Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe
-
Size
480KB
-
MD5
98eb26bec28f35187e31b850d656341d
-
SHA1
f1cb8b90fbd0a64d772fd61999e9de23cb2f28ae
-
SHA256
1a42794fe431746daeacdbf8cbadba8fe282099b6421a47fa4c4e5d64d5552b2
-
SHA512
a9485c461ee03aaacaf9b0027979089beef5cf61c85342a108ef1fbc63f6b47b059e9b94234b832b82fb0028ccc7f49efdf476253c3975742e28fb67c103f743
-
SSDEEP
6144:+wVPqTSTVFhaae3OR3wxJXSMaAA4OUi1DZyRn5ERmnfN/05YacxIBnn8H2QYvM4v:Txfw3OR3cdAV51ch5ERa/3nxIl4i6A
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 4896 guiuxm.exe 3044 guiuxm.exe 2748 amkxub.exe 1264 amkxub.exe 2588 leavzr.exe 4236 leavzr.exe 2364 lhmnnv.exe 1468 lhmnnv.exe 2424 ycwltz.exe 1780 ycwltz.exe 1268 lwctel.exe 720 lwctel.exe 1968 ygidhd.exe 4240 ygidhd.exe 2684 jbjoxf.exe 1932 jbjoxf.exe 2960 txcgfa.exe 3344 txcgfa.exe 2124 gvfbna.exe 4024 gvfbna.exe 876 qvjgyz.exe 1636 qvjgyz.exe 4360 diawld.exe 3864 diawld.exe 3252 odbgtx.exe 1512 odbgtx.exe 4396 vhduci.exe 1788 vhduci.exe 1988 dacurx.exe 2132 dacurx.exe 336 qzfwax.exe 4404 qzfwax.exe 4372 dmpmfb.exe 2452 dmpmfb.exe 2524 qzgclf.exe 3916 qzgclf.exe 1740 ydqpdq.exe 4440 ydqpdq.exe 368 otcpkh.exe 2044 otcpkh.exe 3068 qvrzxd.exe 400 qvrzxd.exe 3300 dfxkac.exe 928 dfxkac.exe 4836 nekikb.exe 5048 nekikb.exe 2456 bnikna.exe 1160 bnikna.exe 2772 lyfvid.exe 3504 lyfvid.exe 4152 ylpkoh.exe 2168 ylpkoh.exe 512 lygiul.exe 1956 lygiul.exe 1708 yobddl.exe 3860 yobddl.exe 980 lbtaip.exe 2192 lbtaip.exe 4812 vjxyto.exe 4996 vjxyto.exe 3412 izsbbw.exe 2508 izsbbw.exe 4332 vjydeo.exe 1036 vjydeo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\trvzdh.exe jpypqe.exe File created C:\Windows\SysWOW64\cqemyn.exe pdmwsj.exe File created C:\Windows\SysWOW64\crbony.exe sswqdz.exe File created C:\Windows\SysWOW64\lusdlt.exe Process not Found File created C:\Windows\SysWOW64\wiaraa.exe uiouic.exe File created C:\Windows\SysWOW64\nuzjqm.exe xqromg.exe File created C:\Windows\SysWOW64\wggqlj.exe jhmncj.exe File created C:\Windows\SysWOW64\udovxy.exe hfutpp.exe File created C:\Windows\SysWOW64\culzfp.exe Process not Found File opened for modification C:\Windows\SysWOW64\qgjvaf.exe Process not Found File opened for modification C:\Windows\SysWOW64\guiuxm.exe 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ycwltz.exe lhmnnv.exe File created C:\Windows\SysWOW64\wulfbf.exe jhcpvb.exe File opened for modification C:\Windows\SysWOW64\lzotuh.exe Process not Found File created C:\Windows\SysWOW64\utdfdv.exe hvacnm.exe File created C:\Windows\SysWOW64\guiuxm.exe 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe File created C:\Windows\SysWOW64\qeowej.exe duiubj.exe File opened for modification C:\Windows\SysWOW64\kbzigc.exe zjkdtm.exe File created C:\Windows\SysWOW64\jzeffs.exe wmuhzo.exe File opened for modification C:\Windows\SysWOW64\goppwy.exe vpcjmz.exe File opened for modification C:\Windows\SysWOW64\adrjzp.exe sziodb.exe File created C:\Windows\SysWOW64\lbmdxf.exe xocnrc.exe File opened for modification C:\Windows\SysWOW64\ymvveq.exe oniylr.exe File created C:\Windows\SysWOW64\lpmugl.exe Process not Found File created C:\Windows\SysWOW64\fpwkdh.exe vudsvn.exe File created C:\Windows\SysWOW64\wzceov.exe jihcgn.exe File created C:\Windows\SysWOW64\fjmpgl.exe vjijom.exe File opened for modification C:\Windows\SysWOW64\kpyfxu.exe xcpprq.exe File created C:\Windows\SysWOW64\kyevve.exe xpxsse.exe File created C:\Windows\SysWOW64\letqnh.exe Process not Found File opened for modification C:\Windows\SysWOW64\xuokse.exe swjcml.exe File opened for modification C:\Windows\SysWOW64\hxqkxw.exe ugnhoo.exe File created C:\Windows\SysWOW64\siadjr.exe Process not Found File opened for modification C:\Windows\SysWOW64\kghdqg.exe wxbsnh.exe File created C:\Windows\SysWOW64\gmgcvk.exe trweph.exe File created C:\Windows\SysWOW64\iqsbnz.exe Process not Found File created C:\Windows\SysWOW64\dwpzhp.exe qbgjbl.exe File created C:\Windows\SysWOW64\hhbvfr.exe uujfan.exe File opened for modification C:\Windows\SysWOW64\oswfjs.exe Process not Found File opened for modification C:\Windows\SysWOW64\jhkarb.exe eutklx.exe File created C:\Windows\SysWOW64\bpymml.exe oydjdd.exe File opened for modification C:\Windows\SysWOW64\sgerfc.exe hkdyyi.exe File created C:\Windows\SysWOW64\iahgqc.exe vfqqky.exe File opened for modification C:\Windows\SysWOW64\xrnlyy.exe kevntu.exe File opened for modification C:\Windows\SysWOW64\zwdzoq.exe jwojvq.exe File opened for modification C:\Windows\SysWOW64\aiygva.exe Process not Found File created C:\Windows\SysWOW64\lskvjs.exe Process not Found File opened for modification C:\Windows\SysWOW64\asqzfq.exe nfgjzm.exe File created C:\Windows\SysWOW64\uacikh.exe pcxsxg.exe File opened for modification C:\Windows\SysWOW64\ooydbs.exe bbgovo.exe File opened for modification C:\Windows\SysWOW64\vmqrqn.exe ickonw.exe File created C:\Windows\SysWOW64\ixwjjb.exe vzbgat.exe File created C:\Windows\SysWOW64\xwbqct.exe kxgnul.exe File opened for modification C:\Windows\SysWOW64\bpugch.exe Process not Found File opened for modification C:\Windows\SysWOW64\xeewyu.exe uiedia.exe File opened for modification C:\Windows\SysWOW64\gjbizf.exe ttzfqx.exe File opened for modification C:\Windows\SysWOW64\aywyej.exe nhuvvb.exe File opened for modification C:\Windows\SysWOW64\dguulr.exe shqxas.exe File opened for modification C:\Windows\SysWOW64\uiwdbw.exe kmdttb.exe File opened for modification C:\Windows\SysWOW64\ryfdtn.exe Process not Found File created C:\Windows\SysWOW64\osbvvx.exe Process not Found File created C:\Windows\SysWOW64\xcmsuz.exe Process not Found File created C:\Windows\SysWOW64\jbjoxf.exe ygidhd.exe File created C:\Windows\SysWOW64\ppaeci.exe ccroxf.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 4940 set thread context of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4896 set thread context of 3044 4896 guiuxm.exe 85 PID 2748 set thread context of 1264 2748 amkxub.exe 87 PID 2588 set thread context of 4236 2588 leavzr.exe 89 PID 2364 set thread context of 1468 2364 lhmnnv.exe 91 PID 2424 set thread context of 1780 2424 ycwltz.exe 93 PID 1268 set thread context of 720 1268 lwctel.exe 95 PID 1968 set thread context of 4240 1968 ygidhd.exe 97 PID 2684 set thread context of 1932 2684 jbjoxf.exe 99 PID 2960 set thread context of 3344 2960 txcgfa.exe 101 PID 2124 set thread context of 4024 2124 gvfbna.exe 103 PID 876 set thread context of 1636 876 qvjgyz.exe 105 PID 4360 set thread context of 3864 4360 diawld.exe 107 PID 3252 set thread context of 1512 3252 odbgtx.exe 109 PID 4396 set thread context of 1788 4396 vhduci.exe 111 PID 1988 set thread context of 2132 1988 dacurx.exe 113 PID 336 set thread context of 4404 336 qzfwax.exe 117 PID 4372 set thread context of 2452 4372 dmpmfb.exe 119 PID 2524 set thread context of 3916 2524 qzgclf.exe 121 PID 1740 set thread context of 4440 1740 ydqpdq.exe 123 PID 368 set thread context of 2044 368 otcpkh.exe 126 PID 3068 set thread context of 400 3068 qvrzxd.exe 131 PID 3300 set thread context of 928 3300 dfxkac.exe 133 PID 4836 set thread context of 5048 4836 nekikb.exe 135 PID 2456 set thread context of 1160 2456 bnikna.exe 137 PID 2772 set thread context of 3504 2772 lyfvid.exe 139 PID 4152 set thread context of 2168 4152 ylpkoh.exe 141 PID 512 set thread context of 1956 512 lygiul.exe 143 PID 1708 set thread context of 3860 1708 yobddl.exe 145 PID 980 set thread context of 2192 980 lbtaip.exe 147 PID 4812 set thread context of 4996 4812 vjxyto.exe 149 PID 3412 set thread context of 2508 3412 izsbbw.exe 151 PID 4332 set thread context of 1036 4332 vjydeo.exe 153 PID 2152 set thread context of 3936 2152 izbgvw.exe 155 PID 784 set thread context of 2556 784 skqqiz.exe 158 PID 4860 set thread context of 3168 4860 gtwtly.exe 161 PID 2696 set thread context of 1620 2696 tkrwuz.exe 163 PID 1680 set thread context of 1064 1680 drvbex.exe 165 PID 1828 set thread context of 2288 1828 qhywvg.exe 167 PID 3300 set thread context of 4640 3300 duiubj.exe 169 PID 3804 set thread context of 1608 3804 qeowej.exe 171 PID 2304 set thread context of 4432 2304 durzmj.exe 173 PID 3580 set thread context of 2400 3580 nfgjzm.exe 175 PID 3152 set thread context of 4032 3152 asqzfq.exe 177 PID 4532 set thread context of 4088 4532 nfhplu.exe 179 PID 2264 set thread context of 5084 2264 xmlmdt.exe 181 PID 1004 set thread context of 3496 1004 kcopmt.exe 183 PID 3112 set thread context of 4680 3112 xpyfsx.exe 185 PID 4948 set thread context of 4312 4948 lzepvw.exe 190 PID 2272 set thread context of 2928 2272 vyqnfv.exe 193 PID 2888 set thread context of 3472 2888 ilaclz.exe 195 PID 3572 set thread context of 5056 3572 qtvdfo.exe 197 PID 2488 set thread context of 3876 2488 dofsls.exe 199 PID 2544 set thread context of 3560 2544 nnrqvr.exe 201 PID 4968 set thread context of 1200 4968 vfqqky.exe 203 PID 4976 set thread context of 5012 4976 iahgqc.exe 205 PID 2072 set thread context of 3420 2072 yitoxl.exe 207 PID 1280 set thread context of 544 1280 ncqbyh.exe 209 PID 4736 set thread context of 5068 4736 yufglx.exe 211 PID 3248 set thread context of 3556 3248 fctyxm.exe 213 PID 4104 set thread context of 1612 4104 vcqgyn.exe 215 PID 1564 set thread context of 4468 1564 fffruq.exe 217 PID 4572 set thread context of 2968 4572 qbgjbl.exe 219 PID 2536 set thread context of 4416 2536 dwpzhp.exe 221 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhfnas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ususgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jeneii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkrwuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvkank.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pyzjkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lefzte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajzsna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luwdgw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxujse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oniylr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ylpkoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yitoxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywfgmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbosrk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbsxvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibnmfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilmbte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xocnrc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skqqiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbemms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cjkocz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eutklx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crcbzy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztrham.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtoxam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrltzh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgznlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljpwsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kzixkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irxwyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szpjpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlyom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvgcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvobhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hucvub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whuwpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ylpkoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uiedia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctbglx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eetvcx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ybuzco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnwgqr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxfiil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eswgaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language izsbbw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nuzjqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrxhom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language giwaym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dguulr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 4940 wrote to memory of 3120 4940 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 83 PID 3120 wrote to memory of 4896 3120 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 84 PID 3120 wrote to memory of 4896 3120 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 84 PID 3120 wrote to memory of 4896 3120 98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe 84 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 4896 wrote to memory of 3044 4896 guiuxm.exe 85 PID 3044 wrote to memory of 2748 3044 guiuxm.exe 86 PID 3044 wrote to memory of 2748 3044 guiuxm.exe 86 PID 3044 wrote to memory of 2748 3044 guiuxm.exe 86 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 2748 wrote to memory of 1264 2748 amkxub.exe 87 PID 1264 wrote to memory of 2588 1264 amkxub.exe 88 PID 1264 wrote to memory of 2588 1264 amkxub.exe 88 PID 1264 wrote to memory of 2588 1264 amkxub.exe 88 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 2588 wrote to memory of 4236 2588 leavzr.exe 89 PID 4236 wrote to memory of 2364 4236 leavzr.exe 90 PID 4236 wrote to memory of 2364 4236 leavzr.exe 90 PID 4236 wrote to memory of 2364 4236 leavzr.exe 90 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 2364 wrote to memory of 1468 2364 lhmnnv.exe 91 PID 1468 wrote to memory of 2424 1468 lhmnnv.exe 92 PID 1468 wrote to memory of 2424 1468 lhmnnv.exe 92 PID 1468 wrote to memory of 2424 1468 lhmnnv.exe 92 PID 2424 wrote to memory of 1780 2424 ycwltz.exe 93 PID 2424 wrote to memory of 1780 2424 ycwltz.exe 93 PID 2424 wrote to memory of 1780 2424 ycwltz.exe 93 PID 2424 wrote to memory of 1780 2424 ycwltz.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\guiuxm.exeC:\Windows\system32\guiuxm.exe 1000 "C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\guiuxm.exeC:\Windows\system32\guiuxm.exe 1000 "C:\Users\Admin\AppData\Local\Temp\98eb26bec28f35187e31b850d656341d_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\amkxub.exeC:\Windows\system32\amkxub.exe 992 "C:\Windows\SysWOW64\guiuxm.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\amkxub.exeC:\Windows\system32\amkxub.exe 992 "C:\Windows\SysWOW64\guiuxm.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\leavzr.exeC:\Windows\system32\leavzr.exe 1120 "C:\Windows\SysWOW64\amkxub.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\leavzr.exeC:\Windows\system32\leavzr.exe 1120 "C:\Windows\SysWOW64\amkxub.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\lhmnnv.exeC:\Windows\system32\lhmnnv.exe 992 "C:\Windows\SysWOW64\leavzr.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\lhmnnv.exeC:\Windows\system32\lhmnnv.exe 992 "C:\Windows\SysWOW64\leavzr.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\ycwltz.exeC:\Windows\system32\ycwltz.exe 1120 "C:\Windows\SysWOW64\lhmnnv.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\ycwltz.exeC:\Windows\system32\ycwltz.exe 1120 "C:\Windows\SysWOW64\lhmnnv.exe"12⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\lwctel.exeC:\Windows\system32\lwctel.exe 1120 "C:\Windows\SysWOW64\ycwltz.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1268 -
C:\Windows\SysWOW64\lwctel.exeC:\Windows\system32\lwctel.exe 1120 "C:\Windows\SysWOW64\ycwltz.exe"14⤵
- Executes dropped EXE
PID:720 -
C:\Windows\SysWOW64\ygidhd.exeC:\Windows\system32\ygidhd.exe 1120 "C:\Windows\SysWOW64\lwctel.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1968 -
C:\Windows\SysWOW64\ygidhd.exeC:\Windows\system32\ygidhd.exe 1120 "C:\Windows\SysWOW64\lwctel.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4240 -
C:\Windows\SysWOW64\jbjoxf.exeC:\Windows\system32\jbjoxf.exe 1120 "C:\Windows\SysWOW64\ygidhd.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2684 -
C:\Windows\SysWOW64\jbjoxf.exeC:\Windows\system32\jbjoxf.exe 1120 "C:\Windows\SysWOW64\ygidhd.exe"18⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\txcgfa.exeC:\Windows\system32\txcgfa.exe 1120 "C:\Windows\SysWOW64\jbjoxf.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2960 -
C:\Windows\SysWOW64\txcgfa.exeC:\Windows\system32\txcgfa.exe 1120 "C:\Windows\SysWOW64\jbjoxf.exe"20⤵
- Executes dropped EXE
PID:3344 -
C:\Windows\SysWOW64\gvfbna.exeC:\Windows\system32\gvfbna.exe 1120 "C:\Windows\SysWOW64\txcgfa.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2124 -
C:\Windows\SysWOW64\gvfbna.exeC:\Windows\system32\gvfbna.exe 1120 "C:\Windows\SysWOW64\txcgfa.exe"22⤵
- Executes dropped EXE
PID:4024 -
C:\Windows\SysWOW64\qvjgyz.exeC:\Windows\system32\qvjgyz.exe 1120 "C:\Windows\SysWOW64\gvfbna.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:876 -
C:\Windows\SysWOW64\qvjgyz.exeC:\Windows\system32\qvjgyz.exe 1120 "C:\Windows\SysWOW64\gvfbna.exe"24⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\diawld.exeC:\Windows\system32\diawld.exe 1120 "C:\Windows\SysWOW64\qvjgyz.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4360 -
C:\Windows\SysWOW64\diawld.exeC:\Windows\system32\diawld.exe 1120 "C:\Windows\SysWOW64\qvjgyz.exe"26⤵
- Executes dropped EXE
PID:3864 -
C:\Windows\SysWOW64\odbgtx.exeC:\Windows\system32\odbgtx.exe 1120 "C:\Windows\SysWOW64\diawld.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3252 -
C:\Windows\SysWOW64\odbgtx.exeC:\Windows\system32\odbgtx.exe 1120 "C:\Windows\SysWOW64\diawld.exe"28⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\vhduci.exeC:\Windows\system32\vhduci.exe 1120 "C:\Windows\SysWOW64\odbgtx.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4396 -
C:\Windows\SysWOW64\vhduci.exeC:\Windows\system32\vhduci.exe 1120 "C:\Windows\SysWOW64\odbgtx.exe"30⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\dacurx.exeC:\Windows\system32\dacurx.exe 1120 "C:\Windows\SysWOW64\vhduci.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1988 -
C:\Windows\SysWOW64\dacurx.exeC:\Windows\system32\dacurx.exe 1120 "C:\Windows\SysWOW64\vhduci.exe"32⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\qzfwax.exeC:\Windows\system32\qzfwax.exe 1120 "C:\Windows\SysWOW64\dacurx.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:336 -
C:\Windows\SysWOW64\qzfwax.exeC:\Windows\system32\qzfwax.exe 1120 "C:\Windows\SysWOW64\dacurx.exe"34⤵
- Executes dropped EXE
PID:4404 -
C:\Windows\SysWOW64\dmpmfb.exeC:\Windows\system32\dmpmfb.exe 1120 "C:\Windows\SysWOW64\qzfwax.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4372 -
C:\Windows\SysWOW64\dmpmfb.exeC:\Windows\system32\dmpmfb.exe 1120 "C:\Windows\SysWOW64\qzfwax.exe"36⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\qzgclf.exeC:\Windows\system32\qzgclf.exe 1120 "C:\Windows\SysWOW64\dmpmfb.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2524 -
C:\Windows\SysWOW64\qzgclf.exeC:\Windows\system32\qzgclf.exe 1120 "C:\Windows\SysWOW64\dmpmfb.exe"38⤵
- Executes dropped EXE
PID:3916 -
C:\Windows\SysWOW64\ydqpdq.exeC:\Windows\system32\ydqpdq.exe 1116 "C:\Windows\SysWOW64\qzgclf.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1740 -
C:\Windows\SysWOW64\ydqpdq.exeC:\Windows\system32\ydqpdq.exe 1116 "C:\Windows\SysWOW64\qzgclf.exe"40⤵
- Executes dropped EXE
PID:4440 -
C:\Windows\SysWOW64\otcpkh.exeC:\Windows\system32\otcpkh.exe 1120 "C:\Windows\SysWOW64\ydqpdq.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:368 -
C:\Windows\SysWOW64\otcpkh.exeC:\Windows\system32\otcpkh.exe 1120 "C:\Windows\SysWOW64\ydqpdq.exe"42⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\qvrzxd.exeC:\Windows\system32\qvrzxd.exe 1120 "C:\Windows\SysWOW64\otcpkh.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3068 -
C:\Windows\SysWOW64\qvrzxd.exeC:\Windows\system32\qvrzxd.exe 1120 "C:\Windows\SysWOW64\otcpkh.exe"44⤵
- Executes dropped EXE
PID:400 -
C:\Windows\SysWOW64\dfxkac.exeC:\Windows\system32\dfxkac.exe 1120 "C:\Windows\SysWOW64\qvrzxd.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3300 -
C:\Windows\SysWOW64\dfxkac.exeC:\Windows\system32\dfxkac.exe 1120 "C:\Windows\SysWOW64\qvrzxd.exe"46⤵
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\nekikb.exeC:\Windows\system32\nekikb.exe 1120 "C:\Windows\SysWOW64\dfxkac.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4836 -
C:\Windows\SysWOW64\nekikb.exeC:\Windows\system32\nekikb.exe 1120 "C:\Windows\SysWOW64\dfxkac.exe"48⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\SysWOW64\bnikna.exeC:\Windows\system32\bnikna.exe 1112 "C:\Windows\SysWOW64\nekikb.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2456 -
C:\Windows\SysWOW64\bnikna.exeC:\Windows\system32\bnikna.exe 1112 "C:\Windows\SysWOW64\nekikb.exe"50⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\lyfvid.exeC:\Windows\system32\lyfvid.exe 1124 "C:\Windows\SysWOW64\bnikna.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2772 -
C:\Windows\SysWOW64\lyfvid.exeC:\Windows\system32\lyfvid.exe 1124 "C:\Windows\SysWOW64\bnikna.exe"52⤵
- Executes dropped EXE
PID:3504 -
C:\Windows\SysWOW64\ylpkoh.exeC:\Windows\system32\ylpkoh.exe 1120 "C:\Windows\SysWOW64\lyfvid.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4152 -
C:\Windows\SysWOW64\ylpkoh.exeC:\Windows\system32\ylpkoh.exe 1120 "C:\Windows\SysWOW64\lyfvid.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\lygiul.exeC:\Windows\system32\lygiul.exe 1124 "C:\Windows\SysWOW64\ylpkoh.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:512 -
C:\Windows\SysWOW64\lygiul.exeC:\Windows\system32\lygiul.exe 1124 "C:\Windows\SysWOW64\ylpkoh.exe"56⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\yobddl.exeC:\Windows\system32\yobddl.exe 1120 "C:\Windows\SysWOW64\lygiul.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1708 -
C:\Windows\SysWOW64\yobddl.exeC:\Windows\system32\yobddl.exe 1120 "C:\Windows\SysWOW64\lygiul.exe"58⤵
- Executes dropped EXE
PID:3860 -
C:\Windows\SysWOW64\lbtaip.exeC:\Windows\system32\lbtaip.exe 1120 "C:\Windows\SysWOW64\yobddl.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:980 -
C:\Windows\SysWOW64\lbtaip.exeC:\Windows\system32\lbtaip.exe 1120 "C:\Windows\SysWOW64\yobddl.exe"60⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\vjxyto.exeC:\Windows\system32\vjxyto.exe 1120 "C:\Windows\SysWOW64\lbtaip.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4812 -
C:\Windows\SysWOW64\vjxyto.exeC:\Windows\system32\vjxyto.exe 1120 "C:\Windows\SysWOW64\lbtaip.exe"62⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SysWOW64\izsbbw.exeC:\Windows\system32\izsbbw.exe 1120 "C:\Windows\SysWOW64\vjxyto.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3412 -
C:\Windows\SysWOW64\izsbbw.exeC:\Windows\system32\izsbbw.exe 1120 "C:\Windows\SysWOW64\vjxyto.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Windows\SysWOW64\vjydeo.exeC:\Windows\system32\vjydeo.exe 1120 "C:\Windows\SysWOW64\izsbbw.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4332 -
C:\Windows\SysWOW64\vjydeo.exeC:\Windows\system32\vjydeo.exe 1120 "C:\Windows\SysWOW64\izsbbw.exe"66⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\izbgvw.exeC:\Windows\system32\izbgvw.exe 1120 "C:\Windows\SysWOW64\vjydeo.exe"67⤵
- Suspicious use of SetThreadContext
PID:2152 -
C:\Windows\SysWOW64\izbgvw.exeC:\Windows\system32\izbgvw.exe 1120 "C:\Windows\SysWOW64\vjydeo.exe"68⤵PID:3936
-
C:\Windows\SysWOW64\skqqiz.exeC:\Windows\system32\skqqiz.exe 1116 "C:\Windows\SysWOW64\izbgvw.exe"69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:784 -
C:\Windows\SysWOW64\skqqiz.exeC:\Windows\system32\skqqiz.exe 1116 "C:\Windows\SysWOW64\izbgvw.exe"70⤵PID:2556
-
C:\Windows\SysWOW64\gtwtly.exeC:\Windows\system32\gtwtly.exe 1120 "C:\Windows\SysWOW64\skqqiz.exe"71⤵
- Suspicious use of SetThreadContext
PID:4860 -
C:\Windows\SysWOW64\gtwtly.exeC:\Windows\system32\gtwtly.exe 1120 "C:\Windows\SysWOW64\skqqiz.exe"72⤵PID:3168
-
C:\Windows\SysWOW64\tkrwuz.exeC:\Windows\system32\tkrwuz.exe 1120 "C:\Windows\SysWOW64\gtwtly.exe"73⤵
- Suspicious use of SetThreadContext
PID:2696 -
C:\Windows\SysWOW64\tkrwuz.exeC:\Windows\system32\tkrwuz.exe 1120 "C:\Windows\SysWOW64\gtwtly.exe"74⤵
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\drvbex.exeC:\Windows\system32\drvbex.exe 1120 "C:\Windows\SysWOW64\tkrwuz.exe"75⤵
- Suspicious use of SetThreadContext
PID:1680 -
C:\Windows\SysWOW64\drvbex.exeC:\Windows\system32\drvbex.exe 1120 "C:\Windows\SysWOW64\tkrwuz.exe"76⤵PID:1064
-
C:\Windows\SysWOW64\qhywvg.exeC:\Windows\system32\qhywvg.exe 1120 "C:\Windows\SysWOW64\drvbex.exe"77⤵
- Suspicious use of SetThreadContext
PID:1828 -
C:\Windows\SysWOW64\qhywvg.exeC:\Windows\system32\qhywvg.exe 1120 "C:\Windows\SysWOW64\drvbex.exe"78⤵PID:2288
-
C:\Windows\SysWOW64\duiubj.exeC:\Windows\system32\duiubj.exe 1120 "C:\Windows\SysWOW64\qhywvg.exe"79⤵
- Suspicious use of SetThreadContext
PID:3300 -
C:\Windows\SysWOW64\duiubj.exeC:\Windows\system32\duiubj.exe 1120 "C:\Windows\SysWOW64\qhywvg.exe"80⤵
- Drops file in System32 directory
PID:4640 -
C:\Windows\SysWOW64\qeowej.exeC:\Windows\system32\qeowej.exe 1120 "C:\Windows\SysWOW64\duiubj.exe"81⤵
- Suspicious use of SetThreadContext
PID:3804 -
C:\Windows\SysWOW64\qeowej.exeC:\Windows\system32\qeowej.exe 1120 "C:\Windows\SysWOW64\duiubj.exe"82⤵PID:1608
-
C:\Windows\SysWOW64\durzmj.exeC:\Windows\system32\durzmj.exe 1124 "C:\Windows\SysWOW64\qeowej.exe"83⤵
- Suspicious use of SetThreadContext
PID:2304 -
C:\Windows\SysWOW64\durzmj.exeC:\Windows\system32\durzmj.exe 1124 "C:\Windows\SysWOW64\qeowej.exe"84⤵PID:4432
-
C:\Windows\SysWOW64\nfgjzm.exeC:\Windows\system32\nfgjzm.exe 1120 "C:\Windows\SysWOW64\durzmj.exe"85⤵
- Suspicious use of SetThreadContext
PID:3580 -
C:\Windows\SysWOW64\nfgjzm.exeC:\Windows\system32\nfgjzm.exe 1120 "C:\Windows\SysWOW64\durzmj.exe"86⤵
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\asqzfq.exeC:\Windows\system32\asqzfq.exe 1120 "C:\Windows\SysWOW64\nfgjzm.exe"87⤵
- Suspicious use of SetThreadContext
PID:3152 -
C:\Windows\SysWOW64\asqzfq.exeC:\Windows\system32\asqzfq.exe 1120 "C:\Windows\SysWOW64\nfgjzm.exe"88⤵PID:4032
-
C:\Windows\SysWOW64\nfhplu.exeC:\Windows\system32\nfhplu.exe 1120 "C:\Windows\SysWOW64\asqzfq.exe"89⤵
- Suspicious use of SetThreadContext
PID:4532 -
C:\Windows\SysWOW64\nfhplu.exeC:\Windows\system32\nfhplu.exe 1120 "C:\Windows\SysWOW64\asqzfq.exe"90⤵PID:4088
-
C:\Windows\SysWOW64\xmlmdt.exeC:\Windows\system32\xmlmdt.exe 1120 "C:\Windows\SysWOW64\nfhplu.exe"91⤵
- Suspicious use of SetThreadContext
PID:2264 -
C:\Windows\SysWOW64\xmlmdt.exeC:\Windows\system32\xmlmdt.exe 1120 "C:\Windows\SysWOW64\nfhplu.exe"92⤵PID:5084
-
C:\Windows\SysWOW64\kcopmt.exeC:\Windows\system32\kcopmt.exe 1120 "C:\Windows\SysWOW64\xmlmdt.exe"93⤵
- Suspicious use of SetThreadContext
PID:1004 -
C:\Windows\SysWOW64\kcopmt.exeC:\Windows\system32\kcopmt.exe 1120 "C:\Windows\SysWOW64\xmlmdt.exe"94⤵PID:3496
-
C:\Windows\SysWOW64\xpyfsx.exeC:\Windows\system32\xpyfsx.exe 1120 "C:\Windows\SysWOW64\kcopmt.exe"95⤵
- Suspicious use of SetThreadContext
PID:3112 -
C:\Windows\SysWOW64\xpyfsx.exeC:\Windows\system32\xpyfsx.exe 1120 "C:\Windows\SysWOW64\kcopmt.exe"96⤵PID:4680
-
C:\Windows\SysWOW64\lzepvw.exeC:\Windows\system32\lzepvw.exe 1120 "C:\Windows\SysWOW64\xpyfsx.exe"97⤵
- Suspicious use of SetThreadContext
PID:4948 -
C:\Windows\SysWOW64\lzepvw.exeC:\Windows\system32\lzepvw.exe 1120 "C:\Windows\SysWOW64\xpyfsx.exe"98⤵PID:4312
-
C:\Windows\SysWOW64\vyqnfv.exeC:\Windows\system32\vyqnfv.exe 1120 "C:\Windows\SysWOW64\lzepvw.exe"99⤵
- Suspicious use of SetThreadContext
PID:2272 -
C:\Windows\SysWOW64\vyqnfv.exeC:\Windows\system32\vyqnfv.exe 1120 "C:\Windows\SysWOW64\lzepvw.exe"100⤵PID:2928
-
C:\Windows\SysWOW64\ilaclz.exeC:\Windows\system32\ilaclz.exe 1120 "C:\Windows\SysWOW64\vyqnfv.exe"101⤵
- Suspicious use of SetThreadContext
PID:2888 -
C:\Windows\SysWOW64\ilaclz.exeC:\Windows\system32\ilaclz.exe 1120 "C:\Windows\SysWOW64\vyqnfv.exe"102⤵PID:3472
-
C:\Windows\SysWOW64\qtvdfo.exeC:\Windows\system32\qtvdfo.exe 1156 "C:\Windows\SysWOW64\ilaclz.exe"103⤵
- Suspicious use of SetThreadContext
PID:3572 -
C:\Windows\SysWOW64\qtvdfo.exeC:\Windows\system32\qtvdfo.exe 1156 "C:\Windows\SysWOW64\ilaclz.exe"104⤵PID:5056
-
C:\Windows\SysWOW64\dofsls.exeC:\Windows\system32\dofsls.exe 1120 "C:\Windows\SysWOW64\qtvdfo.exe"105⤵
- Suspicious use of SetThreadContext
PID:2488 -
C:\Windows\SysWOW64\dofsls.exeC:\Windows\system32\dofsls.exe 1120 "C:\Windows\SysWOW64\qtvdfo.exe"106⤵PID:3876
-
C:\Windows\SysWOW64\nnrqvr.exeC:\Windows\system32\nnrqvr.exe 1012 "C:\Windows\SysWOW64\dofsls.exe"107⤵
- Suspicious use of SetThreadContext
PID:2544 -
C:\Windows\SysWOW64\nnrqvr.exeC:\Windows\system32\nnrqvr.exe 1012 "C:\Windows\SysWOW64\dofsls.exe"108⤵PID:3560
-
C:\Windows\SysWOW64\vfqqky.exeC:\Windows\system32\vfqqky.exe 1120 "C:\Windows\SysWOW64\nnrqvr.exe"109⤵
- Suspicious use of SetThreadContext
PID:4968 -
C:\Windows\SysWOW64\vfqqky.exeC:\Windows\system32\vfqqky.exe 1120 "C:\Windows\SysWOW64\nnrqvr.exe"110⤵
- Drops file in System32 directory
PID:1200 -
C:\Windows\SysWOW64\iahgqc.exeC:\Windows\system32\iahgqc.exe 988 "C:\Windows\SysWOW64\vfqqky.exe"111⤵
- Suspicious use of SetThreadContext
PID:4976 -
C:\Windows\SysWOW64\iahgqc.exeC:\Windows\system32\iahgqc.exe 988 "C:\Windows\SysWOW64\vfqqky.exe"112⤵PID:5012
-
C:\Windows\SysWOW64\yitoxl.exeC:\Windows\system32\yitoxl.exe 1020 "C:\Windows\SysWOW64\iahgqc.exe"113⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\yitoxl.exeC:\Windows\system32\yitoxl.exe 1020 "C:\Windows\SysWOW64\iahgqc.exe"114⤵PID:3420
-
C:\Windows\SysWOW64\ncqbyh.exeC:\Windows\system32\ncqbyh.exe 992 "C:\Windows\SysWOW64\yitoxl.exe"115⤵
- Suspicious use of SetThreadContext
PID:1280 -
C:\Windows\SysWOW64\ncqbyh.exeC:\Windows\system32\ncqbyh.exe 992 "C:\Windows\SysWOW64\yitoxl.exe"116⤵PID:544
-
C:\Windows\SysWOW64\yufglx.exeC:\Windows\system32\yufglx.exe 1120 "C:\Windows\SysWOW64\ncqbyh.exe"117⤵
- Suspicious use of SetThreadContext
PID:4736 -
C:\Windows\SysWOW64\yufglx.exeC:\Windows\system32\yufglx.exe 1120 "C:\Windows\SysWOW64\ncqbyh.exe"118⤵PID:5068
-
C:\Windows\SysWOW64\fctyxm.exeC:\Windows\system32\fctyxm.exe 1012 "C:\Windows\SysWOW64\yufglx.exe"119⤵
- Suspicious use of SetThreadContext
PID:3248 -
C:\Windows\SysWOW64\fctyxm.exeC:\Windows\system32\fctyxm.exe 1012 "C:\Windows\SysWOW64\yufglx.exe"120⤵PID:3556
-
C:\Windows\SysWOW64\vcqgyn.exeC:\Windows\system32\vcqgyn.exe 1120 "C:\Windows\SysWOW64\fctyxm.exe"121⤵
- Suspicious use of SetThreadContext
PID:4104 -
C:\Windows\SysWOW64\vcqgyn.exeC:\Windows\system32\vcqgyn.exe 1120 "C:\Windows\SysWOW64\fctyxm.exe"122⤵PID:1612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-