Analysis
-
max time kernel
80s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe
-
Size
480KB
-
MD5
98eb26bec28f35187e31b850d656341d
-
SHA1
f1cb8b90fbd0a64d772fd61999e9de23cb2f28ae
-
SHA256
1a42794fe431746daeacdbf8cbadba8fe282099b6421a47fa4c4e5d64d5552b2
-
SHA512
a9485c461ee03aaacaf9b0027979089beef5cf61c85342a108ef1fbc63f6b47b059e9b94234b832b82fb0028ccc7f49efdf476253c3975742e28fb67c103f743
-
SSDEEP
6144:+wVPqTSTVFhaae3OR3wxJXSMaAA4OUi1DZyRn5ERmnfN/05YacxIBnn8H2QYvM4v:Txfw3OR3cdAV51ch5ERa/3nxIl4i6A
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2976 xvhuql.exe 2860 xvhuql.exe 2736 bdomzl.exe 2896 bdomzl.exe 2236 mkakkk.exe 2660 mkakkk.exe 2468 gmurqm.exe 3040 gmurqm.exe 1788 fjphgx.exe 2368 fjphgx.exe 2524 eqemyg.exe 516 eqemyg.exe 1304 glhptg.exe 1548 glhptg.exe 1248 dmzcwj.exe 1744 dmzcwj.exe 2020 iztkqt.exe 2264 iztkqt.exe 2948 xzfcrx.exe 2316 xzfcrx.exe 2768 uaxpma.exe 2872 uaxpma.exe 2380 cilihq.exe 1724 cilihq.exe 2848 mhxfrp.exe 2704 mhxfrp.exe 2344 tlzsii.exe 2612 tlzsii.exe 2640 dslqth.exe 2064 dslqth.exe 2076 jutkje.exe 2680 jutkje.exe 1148 vwaavq.exe 1532 vwaavq.exe 912 gralcl.exe 1772 gralcl.exe 2272 frydkg.exe 944 frydkg.exe 3008 sptyso.exe 320 sptyso.exe 2876 coxddn.exe 2936 coxddn.exe 1996 mojanm.exe 792 mojanm.exe 2576 jafomh.exe 3024 jafomh.exe 2552 yfnnyh.exe 2132 yfnnyh.exe 2360 vjgvji.exe 2636 vjgvji.exe 2124 awsdcs.exe 3028 awsdcs.exe 400 kzpoyv.exe 2336 kzpoyv.exe 1912 ugtliu.exe 2324 ugtliu.exe 2340 ccdyzf.exe 1040 ccdyzf.exe 2244 rspgyp.exe 1580 rspgyp.exe 2952 othlca.exe 1808 othlca.exe 1640 ysljmz.exe 1676 ysljmz.exe -
Loads dropped DLL 64 IoCs
pid Process 2056 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 2056 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 2976 xvhuql.exe 2976 xvhuql.exe 2860 xvhuql.exe 2860 xvhuql.exe 2736 bdomzl.exe 2736 bdomzl.exe 2896 bdomzl.exe 2896 bdomzl.exe 2236 mkakkk.exe 2236 mkakkk.exe 2660 mkakkk.exe 2660 mkakkk.exe 2468 gmurqm.exe 2468 gmurqm.exe 3040 gmurqm.exe 3040 gmurqm.exe 1788 fjphgx.exe 1788 fjphgx.exe 2368 fjphgx.exe 2368 fjphgx.exe 2524 eqemyg.exe 2524 eqemyg.exe 516 eqemyg.exe 516 eqemyg.exe 1304 glhptg.exe 1304 glhptg.exe 1548 glhptg.exe 1548 glhptg.exe 1248 dmzcwj.exe 1248 dmzcwj.exe 1744 dmzcwj.exe 1744 dmzcwj.exe 2020 iztkqt.exe 2020 iztkqt.exe 2264 iztkqt.exe 2264 iztkqt.exe 2948 xzfcrx.exe 2948 xzfcrx.exe 2316 xzfcrx.exe 2316 xzfcrx.exe 2768 uaxpma.exe 2768 uaxpma.exe 2872 uaxpma.exe 2872 uaxpma.exe 2380 cilihq.exe 2380 cilihq.exe 1724 cilihq.exe 1724 cilihq.exe 2848 mhxfrp.exe 2848 mhxfrp.exe 2704 mhxfrp.exe 2704 mhxfrp.exe 2344 tlzsii.exe 2344 tlzsii.exe 2612 tlzsii.exe 2612 tlzsii.exe 2640 dslqth.exe 2640 dslqth.exe 2064 dslqth.exe 2064 dslqth.exe 2076 jutkje.exe 2076 jutkje.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qbndzy.exe dlsary.exe File created C:\Windows\SysWOW64\bopawy.exe jszvtx.exe File created C:\Windows\SysWOW64\fjphgx.exe gmurqm.exe File created C:\Windows\SysWOW64\pfecbs.exe fgseqt.exe File created C:\Windows\SysWOW64\zvoxqu.exe ntiieq.exe File opened for modification C:\Windows\SysWOW64\sibqga.exe lwclrg.exe File opened for modification C:\Windows\SysWOW64\hhlnjl.exe awnimr.exe File created C:\Windows\SysWOW64\jjmvvu.exe ahokar.exe File created C:\Windows\SysWOW64\ksrngp.exe frjsqk.exe File created C:\Windows\SysWOW64\owdvti.exe mxpgvd.exe File opened for modification C:\Windows\SysWOW64\gmurqm.exe mkakkk.exe File opened for modification C:\Windows\SysWOW64\bsfroh.exe zmrgyq.exe File opened for modification C:\Windows\SysWOW64\oxwmky.exe bsfroh.exe File opened for modification C:\Windows\SysWOW64\utobjv.exe cmmomc.exe File opened for modification C:\Windows\SysWOW64\eirlyh.exe aojmzp.exe File created C:\Windows\SysWOW64\mkxulm.exe fzzpok.exe File opened for modification C:\Windows\SysWOW64\ruivjc.exe ceonck.exe File created C:\Windows\SysWOW64\cyquqk.exe ufrukd.exe File created C:\Windows\SysWOW64\vwaavq.exe jutkje.exe File created C:\Windows\SysWOW64\lxxqrv.exe bvhoea.exe File opened for modification C:\Windows\SysWOW64\mtleqm.exe ciwudj.exe File opened for modification C:\Windows\SysWOW64\vtemtu.exe qswrdp.exe File opened for modification C:\Windows\SysWOW64\vtkexz.exe nadejk.exe File opened for modification C:\Windows\SysWOW64\nhhfdd.exe bfbqry.exe File created C:\Windows\SysWOW64\frydkg.exe gralcl.exe File opened for modification C:\Windows\SysWOW64\ilnbgf.exe ypujql.exe File opened for modification C:\Windows\SysWOW64\ciwudj.exe fwahfo.exe File created C:\Windows\SysWOW64\awnimr.exe lgtafa.exe File opened for modification C:\Windows\SysWOW64\hmvzfo.exe zqtmov.exe File created C:\Windows\SysWOW64\ikcngz.exe ylyqna.exe File created C:\Windows\SysWOW64\xavdsy.exe neulke.exe File created C:\Windows\SysWOW64\egxpry.exe uvifeu.exe File created C:\Windows\SysWOW64\afiyeo.exe pvtasq.exe File opened for modification C:\Windows\SysWOW64\chmyxq.exe vontaw.exe File created C:\Windows\SysWOW64\amvcie.exe ttpxll.exe File created C:\Windows\SysWOW64\fdntut.exe wtxjzq.exe File created C:\Windows\SysWOW64\jalykg.exe ervdta.exe File created C:\Windows\SysWOW64\xapian.exe xioyyb.exe File created C:\Windows\SysWOW64\bpwjuw.exe zyqtws.exe File created C:\Windows\SysWOW64\dslqth.exe tlzsii.exe File opened for modification C:\Windows\SysWOW64\vjgvji.exe yfnnyh.exe File created C:\Windows\SysWOW64\aojmzp.exe qpxopq.exe File opened for modification C:\Windows\SysWOW64\qswrdp.exe eqqjrc.exe File opened for modification C:\Windows\SysWOW64\hzzacx.exe xavdsy.exe File created C:\Windows\SysWOW64\mtleqm.exe ciwudj.exe File opened for modification C:\Windows\SysWOW64\utrxur.exe hrlhjm.exe File created C:\Windows\SysWOW64\mkakkk.exe bdomzl.exe File created C:\Windows\SysWOW64\qxrjvs.exe gymdlu.exe File opened for modification C:\Windows\SysWOW64\nmnfqg.exe gesnwr.exe File created C:\Windows\SysWOW64\fkkylj.exe qzodcn.exe File opened for modification C:\Windows\SysWOW64\zxznsh.exe ksrngp.exe File created C:\Windows\SysWOW64\ervdta.exe rxpoio.exe File opened for modification C:\Windows\SysWOW64\qomspk.exe ikcngz.exe File created C:\Windows\SysWOW64\iwckne.exe egxpry.exe File opened for modification C:\Windows\SysWOW64\acbaaq.exe anmuji.exe File created C:\Windows\SysWOW64\yizwip.exe grpecj.exe File opened for modification C:\Windows\SysWOW64\aqmejf.exe qjihqh.exe File created C:\Windows\SysWOW64\jdwmtz.exe tzvrpl.exe File created C:\Windows\SysWOW64\manqoj.exe zjswfj.exe File opened for modification C:\Windows\SysWOW64\agshnt.exe ytpess.exe File created C:\Windows\SysWOW64\ufrukd.exe nmkpmj.exe File opened for modification C:\Windows\SysWOW64\masudo.exe pcvmpn.exe File created C:\Windows\SysWOW64\zxjrzy.exe ztzmhn.exe File created C:\Windows\SysWOW64\tzvrpl.exe jartfn.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1820 set thread context of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 2976 set thread context of 2860 2976 xvhuql.exe 31 PID 2736 set thread context of 2896 2736 bdomzl.exe 33 PID 2236 set thread context of 2660 2236 mkakkk.exe 35 PID 2468 set thread context of 3040 2468 gmurqm.exe 37 PID 1788 set thread context of 2368 1788 fjphgx.exe 39 PID 2524 set thread context of 516 2524 eqemyg.exe 41 PID 1304 set thread context of 1548 1304 glhptg.exe 43 PID 1248 set thread context of 1744 1248 dmzcwj.exe 45 PID 2020 set thread context of 2264 2020 iztkqt.exe 47 PID 2948 set thread context of 2316 2948 xzfcrx.exe 49 PID 2768 set thread context of 2872 2768 uaxpma.exe 51 PID 2380 set thread context of 1724 2380 cilihq.exe 53 PID 2848 set thread context of 2704 2848 mhxfrp.exe 55 PID 2344 set thread context of 2612 2344 tlzsii.exe 57 PID 2640 set thread context of 2064 2640 dslqth.exe 59 PID 2076 set thread context of 2680 2076 jutkje.exe 61 PID 1148 set thread context of 1532 1148 vwaavq.exe 63 PID 912 set thread context of 1772 912 gralcl.exe 65 PID 2272 set thread context of 944 2272 frydkg.exe 67 PID 3008 set thread context of 320 3008 sptyso.exe 69 PID 2876 set thread context of 2936 2876 coxddn.exe 71 PID 1996 set thread context of 792 1996 mojanm.exe 73 PID 2576 set thread context of 3024 2576 jafomh.exe 75 PID 2552 set thread context of 2132 2552 yfnnyh.exe 77 PID 2360 set thread context of 2636 2360 vjgvji.exe 79 PID 2124 set thread context of 3028 2124 awsdcs.exe 81 PID 400 set thread context of 2336 400 kzpoyv.exe 83 PID 1912 set thread context of 2324 1912 ugtliu.exe 85 PID 2340 set thread context of 1040 2340 ccdyzf.exe 87 PID 2244 set thread context of 1580 2244 rspgyp.exe 89 PID 2952 set thread context of 1808 2952 othlca.exe 91 PID 1640 set thread context of 1676 1640 ysljmz.exe 93 PID 2672 set thread context of 1160 2672 jrpofy.exe 95 PID 2576 set thread context of 2648 2576 tnqyms.exe 97 PID 2160 set thread context of 1756 2160 aulrzh.exe 99 PID 2040 set thread context of 2200 2040 ctrgfm.exe 101 PID 2080 set thread context of 2076 2080 sgabbr.exe 103 PID 1284 set thread context of 932 1284 zrygyt.exe 105 PID 992 set thread context of 3020 992 knzzfo.exe 107 PID 2272 set thread context of 956 2272 runrzd.exe 109 PID 2116 set thread context of 1488 2116 bxcbng.exe 111 PID 2916 set thread context of 2948 2916 leozff.exe 113 PID 2460 set thread context of 2428 2460 qjihqh.exe 115 PID 2572 set thread context of 2092 2572 aqmejf.exe 117 PID 2604 set thread context of 2552 2604 labjnw.exe 119 PID 2212 set thread context of 2608 2212 stapkx.exe 121 PID 1920 set thread context of 1824 1920 fgseqt.exe 123 PID 1868 set thread context of 840 1868 pfecbs.exe 125 PID 1248 set thread context of 1284 1248 zqtmov.exe 127 PID 2068 set thread context of 2340 2068 hmvzfo.exe 129 PID 2260 set thread context of 1740 2260 wybfjp.exe 131 PID 2748 set thread context of 652 2748 gffctn.exe 133 PID 1736 set thread context of 2876 1736 nqmhqh.exe 135 PID 2824 set thread context of 2776 2824 xpqnbg.exe 137 PID 2436 set thread context of 1240 2436 kchchk.exe 139 PID 1760 set thread context of 2348 1760 ptepdq.exe 141 PID 2620 set thread context of 2188 2620 zsquvp.exe 143 PID 1280 set thread context of 632 1280 ebzpdu.exe 145 PID 2676 set thread context of 1648 2676 rvfxpg.exe 147 PID 828 set thread context of 1328 828 tnwvhd.exe 149 PID 740 set thread context of 928 740 dmiszb.exe 151 PID 2052 set thread context of 872 2052 dqlfjm.exe 153 PID 2312 set thread context of 2844 2312 ntiieq.exe 155 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebzpdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmhwrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrlhjm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdwmtz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxczqs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ykbufk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzjiay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxcbng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language labjnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afiyeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egxpry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahokar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtuisi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mojanm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wybfjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpghje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eldysc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gwgtsn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sttmqt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufrukd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksdbnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvhuql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mhxfrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlxjvz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruivjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emuhnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ncqfrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohmdtd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xuvyzk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sguojo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztzmhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vynbvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjttma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksrngp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctrgfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnqmme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxsfxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oeswoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqtmga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atidid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtqlik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeipdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntiieq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qswrdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fzzpok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttpxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gralcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frydkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfecbs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhlnjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ermopm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxpgvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owdvti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpwjuw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jutkje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtemtu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qomspk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcvmpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aipbto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnjgdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language redoma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmurqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxozdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtkexz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2056 1820 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 29 PID 2056 wrote to memory of 2976 2056 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2976 2056 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2976 2056 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2976 2056 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2976 wrote to memory of 2860 2976 xvhuql.exe 31 PID 2860 wrote to memory of 2736 2860 xvhuql.exe 32 PID 2860 wrote to memory of 2736 2860 xvhuql.exe 32 PID 2860 wrote to memory of 2736 2860 xvhuql.exe 32 PID 2860 wrote to memory of 2736 2860 xvhuql.exe 32 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2736 wrote to memory of 2896 2736 bdomzl.exe 33 PID 2896 wrote to memory of 2236 2896 bdomzl.exe 34 PID 2896 wrote to memory of 2236 2896 bdomzl.exe 34 PID 2896 wrote to memory of 2236 2896 bdomzl.exe 34 PID 2896 wrote to memory of 2236 2896 bdomzl.exe 34 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2236 wrote to memory of 2660 2236 mkakkk.exe 35 PID 2660 wrote to memory of 2468 2660 mkakkk.exe 36 PID 2660 wrote to memory of 2468 2660 mkakkk.exe 36 PID 2660 wrote to memory of 2468 2660 mkakkk.exe 36 PID 2660 wrote to memory of 2468 2660 mkakkk.exe 36 PID 2468 wrote to memory of 3040 2468 gmurqm.exe 37 PID 2468 wrote to memory of 3040 2468 gmurqm.exe 37 PID 2468 wrote to memory of 3040 2468 gmurqm.exe 37 PID 2468 wrote to memory of 3040 2468 gmurqm.exe 37 PID 2468 wrote to memory of 3040 2468 gmurqm.exe 37 PID 2468 wrote to memory of 3040 2468 gmurqm.exe 37 PID 2468 wrote to memory of 3040 2468 gmurqm.exe 37 PID 2468 wrote to memory of 3040 2468 gmurqm.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\xvhuql.exeC:\Windows\system32\xvhuql.exe 452 "C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\xvhuql.exeC:\Windows\system32\xvhuql.exe 452 "C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\bdomzl.exeC:\Windows\system32\bdomzl.exe 452 "C:\Windows\SysWOW64\xvhuql.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\bdomzl.exeC:\Windows\system32\bdomzl.exe 452 "C:\Windows\SysWOW64\xvhuql.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\mkakkk.exeC:\Windows\system32\mkakkk.exe 496 "C:\Windows\SysWOW64\bdomzl.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\mkakkk.exeC:\Windows\system32\mkakkk.exe 496 "C:\Windows\SysWOW64\bdomzl.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\gmurqm.exeC:\Windows\system32\gmurqm.exe 452 "C:\Windows\SysWOW64\mkakkk.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\gmurqm.exeC:\Windows\system32\gmurqm.exe 452 "C:\Windows\SysWOW64\mkakkk.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\fjphgx.exeC:\Windows\system32\fjphgx.exe 528 "C:\Windows\SysWOW64\gmurqm.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1788 -
C:\Windows\SysWOW64\fjphgx.exeC:\Windows\system32\fjphgx.exe 528 "C:\Windows\SysWOW64\gmurqm.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Windows\SysWOW64\eqemyg.exeC:\Windows\system32\eqemyg.exe 452 "C:\Windows\SysWOW64\fjphgx.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2524 -
C:\Windows\SysWOW64\eqemyg.exeC:\Windows\system32\eqemyg.exe 452 "C:\Windows\SysWOW64\fjphgx.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:516 -
C:\Windows\SysWOW64\glhptg.exeC:\Windows\system32\glhptg.exe 452 "C:\Windows\SysWOW64\eqemyg.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1304 -
C:\Windows\SysWOW64\glhptg.exeC:\Windows\system32\glhptg.exe 452 "C:\Windows\SysWOW64\eqemyg.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1548 -
C:\Windows\SysWOW64\dmzcwj.exeC:\Windows\system32\dmzcwj.exe 452 "C:\Windows\SysWOW64\glhptg.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1248 -
C:\Windows\SysWOW64\dmzcwj.exeC:\Windows\system32\dmzcwj.exe 452 "C:\Windows\SysWOW64\glhptg.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Windows\SysWOW64\iztkqt.exeC:\Windows\system32\iztkqt.exe 452 "C:\Windows\SysWOW64\dmzcwj.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2020 -
C:\Windows\SysWOW64\iztkqt.exeC:\Windows\system32\iztkqt.exe 452 "C:\Windows\SysWOW64\dmzcwj.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Windows\SysWOW64\xzfcrx.exeC:\Windows\system32\xzfcrx.exe 452 "C:\Windows\SysWOW64\iztkqt.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2948 -
C:\Windows\SysWOW64\xzfcrx.exeC:\Windows\system32\xzfcrx.exe 452 "C:\Windows\SysWOW64\iztkqt.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Windows\SysWOW64\uaxpma.exeC:\Windows\system32\uaxpma.exe 452 "C:\Windows\SysWOW64\xzfcrx.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2768 -
C:\Windows\SysWOW64\uaxpma.exeC:\Windows\system32\uaxpma.exe 452 "C:\Windows\SysWOW64\xzfcrx.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2872 -
C:\Windows\SysWOW64\cilihq.exeC:\Windows\system32\cilihq.exe 496 "C:\Windows\SysWOW64\uaxpma.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2380 -
C:\Windows\SysWOW64\cilihq.exeC:\Windows\system32\cilihq.exe 496 "C:\Windows\SysWOW64\uaxpma.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Windows\SysWOW64\mhxfrp.exeC:\Windows\system32\mhxfrp.exe 528 "C:\Windows\SysWOW64\cilihq.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2848 -
C:\Windows\SysWOW64\mhxfrp.exeC:\Windows\system32\mhxfrp.exe 528 "C:\Windows\SysWOW64\cilihq.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\tlzsii.exeC:\Windows\system32\tlzsii.exe 536 "C:\Windows\SysWOW64\mhxfrp.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2344 -
C:\Windows\SysWOW64\tlzsii.exeC:\Windows\system32\tlzsii.exe 536 "C:\Windows\SysWOW64\mhxfrp.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\dslqth.exeC:\Windows\system32\dslqth.exe 496 "C:\Windows\SysWOW64\tlzsii.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2640 -
C:\Windows\SysWOW64\dslqth.exeC:\Windows\system32\dslqth.exe 496 "C:\Windows\SysWOW64\tlzsii.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Windows\SysWOW64\jutkje.exeC:\Windows\system32\jutkje.exe 532 "C:\Windows\SysWOW64\dslqth.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\jutkje.exeC:\Windows\system32\jutkje.exe 532 "C:\Windows\SysWOW64\dslqth.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\vwaavq.exeC:\Windows\system32\vwaavq.exe 528 "C:\Windows\SysWOW64\jutkje.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1148 -
C:\Windows\SysWOW64\vwaavq.exeC:\Windows\system32\vwaavq.exe 528 "C:\Windows\SysWOW64\jutkje.exe"36⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\gralcl.exeC:\Windows\system32\gralcl.exe 528 "C:\Windows\SysWOW64\vwaavq.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:912 -
C:\Windows\SysWOW64\gralcl.exeC:\Windows\system32\gralcl.exe 528 "C:\Windows\SysWOW64\vwaavq.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\SysWOW64\frydkg.exeC:\Windows\system32\frydkg.exe 452 "C:\Windows\SysWOW64\gralcl.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2272 -
C:\Windows\SysWOW64\frydkg.exeC:\Windows\system32\frydkg.exe 452 "C:\Windows\SysWOW64\gralcl.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:944 -
C:\Windows\SysWOW64\sptyso.exeC:\Windows\system32\sptyso.exe 528 "C:\Windows\SysWOW64\frydkg.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3008 -
C:\Windows\SysWOW64\sptyso.exeC:\Windows\system32\sptyso.exe 528 "C:\Windows\SysWOW64\frydkg.exe"42⤵
- Executes dropped EXE
PID:320 -
C:\Windows\SysWOW64\coxddn.exeC:\Windows\system32\coxddn.exe 528 "C:\Windows\SysWOW64\sptyso.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2876 -
C:\Windows\SysWOW64\coxddn.exeC:\Windows\system32\coxddn.exe 528 "C:\Windows\SysWOW64\sptyso.exe"44⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\mojanm.exeC:\Windows\system32\mojanm.exe 528 "C:\Windows\SysWOW64\coxddn.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1996 -
C:\Windows\SysWOW64\mojanm.exeC:\Windows\system32\mojanm.exe 528 "C:\Windows\SysWOW64\coxddn.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:792 -
C:\Windows\SysWOW64\jafomh.exeC:\Windows\system32\jafomh.exe 452 "C:\Windows\SysWOW64\mojanm.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2576 -
C:\Windows\SysWOW64\jafomh.exeC:\Windows\system32\jafomh.exe 452 "C:\Windows\SysWOW64\mojanm.exe"48⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\yfnnyh.exeC:\Windows\system32\yfnnyh.exe 528 "C:\Windows\SysWOW64\jafomh.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2552 -
C:\Windows\SysWOW64\yfnnyh.exeC:\Windows\system32\yfnnyh.exe 528 "C:\Windows\SysWOW64\jafomh.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\vjgvji.exeC:\Windows\system32\vjgvji.exe 512 "C:\Windows\SysWOW64\yfnnyh.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2360 -
C:\Windows\SysWOW64\vjgvji.exeC:\Windows\system32\vjgvji.exe 512 "C:\Windows\SysWOW64\yfnnyh.exe"52⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\awsdcs.exeC:\Windows\system32\awsdcs.exe 484 "C:\Windows\SysWOW64\vjgvji.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2124 -
C:\Windows\SysWOW64\awsdcs.exeC:\Windows\system32\awsdcs.exe 484 "C:\Windows\SysWOW64\vjgvji.exe"54⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\kzpoyv.exeC:\Windows\system32\kzpoyv.exe 528 "C:\Windows\SysWOW64\awsdcs.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:400 -
C:\Windows\SysWOW64\kzpoyv.exeC:\Windows\system32\kzpoyv.exe 528 "C:\Windows\SysWOW64\awsdcs.exe"56⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\ugtliu.exeC:\Windows\system32\ugtliu.exe 528 "C:\Windows\SysWOW64\kzpoyv.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1912 -
C:\Windows\SysWOW64\ugtliu.exeC:\Windows\system32\ugtliu.exe 528 "C:\Windows\SysWOW64\kzpoyv.exe"58⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\ccdyzf.exeC:\Windows\system32\ccdyzf.exe 528 "C:\Windows\SysWOW64\ugtliu.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2340 -
C:\Windows\SysWOW64\ccdyzf.exeC:\Windows\system32\ccdyzf.exe 528 "C:\Windows\SysWOW64\ugtliu.exe"60⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\rspgyp.exeC:\Windows\system32\rspgyp.exe 496 "C:\Windows\SysWOW64\ccdyzf.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2244 -
C:\Windows\SysWOW64\rspgyp.exeC:\Windows\system32\rspgyp.exe 496 "C:\Windows\SysWOW64\ccdyzf.exe"62⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\othlca.exeC:\Windows\system32\othlca.exe 452 "C:\Windows\SysWOW64\rspgyp.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2952 -
C:\Windows\SysWOW64\othlca.exeC:\Windows\system32\othlca.exe 452 "C:\Windows\SysWOW64\rspgyp.exe"64⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\ysljmz.exeC:\Windows\system32\ysljmz.exe 528 "C:\Windows\SysWOW64\othlca.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1640 -
C:\Windows\SysWOW64\ysljmz.exeC:\Windows\system32\ysljmz.exe 528 "C:\Windows\SysWOW64\othlca.exe"66⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\jrpofy.exeC:\Windows\system32\jrpofy.exe 520 "C:\Windows\SysWOW64\ysljmz.exe"67⤵
- Suspicious use of SetThreadContext
PID:2672 -
C:\Windows\SysWOW64\jrpofy.exeC:\Windows\system32\jrpofy.exe 520 "C:\Windows\SysWOW64\ysljmz.exe"68⤵PID:1160
-
C:\Windows\SysWOW64\tnqyms.exeC:\Windows\system32\tnqyms.exe 528 "C:\Windows\SysWOW64\jrpofy.exe"69⤵
- Suspicious use of SetThreadContext
PID:2576 -
C:\Windows\SysWOW64\tnqyms.exeC:\Windows\system32\tnqyms.exe 528 "C:\Windows\SysWOW64\jrpofy.exe"70⤵PID:2648
-
C:\Windows\SysWOW64\aulrzh.exeC:\Windows\system32\aulrzh.exe 496 "C:\Windows\SysWOW64\tnqyms.exe"71⤵
- Suspicious use of SetThreadContext
PID:2160 -
C:\Windows\SysWOW64\aulrzh.exeC:\Windows\system32\aulrzh.exe 496 "C:\Windows\SysWOW64\tnqyms.exe"72⤵PID:1756
-
C:\Windows\SysWOW64\ctrgfm.exeC:\Windows\system32\ctrgfm.exe 528 "C:\Windows\SysWOW64\aulrzh.exe"73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\ctrgfm.exeC:\Windows\system32\ctrgfm.exe 528 "C:\Windows\SysWOW64\aulrzh.exe"74⤵PID:2200
-
C:\Windows\SysWOW64\sgabbr.exeC:\Windows\system32\sgabbr.exe 536 "C:\Windows\SysWOW64\ctrgfm.exe"75⤵
- Suspicious use of SetThreadContext
PID:2080 -
C:\Windows\SysWOW64\sgabbr.exeC:\Windows\system32\sgabbr.exe 536 "C:\Windows\SysWOW64\ctrgfm.exe"76⤵PID:2076
-
C:\Windows\SysWOW64\zrygyt.exeC:\Windows\system32\zrygyt.exe 528 "C:\Windows\SysWOW64\sgabbr.exe"77⤵
- Suspicious use of SetThreadContext
PID:1284 -
C:\Windows\SysWOW64\zrygyt.exeC:\Windows\system32\zrygyt.exe 528 "C:\Windows\SysWOW64\sgabbr.exe"78⤵PID:932
-
C:\Windows\SysWOW64\knzzfo.exeC:\Windows\system32\knzzfo.exe 520 "C:\Windows\SysWOW64\zrygyt.exe"79⤵
- Suspicious use of SetThreadContext
PID:992 -
C:\Windows\SysWOW64\knzzfo.exeC:\Windows\system32\knzzfo.exe 520 "C:\Windows\SysWOW64\zrygyt.exe"80⤵PID:3020
-
C:\Windows\SysWOW64\runrzd.exeC:\Windows\system32\runrzd.exe 528 "C:\Windows\SysWOW64\knzzfo.exe"81⤵
- Suspicious use of SetThreadContext
PID:2272 -
C:\Windows\SysWOW64\runrzd.exeC:\Windows\system32\runrzd.exe 528 "C:\Windows\SysWOW64\knzzfo.exe"82⤵PID:956
-
C:\Windows\SysWOW64\bxcbng.exeC:\Windows\system32\bxcbng.exe 528 "C:\Windows\SysWOW64\runrzd.exe"83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\bxcbng.exeC:\Windows\system32\bxcbng.exe 528 "C:\Windows\SysWOW64\runrzd.exe"84⤵PID:1488
-
C:\Windows\SysWOW64\leozff.exeC:\Windows\system32\leozff.exe 528 "C:\Windows\SysWOW64\bxcbng.exe"85⤵
- Suspicious use of SetThreadContext
PID:2916 -
C:\Windows\SysWOW64\leozff.exeC:\Windows\system32\leozff.exe 528 "C:\Windows\SysWOW64\bxcbng.exe"86⤵PID:2948
-
C:\Windows\SysWOW64\qjihqh.exeC:\Windows\system32\qjihqh.exe 528 "C:\Windows\SysWOW64\leozff.exe"87⤵
- Suspicious use of SetThreadContext
PID:2460 -
C:\Windows\SysWOW64\qjihqh.exeC:\Windows\system32\qjihqh.exe 528 "C:\Windows\SysWOW64\leozff.exe"88⤵
- Drops file in System32 directory
PID:2428 -
C:\Windows\SysWOW64\aqmejf.exeC:\Windows\system32\aqmejf.exe 536 "C:\Windows\SysWOW64\qjihqh.exe"89⤵
- Suspicious use of SetThreadContext
PID:2572 -
C:\Windows\SysWOW64\aqmejf.exeC:\Windows\system32\aqmejf.exe 536 "C:\Windows\SysWOW64\qjihqh.exe"90⤵PID:2092
-
C:\Windows\SysWOW64\labjnw.exeC:\Windows\system32\labjnw.exe 528 "C:\Windows\SysWOW64\aqmejf.exe"91⤵
- Suspicious use of SetThreadContext
PID:2604 -
C:\Windows\SysWOW64\labjnw.exeC:\Windows\system32\labjnw.exe 528 "C:\Windows\SysWOW64\aqmejf.exe"92⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\stapkx.exeC:\Windows\system32\stapkx.exe 528 "C:\Windows\SysWOW64\labjnw.exe"93⤵
- Suspicious use of SetThreadContext
PID:2212 -
C:\Windows\SysWOW64\stapkx.exeC:\Windows\system32\stapkx.exe 528 "C:\Windows\SysWOW64\labjnw.exe"94⤵PID:2608
-
C:\Windows\SysWOW64\fgseqt.exeC:\Windows\system32\fgseqt.exe 528 "C:\Windows\SysWOW64\stapkx.exe"95⤵
- Suspicious use of SetThreadContext
PID:1920 -
C:\Windows\SysWOW64\fgseqt.exeC:\Windows\system32\fgseqt.exe 528 "C:\Windows\SysWOW64\stapkx.exe"96⤵
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\pfecbs.exeC:\Windows\system32\pfecbs.exe 528 "C:\Windows\SysWOW64\fgseqt.exe"97⤵
- Suspicious use of SetThreadContext
PID:1868 -
C:\Windows\SysWOW64\pfecbs.exeC:\Windows\system32\pfecbs.exe 528 "C:\Windows\SysWOW64\fgseqt.exe"98⤵
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\zqtmov.exeC:\Windows\system32\zqtmov.exe 528 "C:\Windows\SysWOW64\pfecbs.exe"99⤵
- Suspicious use of SetThreadContext
PID:1248 -
C:\Windows\SysWOW64\zqtmov.exeC:\Windows\system32\zqtmov.exe 528 "C:\Windows\SysWOW64\pfecbs.exe"100⤵
- Drops file in System32 directory
PID:1284 -
C:\Windows\SysWOW64\hmvzfo.exeC:\Windows\system32\hmvzfo.exe 528 "C:\Windows\SysWOW64\zqtmov.exe"101⤵
- Suspicious use of SetThreadContext
PID:2068 -
C:\Windows\SysWOW64\hmvzfo.exeC:\Windows\system32\hmvzfo.exe 528 "C:\Windows\SysWOW64\zqtmov.exe"102⤵PID:2340
-
C:\Windows\SysWOW64\wybfjp.exeC:\Windows\system32\wybfjp.exe 528 "C:\Windows\SysWOW64\hmvzfo.exe"103⤵
- Suspicious use of SetThreadContext
PID:2260 -
C:\Windows\SysWOW64\wybfjp.exeC:\Windows\system32\wybfjp.exe 528 "C:\Windows\SysWOW64\hmvzfo.exe"104⤵
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\gffctn.exeC:\Windows\system32\gffctn.exe 528 "C:\Windows\SysWOW64\wybfjp.exe"105⤵
- Suspicious use of SetThreadContext
PID:2748 -
C:\Windows\SysWOW64\gffctn.exeC:\Windows\system32\gffctn.exe 528 "C:\Windows\SysWOW64\wybfjp.exe"106⤵PID:652
-
C:\Windows\SysWOW64\nqmhqh.exeC:\Windows\system32\nqmhqh.exe 536 "C:\Windows\SysWOW64\gffctn.exe"107⤵
- Suspicious use of SetThreadContext
PID:1736 -
C:\Windows\SysWOW64\nqmhqh.exeC:\Windows\system32\nqmhqh.exe 536 "C:\Windows\SysWOW64\gffctn.exe"108⤵PID:2876
-
C:\Windows\SysWOW64\xpqnbg.exeC:\Windows\system32\xpqnbg.exe 536 "C:\Windows\SysWOW64\nqmhqh.exe"109⤵
- Suspicious use of SetThreadContext
PID:2824 -
C:\Windows\SysWOW64\xpqnbg.exeC:\Windows\system32\xpqnbg.exe 536 "C:\Windows\SysWOW64\nqmhqh.exe"110⤵PID:2776
-
C:\Windows\SysWOW64\kchchk.exeC:\Windows\system32\kchchk.exe 528 "C:\Windows\SysWOW64\xpqnbg.exe"111⤵
- Suspicious use of SetThreadContext
PID:2436 -
C:\Windows\SysWOW64\kchchk.exeC:\Windows\system32\kchchk.exe 528 "C:\Windows\SysWOW64\xpqnbg.exe"112⤵PID:1240
-
C:\Windows\SysWOW64\ptepdq.exeC:\Windows\system32\ptepdq.exe 528 "C:\Windows\SysWOW64\kchchk.exe"113⤵
- Suspicious use of SetThreadContext
PID:1760 -
C:\Windows\SysWOW64\ptepdq.exeC:\Windows\system32\ptepdq.exe 528 "C:\Windows\SysWOW64\kchchk.exe"114⤵PID:2348
-
C:\Windows\SysWOW64\zsquvp.exeC:\Windows\system32\zsquvp.exe 528 "C:\Windows\SysWOW64\ptepdq.exe"115⤵
- Suspicious use of SetThreadContext
PID:2620 -
C:\Windows\SysWOW64\zsquvp.exeC:\Windows\system32\zsquvp.exe 528 "C:\Windows\SysWOW64\ptepdq.exe"116⤵PID:2188
-
C:\Windows\SysWOW64\ebzpdu.exeC:\Windows\system32\ebzpdu.exe 476 "C:\Windows\SysWOW64\zsquvp.exe"117⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\SysWOW64\ebzpdu.exeC:\Windows\system32\ebzpdu.exe 476 "C:\Windows\SysWOW64\zsquvp.exe"118⤵PID:632
-
C:\Windows\SysWOW64\rvfxpg.exeC:\Windows\system32\rvfxpg.exe 528 "C:\Windows\SysWOW64\ebzpdu.exe"119⤵
- Suspicious use of SetThreadContext
PID:2676 -
C:\Windows\SysWOW64\rvfxpg.exeC:\Windows\system32\rvfxpg.exe 528 "C:\Windows\SysWOW64\ebzpdu.exe"120⤵PID:1648
-
C:\Windows\SysWOW64\tnwvhd.exeC:\Windows\system32\tnwvhd.exe 452 "C:\Windows\SysWOW64\rvfxpg.exe"121⤵
- Suspicious use of SetThreadContext
PID:828 -
C:\Windows\SysWOW64\tnwvhd.exeC:\Windows\system32\tnwvhd.exe 452 "C:\Windows\SysWOW64\rvfxpg.exe"122⤵PID:1328
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-