:\Windows\system32\fijfme.exe 528 "C:\Windows\SysWOW64\sjgdew.exe"58⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\syeive.exeC:\Windows\system32\syeive.exe 528 "C:\Windows\SysWOW64\fijfme.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1864 -
C:\Windows\SysWOW64\syeive.exeC:\Windows\system32\syeive.exe 528 "C:\Windows\SysWOW64\fijfme.exe"60⤵
- Executes dropped EXE
PID:900 -
C:\Windows\SysWOW64\cjtsqh.exeC:\Windows\system32\cjtsqh.exe 528 "C:\Windows\SysWOW64\syeive.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2904 -
C:\Windows\SysWOW64\cjtsqh.exeC:\Windows\system32\cjtsqh.exe 528 "C:\Windows\SysWOW64\syeive.exe"62⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\paovzp.exeC:\Windows\system32\paovzp.exe 536 "C:\Windows\SysWOW64\cjtsqh.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1624 -
C:\Windows\SysWOW64\paovzp.exeC:\Windows\system32\paovzp.exe 536 "C:\Windows\SysWOW64\cjtsqh.exe"64⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\cqrqhx.exeC:\Windows\system32\cqrqhx.exe 528 "C:\Windows\SysWOW64\paovzp.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1512 -
C:\Windows\SysWOW64\cqrqhx.exeC:\Windows\system32\cqrqhx.exe 528 "C:\Windows\SysWOW64\paovzp.exe"66⤵
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\mbgava.exeC:\Windows\system32\mbgava.exe 528 "C:\Windows\SysWOW64\cqrqhx.exe"67⤵
- Suspicious use of SetThreadContext
PID:2648 -
C:\Windows\SysWOW64\mbgava.exeC:\Windows\system32\mbgava.exe 528 "C:\Windows\SysWOW64\cqrqhx.exe"68⤵PID:2192
-
C:\Windows\SysWOW64\zrbddb.exeC:\Windows\system32\zrbddb.exe 528 "C:\Windows\SysWOW64\mbgava.exe"69⤵
- Suspicious use of SetThreadContext
PID:2008 -
C:\Windows\SysWOW64\zrbddb.exeC:\Windows\system32\zrbddb.exe 528 "C:\Windows\SysWOW64\mbgava.exe"70⤵PID:2632
-
C:\Windows\SysWOW64\lthsxn.exeC:\Windows\system32\lthsxn.exe 528 "C:\Windows\SysWOW64\zrbddb.exe"71⤵
- Suspicious use of SetThreadContext
PID:2872 -
C:\Windows\SysWOW64\lthsxn.exeC:\Windows\system32\lthsxn.exe 528 "C:\Windows\SysWOW64\zrbddb.exe"72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\zgzicr.exeC:\Windows\system32\zgzicr.exe 528 "C:\Windows\SysWOW64\lthsxn.exe"73⤵
- Suspicious use of SetThreadContext
PID:2496 -
C:\Windows\SysWOW64\zgzicr.exeC:\Windows\system32\zgzicr.exe 528 "C:\Windows\SysWOW64\lthsxn.exe"74⤵PID:1724
-
C:\Windows\SysWOW64\iuzgtq.exeC:\Windows\system32\iuzgtq.exe 528 "C:\Windows\SysWOW64\zgzicr.exe"75⤵
- Suspicious use of SetThreadContext
PID:1652 -
C:\Windows\SysWOW64\iuzgtq.exeC:\Windows\system32\iuzgtq.exe 528 "C:\Windows\SysWOW64\zgzicr.exe"76⤵PID:1684
-
C:\Windows\SysWOW64\vluibz.exeC:\Windows\system32\vluibz.exe 528 "C:\Windows\SysWOW64\iuzgtq.exe"77⤵
- Suspicious use of SetThreadContext
PID:1412 -
C:\Windows\SysWOW64\vluibz.exeC:\Windows\system32\vluibz.exe 528 "C:\Windows\SysWOW64\iuzgtq.exe"78⤵PID:1796
-
C:\Windows\SysWOW64\ijplkh.exeC:\Windows\system32\ijplkh.exe 528 "C:\Windows\SysWOW64\vluibz.exe"79⤵
- Suspicious use of SetThreadContext
PID:2604 -
C:\Windows\SysWOW64\ijplkh.exeC:\Windows\system32\ijplkh.exe 528 "C:\Windows\SysWOW64\vluibz.exe"80⤵PID:2452
-
C:\Windows\SysWOW64\vasosh.exeC:\Windows\system32\vasosh.exe 528 "C:\Windows\SysWOW64\ijplkh.exe"81⤵
- Suspicious use of SetThreadContext
PID:1420 -
C:\Windows\SysWOW64\vasosh.exeC:\Windows\system32\vasosh.exe 528 "C:\Windows\SysWOW64\ijplkh.exe"82⤵PID:2000
-
C:\Windows\SysWOW64\iynqbp.exeC:\Windows\system32\iynqbp.exe 528 "C:\Windows\SysWOW64\vasosh.exe"83⤵
- Suspicious use of SetThreadContext
PID:1772 -
C:\Windows\SysWOW64\iynqbp.exeC:\Windows\system32\iynqbp.exe 528 "C:\Windows\SysWOW64\vasosh.exe"84⤵PID:1528
-
C:\Windows\SysWOW64\sengzw.exeC:\Windows\system32\sengzw.exe 528 "C:\Windows\SysWOW64\iynqbp.exe"85⤵
- Suspicious use of SetThreadContext
PID:2420 -
C:\Windows\SysWOW64\sengzw.exeC:\Windows\system32\sengzw.exe 528 "C:\Windows\SysWOW64\iynqbp.exe"86⤵PID:2340
-
C:\Windows\SysWOW64\fdiiif.exeC:\Windows\system32\fdiiif.exe 528 "C:\Windows\SysWOW64\sengzw.exe"87⤵
- Suspicious use of SetThreadContext
PID:1576 -
C:\Windows\SysWOW64\fdiiif.exeC:\Windows\system32\fdiiif.exe 528 "C:\Windows\SysWOW64\sengzw.exe"88⤵PID:1708
-
C:\Windows\SysWOW64\sqayna.exeC:\Windows\system32\sqayna.exe 536 "C:\Windows\SysWOW64\fdiiif.exe"89⤵
- Suspicious use of SetThreadContext
PID:2924 -
C:\Windows\SysWOW64\sqayna.exeC:\Windows\system32\sqayna.exe 536 "C:\Windows\SysWOW64\fdiiif.exe"90⤵PID:2992
-
C:\Windows\SysWOW64\beavdi.exeC:\Windows\system32\beavdi.exe 528 "C:\Windows\SysWOW64\sqayna.exe"91⤵
- Suspicious use of SetThreadContext
PID:2580 -
C:\Windows\SysWOW64\beavdi.exeC:\Windows\system32\beavdi.exe 528 "C:\Windows\SysWOW64\sqayna.exe"92⤵PID:3060
-
C:\Windows\SysWOW64\ouvyuq.exeC:\Windows\system32\ouvyuq.exe 528 "C:\Windows\SysWOW64\beavdi.exe"93⤵
- Suspicious use of SetThreadContext
PID:2844 -
C:\Windows\SysWOW64\ouvyuq.exeC:\Windows\system32\ouvyuq.exe 528 "C:\Windows\SysWOW64\beavdi.exe"94⤵PID:2868
-
C:\Windows\SysWOW64\blqbdq.exeC:\Windows\system32\blqbdq.exe 528 "C:\Windows\SysWOW64\ouvyuq.exe"95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\blqbdq.exeC:\Windows\system32\blqbdq.exe 528 "C:\Windows\SysWOW64\ouvyuq.exe"96⤵PID:2812
-
C:\Windows\SysWOW64\ojtdly.exeC:\Windows\system32\ojtdly.exe 528 "C:\Windows\SysWOW64\blqbdq.exe"97⤵
- Suspicious use of SetThreadContext
PID:1728 -
C:\Windows\SysWOW64\ojtdly.exeC:\Windows\system32\ojtdly.exe 528 "C:\Windows\SysWOW64\blqbdq.exe"98⤵PID:1560
-
C:\Windows\SysWOW64\ymioyb.exeC:\Windows\system32\ymioyb.exe 528 "C:\Windows\SysWOW64\ojtdly.exe"99⤵
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\SysWOW64\ymioyb.exeC:\Windows\system32\ymioyb.exe 528 "C:\Windows\SysWOW64\ojtdly.exe"100⤵PID:2068
-
C:\Windows\SysWOW64\lkdrhk.exeC:\Windows\system32\lkdrhk.exe 528 "C:\Windows\SysWOW64\ymioyb.exe"101⤵
- Suspicious use of SetThreadContext
PID:844 -
C:\Windows\SysWOW64\lkdrhk.exeC:\Windows\system32\lkdrhk.exe 528 "C:\Windows\SysWOW64\ymioyb.exe"102⤵PID:532
-
C:\Windows\SysWOW64\ybglqk.exeC:\Windows\system32\ybglqk.exe 528 "C:\Windows\SysWOW64\lkdrhk.exe"103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\ybglqk.exeC:\Windows\system32\ybglqk.exe 528 "C:\Windows\SysWOW64\lkdrhk.exe"104⤵PID:1344
-
C:\Windows\SysWOW64\lzaoys.exeC:\Windows\system32\lzaoys.exe 536 "C:\Windows\SysWOW64\ybglqk.exe"105⤵
- Suspicious use of SetThreadContext
PID:1772 -
C:\Windows\SysWOW64\lzaoys.exeC:\Windows\system32\lzaoys.exe 536 "C:\Windows\SysWOW64\ybglqk.exe"106⤵PID:860
-
C:\Windows\SysWOW64\ugblwz.exeC:\Windows\system32\ugblwz.exe 528 "C:\Windows\SysWOW64\lzaoys.exe"107⤵
- Suspicious use of SetThreadContext
PID:2420 -
C:\Windows\SysWOW64\ugblwz.exeC:\Windows\system32\ugblwz.exe 528 "C:\Windows\SysWOW64\lzaoys.exe"108⤵PID:1204
-
C:\Windows\SysWOW64\ksbgaf.exeC:\Windows\system32\ksbgaf.exe 528 "C:\Windows\SysWOW64\ugblwz.exe"109⤵
- Suspicious use of SetThreadContext
PID:2180 -
C:\Windows\SysWOW64\ksbgaf.exeC:\Windows\system32\ksbgaf.exe 528 "C:\Windows\SysWOW64\ugblwz.exe"110⤵PID:336
-
C:\Windows\SysWOW64\uvrroi.exeC:\Windows\system32\uvrroi.exe 528 "C:\Windows\SysWOW64\ksbgaf.exe"111⤵
- Suspicious use of SetThreadContext
PID:1352 -
C:\Windows\SysWOW64\uvrroi.exeC:\Windows\system32\uvrroi.exe 528 "C:\Windows\SysWOW64\ksbgaf.exe"112⤵PID:2376
-
C:\Windows\SysWOW64\htttwq.exeC:\Windows\system32\htttwq.exe 528 "C:\Windows\SysWOW64\uvrroi.exe"113⤵
- Suspicious use of SetThreadContext
PID:2828 -
C:\Windows\SysWOW64\htttwq.exeC:\Windows\system32\htttwq.exe 528 "C:\Windows\SysWOW64\uvrroi.exe"114⤵PID:2536
-
C:\Windows\SysWOW64\ukowfy.exeC:\Windows\system32\ukowfy.exe 528 "C:\Windows\SysWOW64\htttwq.exe"115⤵
- Suspicious use of SetThreadContext
PID:2040 -
C:\Windows\SysWOW64\ukowfy.exeC:\Windows\system32\ukowfy.exe 528 "C:\Windows\SysWOW64\htttwq.exe"116⤵PID:264
-
C:\Windows\SysWOW64\euegat.exeC:\Windows\system32\euegat.exe 528 "C:\Windows\SysWOW64\ukowfy.exe"117⤵
- Suspicious use of SetThreadContext
PID:480 -
C:\Windows\SysWOW64\euegat.exeC:\Windows\system32\euegat.exe 528 "C:\Windows\SysWOW64\ukowfy.exe"118⤵PID:1272
-
C:\Windows\SysWOW64\rokolg.exeC:\Windows\system32\rokolg.exe 528 "C:\Windows\SysWOW64\euegat.exe"119⤵
- Suspicious use of SetThreadContext
PID:1632 -
C:\Windows\SysWOW64\rokolg.exeC:\Windows\system32\rokolg.exe 528 "C:\Windows\SysWOW64\euegat.exe"120⤵PID:1152
-
C:\Windows\SysWOW64\ebbmrk.exeC:\Windows\system32\ebbmrk.exe 528 "C:\Windows\SysWOW64\rokolg.exe"121⤵
- Suspicious use of SetThreadContext
PID:1960 -
C:\Windows\SysWOW64\ebbmrk.exeC:\Windows\system32\ebbmrk.exe 528 "C:\Windows\SysWOW64\rokolg.exe"122⤵
- Drops file in System32 directory
PID:2112
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-