Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe
-
Size
188KB
-
MD5
9a0e6645f3ceb7d70a8627bce6838a25
-
SHA1
43d76e08a412b2cef915cd5f0630f8aba7576f33
-
SHA256
d23d9c5dc49cdcf7a13416b35de4f691ff0d77c7b3dcdc661680972623721a07
-
SHA512
4866105fa5de239570243aecc326cab4317b2c2340fa58a1126d77361a2f2a7f695f46adf2c99143ed27ff3d91be941df247d8bfbc927a04a196bba27d251beb
-
SSDEEP
3072:9RgaAb3zidY/5HhbPKRgMR2tr4QPxC2ig81zhR5jShWyIZhsS91IZps8TA4AvFOw:pAb4CbPwgMshRxhTWzr5xywhsS9eU8k3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 904 mitbu.exe 2244 mitbu.exe 2788 xrvry.exe 2812 xrvry.exe 2604 zuwrn.exe 2248 zuwrn.exe 2364 yuezs.exe 1840 yuezs.exe 1544 fjqpx.exe 1676 fjqpx.exe 1720 otepe.exe 2916 otepe.exe 2100 xpdcn.exe 2700 xpdcn.exe 660 bnedp.exe 2220 bnedp.exe 956 hrmla.exe 2136 hrmla.exe 896 rbalg.exe 768 rbalg.exe 684 xuxop.exe 2492 xuxop.exe 1864 ejreu.exe 1640 ejreu.exe 2084 lvagx.exe 2228 lvagx.exe 764 ufohv.exe 2132 ufohv.exe 3000 dancf.exe 2620 dancf.exe 2676 nhqpi.exe 2772 nhqpi.exe 1120 zxrus.exe 2268 zxrus.exe 1964 aethw.exe 1028 aethw.exe 1684 mnyvt.exe 1832 mnyvt.exe 1404 yaofa.exe 2260 yaofa.exe 1608 kfdxa.exe 3012 kfdxa.exe 2168 txrgg.exe 1788 txrgg.exe 1276 aqoao.exe 1692 aqoao.exe 612 jxzws.exe 1768 jxzws.exe 2468 qmllx.exe 1428 qmllx.exe 1520 zhkzh.exe 2516 zhkzh.exe 1876 ivjmq.exe 2000 ivjmq.exe 2536 mblek.exe 2792 mblek.exe 2340 ycpkp.exe 2816 ycpkp.exe 2740 hbrkb.exe 2240 hbrkb.exe 1740 tlwpx.exe 908 tlwpx.exe 940 ipcnd.exe 1896 ipcnd.exe -
Loads dropped DLL 64 IoCs
pid Process 2684 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 2684 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 904 mitbu.exe 2244 mitbu.exe 2244 mitbu.exe 2812 xrvry.exe 2812 xrvry.exe 2248 zuwrn.exe 2248 zuwrn.exe 1840 yuezs.exe 1840 yuezs.exe 1676 fjqpx.exe 1676 fjqpx.exe 2916 otepe.exe 2916 otepe.exe 2700 xpdcn.exe 2700 xpdcn.exe 2220 bnedp.exe 2220 bnedp.exe 2136 hrmla.exe 2136 hrmla.exe 768 rbalg.exe 768 rbalg.exe 2492 xuxop.exe 2492 xuxop.exe 1640 ejreu.exe 1640 ejreu.exe 2228 lvagx.exe 2228 lvagx.exe 2132 ufohv.exe 2132 ufohv.exe 2620 dancf.exe 2620 dancf.exe 2772 nhqpi.exe 2772 nhqpi.exe 2268 zxrus.exe 2268 zxrus.exe 1028 aethw.exe 1028 aethw.exe 1832 mnyvt.exe 1832 mnyvt.exe 2260 yaofa.exe 2260 yaofa.exe 3012 kfdxa.exe 3012 kfdxa.exe 1788 txrgg.exe 1788 txrgg.exe 1692 aqoao.exe 1692 aqoao.exe 1768 jxzws.exe 1768 jxzws.exe 1428 qmllx.exe 1428 qmllx.exe 2516 zhkzh.exe 2516 zhkzh.exe 2000 ivjmq.exe 2000 ivjmq.exe 2792 mblek.exe 2792 mblek.exe 2816 ycpkp.exe 2816 ycpkp.exe 2240 hbrkb.exe 2240 hbrkb.exe 908 tlwpx.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hbrkb.exe ycpkp.exe File opened for modification C:\Windows\SysWOW64\pfpbu.exe jnsyl.exe File created C:\Windows\SysWOW64\gnscm.exe rqjem.exe File created C:\Windows\SysWOW64\nhqpi.exe dancf.exe File opened for modification C:\Windows\SysWOW64\qclpl.exe bebrt.exe File opened for modification C:\Windows\SysWOW64\mdsno.exe foyxj.exe File created C:\Windows\SysWOW64\uuiyf.exe jpsoy.exe File opened for modification C:\Windows\SysWOW64\xpuzd.exe ilnbg.exe File opened for modification C:\Windows\SysWOW64\hwzsi.exe apfcd.exe File created C:\Windows\SysWOW64\fjqpx.exe yuezs.exe File opened for modification C:\Windows\SysWOW64\aqoao.exe txrgg.exe File created C:\Windows\SysWOW64\dwdld.exe ruzfg.exe File created C:\Windows\SysWOW64\kctua.exe ytood.exe File opened for modification C:\Windows\SysWOW64\wcnaq.exe saiul.exe File created C:\Windows\SysWOW64\iycxp.exe yoppi.exe File created C:\Windows\SysWOW64\duntl.exe uflyh.exe File created C:\Windows\SysWOW64\zxrus.exe nhqpi.exe File created C:\Windows\SysWOW64\yaofa.exe mnyvt.exe File opened for modification C:\Windows\SysWOW64\vpdyx.exe owxdp.exe File opened for modification C:\Windows\SysWOW64\iycxp.exe yoppi.exe File opened for modification C:\Windows\SysWOW64\cyquq.exe toums.exe File opened for modification C:\Windows\SysWOW64\cvwjg.exe qxuje.exe File opened for modification C:\Windows\SysWOW64\maanl.exe duysi.exe File opened for modification C:\Windows\SysWOW64\mddhg.exe lqeux.exe File created C:\Windows\SysWOW64\duysi.exe rktml.exe File opened for modification C:\Windows\SysWOW64\fgnab.exe vwaav.exe File created C:\Windows\SysWOW64\kvzxg.exe dcccx.exe File created C:\Windows\SysWOW64\xpdcn.exe otepe.exe File opened for modification C:\Windows\SysWOW64\hjgsi.exe grlsb.exe File created C:\Windows\SysWOW64\xuxop.exe rbalg.exe File created C:\Windows\SysWOW64\ejreu.exe xuxop.exe File opened for modification C:\Windows\SysWOW64\ejreu.exe xuxop.exe File created C:\Windows\SysWOW64\ankfj.exe rdofc.exe File opened for modification C:\Windows\SysWOW64\kvzxg.exe dcccx.exe File created C:\Windows\SysWOW64\gqbuq.exe aperi.exe File created C:\Windows\SysWOW64\mitbu.exe 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bnedp.exe xpdcn.exe File created C:\Windows\SysWOW64\tbktq.exe knkgh.exe File created C:\Windows\SysWOW64\rtuao.exe hjgsi.exe File created C:\Windows\SysWOW64\rqphs.exe kqkek.exe File opened for modification C:\Windows\SysWOW64\aethw.exe zxrus.exe File created C:\Windows\SysWOW64\ucsfc.exe ipcnd.exe File opened for modification C:\Windows\SysWOW64\kqkek.exe eucwz.exe File created C:\Windows\SysWOW64\ficcn.exe ankfj.exe File opened for modification C:\Windows\SysWOW64\icjjl.exe xpuzd.exe File created C:\Windows\SysWOW64\ctxbw.exe tbktq.exe File created C:\Windows\SysWOW64\tiqbx.exe mhvrc.exe File created C:\Windows\SysWOW64\vuoui.exe jljpd.exe File created C:\Windows\SysWOW64\saiul.exe gnscm.exe File created C:\Windows\SysWOW64\ewfts.exe vpdyx.exe File created C:\Windows\SysWOW64\ipcnd.exe tlwpx.exe File created C:\Windows\SysWOW64\cvwjg.exe qxuje.exe File created C:\Windows\SysWOW64\yuezs.exe zuwrn.exe File created C:\Windows\SysWOW64\dyzwi.exe uzxww.exe File created C:\Windows\SysWOW64\pfcfw.exe dsump.exe File opened for modification C:\Windows\SysWOW64\mblek.exe ivjmq.exe File created C:\Windows\SysWOW64\zbzbz.exe kepvz.exe File created C:\Windows\SysWOW64\ivjmq.exe zhkzh.exe File opened for modification C:\Windows\SysWOW64\szavz.exe mdsno.exe File opened for modification C:\Windows\SysWOW64\jnsyl.exe whygk.exe File created C:\Windows\SysWOW64\pimbe.exe dyzwi.exe File opened for modification C:\Windows\SysWOW64\xuxop.exe rbalg.exe File opened for modification C:\Windows\SysWOW64\zxrus.exe nhqpi.exe File created C:\Windows\SysWOW64\ahszb.exe ognte.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1872 set thread context of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 904 set thread context of 2244 904 mitbu.exe 32 PID 2788 set thread context of 2812 2788 xrvry.exe 35 PID 2604 set thread context of 2248 2604 zuwrn.exe 37 PID 2364 set thread context of 1840 2364 yuezs.exe 39 PID 1544 set thread context of 1676 1544 fjqpx.exe 41 PID 1720 set thread context of 2916 1720 otepe.exe 43 PID 2100 set thread context of 2700 2100 xpdcn.exe 45 PID 660 set thread context of 2220 660 bnedp.exe 47 PID 956 set thread context of 2136 956 hrmla.exe 49 PID 896 set thread context of 768 896 rbalg.exe 51 PID 684 set thread context of 2492 684 xuxop.exe 53 PID 1864 set thread context of 1640 1864 ejreu.exe 55 PID 2084 set thread context of 2228 2084 lvagx.exe 57 PID 764 set thread context of 2132 764 ufohv.exe 59 PID 3000 set thread context of 2620 3000 dancf.exe 61 PID 2676 set thread context of 2772 2676 nhqpi.exe 63 PID 1120 set thread context of 2268 1120 zxrus.exe 65 PID 1964 set thread context of 1028 1964 aethw.exe 67 PID 1684 set thread context of 1832 1684 mnyvt.exe 69 PID 1404 set thread context of 2260 1404 yaofa.exe 71 PID 1608 set thread context of 3012 1608 kfdxa.exe 73 PID 2168 set thread context of 1788 2168 txrgg.exe 75 PID 1276 set thread context of 1692 1276 aqoao.exe 77 PID 612 set thread context of 1768 612 jxzws.exe 79 PID 2468 set thread context of 1428 2468 qmllx.exe 81 PID 1520 set thread context of 2516 1520 zhkzh.exe 83 PID 1876 set thread context of 2000 1876 ivjmq.exe 85 PID 2536 set thread context of 2792 2536 mblek.exe 87 PID 2340 set thread context of 2816 2340 ycpkp.exe 89 PID 2740 set thread context of 2240 2740 hbrkb.exe 91 PID 1740 set thread context of 908 1740 tlwpx.exe 93 PID 940 set thread context of 1896 940 ipcnd.exe 95 PID 1892 set thread context of 2668 1892 ucsfc.exe 97 PID 2940 set thread context of 632 2940 djvag.exe 99 PID 3028 set thread context of 2108 3028 pkhgl.exe 101 PID 1184 set thread context of 2380 1184 wpqnw.exe 103 PID 1452 set thread context of 580 1452 lealo.exe 105 PID 2288 set thread context of 684 2288 mwotu.exe 107 PID 2148 set thread context of 2256 2148 qxuje.exe 109 PID 836 set thread context of 2528 836 cvwjg.exe 111 PID 2540 set thread context of 2744 2540 joteo.exe 113 PID 2748 set thread context of 2712 2748 phqhx.exe 115 PID 2656 set thread context of 2596 2656 tetse.exe 117 PID 272 set thread context of 1344 272 foyxj.exe 119 PID 1188 set thread context of 1016 1188 mdsno.exe 121 PID 940 set thread context of 1672 940 szavz.exe 123 PID 1892 set thread context of 2856 1892 cgdqd.exe 125 PID 2216 set thread context of 572 2216 yhrnn.exe 127 PID 1664 set thread context of 112 1664 knkgh.exe 129 PID 1916 set thread context of 2308 1916 tbktq.exe 131 PID 2372 set thread context of 992 2372 ctxbw.exe 133 PID 1584 set thread context of 980 1584 ognte.exe 135 PID 1500 set thread context of 2416 1500 ahszb.exe 137 PID 2504 set thread context of 2680 2504 efvjq.exe 139 PID 2836 set thread context of 2752 2836 qoapm.exe 141 PID 2892 set thread context of 2804 2892 xhxsv.exe 143 PID 2844 set thread context of 2336 2844 grlsb.exe 145 PID 1496 set thread context of 1936 1496 hjgsi.exe 147 PID 1680 set thread context of 2064 1680 rtuao.exe 149 PID 1920 set thread context of 1236 1920 aaxnk.exe 151 PID 2232 set thread context of 1444 2232 mnngr.exe 153 PID 1480 set thread context of 1708 1480 sjvnc.exe 155 PID 1184 set thread context of 2928 1184 whygk.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhhno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iycxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otepe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dancf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efvjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjvnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpdcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbalg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpsoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbovu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owxdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyquq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpdcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoapm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnsyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcccx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfcfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqeux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrmla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cpbhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilnbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saiul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcnaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aethw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucsfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apfcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhqpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lazfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jljpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlkio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mblek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpqnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rodlz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kepvz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkhgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ficcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bebrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iycxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejreu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgdqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lazfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfffj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrvry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnedp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mnyvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phqhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyzwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pimbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uflyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mitbu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxuje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjgsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjvnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivjmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyzwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fkuak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yaofa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctxbw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxcgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlwpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucsfc.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 904 mitbu.exe 2788 xrvry.exe 2604 zuwrn.exe 2364 yuezs.exe 1544 fjqpx.exe 1720 otepe.exe 2100 xpdcn.exe 660 bnedp.exe 956 hrmla.exe 896 rbalg.exe 684 xuxop.exe 1864 ejreu.exe 2084 lvagx.exe 764 ufohv.exe 3000 dancf.exe 2676 nhqpi.exe 1120 zxrus.exe 1964 aethw.exe 1684 mnyvt.exe 1404 yaofa.exe 1608 kfdxa.exe 2168 txrgg.exe 1276 aqoao.exe 612 jxzws.exe 2468 qmllx.exe 1520 zhkzh.exe 1876 ivjmq.exe 2536 mblek.exe 2340 ycpkp.exe 2740 hbrkb.exe 1740 tlwpx.exe 940 ipcnd.exe 1892 ucsfc.exe 2940 djvag.exe 3028 pkhgl.exe 1184 wpqnw.exe 1452 lealo.exe 2288 mwotu.exe 2148 qxuje.exe 836 cvwjg.exe 2540 joteo.exe 2748 phqhx.exe 2656 tetse.exe 272 foyxj.exe 1188 mdsno.exe 940 szavz.exe 1892 cgdqd.exe 2216 yhrnn.exe 1664 knkgh.exe 1916 tbktq.exe 2372 ctxbw.exe 1584 ognte.exe 1500 ahszb.exe 2504 efvjq.exe 2836 qoapm.exe 2892 xhxsv.exe 2844 grlsb.exe 1496 hjgsi.exe 1680 rtuao.exe 1920 aaxnk.exe 2232 mnngr.exe 1480 sjvnc.exe 1184 whygk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 1872 wrote to memory of 2684 1872 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 30 PID 2684 wrote to memory of 904 2684 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 31 PID 2684 wrote to memory of 904 2684 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 31 PID 2684 wrote to memory of 904 2684 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 31 PID 2684 wrote to memory of 904 2684 9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe 31 PID 904 wrote to memory of 2244 904 mitbu.exe 32 PID 904 wrote to memory of 2244 904 mitbu.exe 32 PID 904 wrote to memory of 2244 904 mitbu.exe 32 PID 904 wrote to memory of 2244 904 mitbu.exe 32 PID 904 wrote to memory of 2244 904 mitbu.exe 32 PID 904 wrote to memory of 2244 904 mitbu.exe 32 PID 904 wrote to memory of 2244 904 mitbu.exe 32 PID 904 wrote to memory of 2244 904 mitbu.exe 32 PID 2244 wrote to memory of 2788 2244 mitbu.exe 33 PID 2244 wrote to memory of 2788 2244 mitbu.exe 33 PID 2244 wrote to memory of 2788 2244 mitbu.exe 33 PID 2244 wrote to memory of 2788 2244 mitbu.exe 33 PID 2788 wrote to memory of 2812 2788 xrvry.exe 35 PID 2788 wrote to memory of 2812 2788 xrvry.exe 35 PID 2788 wrote to memory of 2812 2788 xrvry.exe 35 PID 2788 wrote to memory of 2812 2788 xrvry.exe 35 PID 2788 wrote to memory of 2812 2788 xrvry.exe 35 PID 2788 wrote to memory of 2812 2788 xrvry.exe 35 PID 2788 wrote to memory of 2812 2788 xrvry.exe 35 PID 2788 wrote to memory of 2812 2788 xrvry.exe 35 PID 2812 wrote to memory of 2604 2812 xrvry.exe 36 PID 2812 wrote to memory of 2604 2812 xrvry.exe 36 PID 2812 wrote to memory of 2604 2812 xrvry.exe 36 PID 2812 wrote to memory of 2604 2812 xrvry.exe 36 PID 2604 wrote to memory of 2248 2604 zuwrn.exe 37 PID 2604 wrote to memory of 2248 2604 zuwrn.exe 37 PID 2604 wrote to memory of 2248 2604 zuwrn.exe 37 PID 2604 wrote to memory of 2248 2604 zuwrn.exe 37 PID 2604 wrote to memory of 2248 2604 zuwrn.exe 37 PID 2604 wrote to memory of 2248 2604 zuwrn.exe 37 PID 2604 wrote to memory of 2248 2604 zuwrn.exe 37 PID 2604 wrote to memory of 2248 2604 zuwrn.exe 37 PID 2248 wrote to memory of 2364 2248 zuwrn.exe 38 PID 2248 wrote to memory of 2364 2248 zuwrn.exe 38 PID 2248 wrote to memory of 2364 2248 zuwrn.exe 38 PID 2248 wrote to memory of 2364 2248 zuwrn.exe 38 PID 2364 wrote to memory of 1840 2364 yuezs.exe 39 PID 2364 wrote to memory of 1840 2364 yuezs.exe 39 PID 2364 wrote to memory of 1840 2364 yuezs.exe 39 PID 2364 wrote to memory of 1840 2364 yuezs.exe 39 PID 2364 wrote to memory of 1840 2364 yuezs.exe 39 PID 2364 wrote to memory of 1840 2364 yuezs.exe 39 PID 2364 wrote to memory of 1840 2364 yuezs.exe 39 PID 2364 wrote to memory of 1840 2364 yuezs.exe 39 PID 1840 wrote to memory of 1544 1840 yuezs.exe 40 PID 1840 wrote to memory of 1544 1840 yuezs.exe 40 PID 1840 wrote to memory of 1544 1840 yuezs.exe 40 PID 1840 wrote to memory of 1544 1840 yuezs.exe 40 PID 1544 wrote to memory of 1676 1544 fjqpx.exe 41 PID 1544 wrote to memory of 1676 1544 fjqpx.exe 41 PID 1544 wrote to memory of 1676 1544 fjqpx.exe 41 PID 1544 wrote to memory of 1676 1544 fjqpx.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\mitbu.exeC:\Windows\system32\mitbu.exe 460 "C:\Users\Admin\AppData\Local\Temp\9a0e6645f3ceb7d70a8627bce6838a25_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\mitbu.exeC:\Windows\SysWOW64\mitbu.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\xrvry.exeC:\Windows\system32\xrvry.exe 452 "C:\Windows\SysWOW64\mitbu.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\xrvry.exeC:\Windows\SysWOW64\xrvry.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\zuwrn.exeC:\Windows\system32\zuwrn.exe 452 "C:\Windows\SysWOW64\xrvry.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\zuwrn.exeC:\Windows\SysWOW64\zuwrn.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\yuezs.exeC:\Windows\system32\yuezs.exe 480 "C:\Windows\SysWOW64\zuwrn.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\yuezs.exeC:\Windows\SysWOW64\yuezs.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\fjqpx.exeC:\Windows\system32\fjqpx.exe 468 "C:\Windows\SysWOW64\yuezs.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\fjqpx.exeC:\Windows\SysWOW64\fjqpx.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\otepe.exeC:\Windows\system32\otepe.exe 468 "C:\Windows\SysWOW64\fjqpx.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Windows\SysWOW64\otepe.exeC:\Windows\SysWOW64\otepe.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\xpdcn.exeC:\Windows\system32\xpdcn.exe 476 "C:\Windows\SysWOW64\otepe.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Windows\SysWOW64\xpdcn.exeC:\Windows\SysWOW64\xpdcn.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\bnedp.exeC:\Windows\system32\bnedp.exe 384 "C:\Windows\SysWOW64\xpdcn.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:660 -
C:\Windows\SysWOW64\bnedp.exeC:\Windows\SysWOW64\bnedp.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\hrmla.exeC:\Windows\system32\hrmla.exe 424 "C:\Windows\SysWOW64\bnedp.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Windows\SysWOW64\hrmla.exeC:\Windows\SysWOW64\hrmla.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\rbalg.exeC:\Windows\system32\rbalg.exe 472 "C:\Windows\SysWOW64\hrmla.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Windows\SysWOW64\rbalg.exeC:\Windows\SysWOW64\rbalg.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:768 -
C:\Windows\SysWOW64\xuxop.exeC:\Windows\system32\xuxop.exe 484 "C:\Windows\SysWOW64\rbalg.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Windows\SysWOW64\xuxop.exeC:\Windows\SysWOW64\xuxop.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\ejreu.exeC:\Windows\system32\ejreu.exe 388 "C:\Windows\SysWOW64\xuxop.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Windows\SysWOW64\ejreu.exeC:\Windows\SysWOW64\ejreu.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\lvagx.exeC:\Windows\system32\lvagx.exe 476 "C:\Windows\SysWOW64\ejreu.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\lvagx.exeC:\Windows\SysWOW64\lvagx.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2228 -
C:\Windows\SysWOW64\ufohv.exeC:\Windows\system32\ufohv.exe 472 "C:\Windows\SysWOW64\lvagx.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:764 -
C:\Windows\SysWOW64\ufohv.exeC:\Windows\SysWOW64\ufohv.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2132 -
C:\Windows\SysWOW64\dancf.exeC:\Windows\system32\dancf.exe 452 "C:\Windows\SysWOW64\ufohv.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Windows\SysWOW64\dancf.exeC:\Windows\SysWOW64\dancf.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\nhqpi.exeC:\Windows\system32\nhqpi.exe 452 "C:\Windows\SysWOW64\dancf.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Windows\SysWOW64\nhqpi.exeC:\Windows\SysWOW64\nhqpi.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\zxrus.exeC:\Windows\system32\zxrus.exe 452 "C:\Windows\SysWOW64\nhqpi.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Windows\SysWOW64\zxrus.exeC:\Windows\SysWOW64\zxrus.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\aethw.exeC:\Windows\system32\aethw.exe 468 "C:\Windows\SysWOW64\zxrus.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Windows\SysWOW64\aethw.exeC:\Windows\SysWOW64\aethw.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\mnyvt.exeC:\Windows\system32\mnyvt.exe 432 "C:\Windows\SysWOW64\aethw.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Windows\SysWOW64\mnyvt.exeC:\Windows\SysWOW64\mnyvt.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1832 -
C:\Windows\SysWOW64\yaofa.exeC:\Windows\system32\yaofa.exe 472 "C:\Windows\SysWOW64\mnyvt.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Windows\SysWOW64\yaofa.exeC:\Windows\SysWOW64\yaofa.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\kfdxa.exeC:\Windows\system32\kfdxa.exe 532 "C:\Windows\SysWOW64\yaofa.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\kfdxa.exeC:\Windows\SysWOW64\kfdxa.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3012 -
C:\Windows\SysWOW64\txrgg.exeC:\Windows\system32\txrgg.exe 480 "C:\Windows\SysWOW64\kfdxa.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Windows\SysWOW64\txrgg.exeC:\Windows\SysWOW64\txrgg.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\aqoao.exeC:\Windows\system32\aqoao.exe 488 "C:\Windows\SysWOW64\txrgg.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1276 -
C:\Windows\SysWOW64\aqoao.exeC:\Windows\SysWOW64\aqoao.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Windows\SysWOW64\jxzws.exeC:\Windows\system32\jxzws.exe 456 "C:\Windows\SysWOW64\aqoao.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:612 -
C:\Windows\SysWOW64\jxzws.exeC:\Windows\SysWOW64\jxzws.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1768 -
C:\Windows\SysWOW64\qmllx.exeC:\Windows\system32\qmllx.exe 452 "C:\Windows\SysWOW64\jxzws.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Windows\SysWOW64\qmllx.exeC:\Windows\SysWOW64\qmllx.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428 -
C:\Windows\SysWOW64\zhkzh.exeC:\Windows\system32\zhkzh.exe 452 "C:\Windows\SysWOW64\qmllx.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Windows\SysWOW64\zhkzh.exeC:\Windows\SysWOW64\zhkzh.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\ivjmq.exeC:\Windows\system32\ivjmq.exe 472 "C:\Windows\SysWOW64\zhkzh.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Windows\SysWOW64\ivjmq.exeC:\Windows\SysWOW64\ivjmq.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\mblek.exeC:\Windows\system32\mblek.exe 460 "C:\Windows\SysWOW64\ivjmq.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\SysWOW64\mblek.exeC:\Windows\SysWOW64\mblek.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\ycpkp.exeC:\Windows\system32\ycpkp.exe 452 "C:\Windows\SysWOW64\mblek.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Windows\SysWOW64\ycpkp.exeC:\Windows\SysWOW64\ycpkp.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2816 -
C:\Windows\SysWOW64\hbrkb.exeC:\Windows\system32\hbrkb.exe 480 "C:\Windows\SysWOW64\ycpkp.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Windows\SysWOW64\hbrkb.exeC:\Windows\SysWOW64\hbrkb.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Windows\SysWOW64\tlwpx.exeC:\Windows\system32\tlwpx.exe 460 "C:\Windows\SysWOW64\hbrkb.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Windows\SysWOW64\tlwpx.exeC:\Windows\SysWOW64\tlwpx.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\ipcnd.exeC:\Windows\system32\ipcnd.exe 452 "C:\Windows\SysWOW64\tlwpx.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Windows\SysWOW64\ipcnd.exeC:\Windows\SysWOW64\ipcnd.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1896 -
C:\Windows\SysWOW64\ucsfc.exeC:\Windows\system32\ucsfc.exe 476 "C:\Windows\SysWOW64\ipcnd.exe"67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Windows\SysWOW64\ucsfc.exeC:\Windows\SysWOW64\ucsfc.exe68⤵
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\djvag.exeC:\Windows\system32\djvag.exe 484 "C:\Windows\SysWOW64\ucsfc.exe"69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Windows\SysWOW64\djvag.exeC:\Windows\SysWOW64\djvag.exe70⤵
- System Location Discovery: System Language Discovery
PID:632 -
C:\Windows\SysWOW64\pkhgl.exeC:\Windows\system32\pkhgl.exe 468 "C:\Windows\SysWOW64\djvag.exe"71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Windows\SysWOW64\pkhgl.exeC:\Windows\SysWOW64\pkhgl.exe72⤵
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\wpqnw.exeC:\Windows\system32\wpqnw.exe 452 "C:\Windows\SysWOW64\pkhgl.exe"73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Windows\SysWOW64\wpqnw.exeC:\Windows\SysWOW64\wpqnw.exe74⤵PID:2380
-
C:\Windows\SysWOW64\lealo.exeC:\Windows\system32\lealo.exe 476 "C:\Windows\SysWOW64\wpqnw.exe"75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Windows\SysWOW64\lealo.exeC:\Windows\SysWOW64\lealo.exe76⤵PID:580
-
C:\Windows\SysWOW64\mwotu.exeC:\Windows\system32\mwotu.exe 468 "C:\Windows\SysWOW64\lealo.exe"77⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Windows\SysWOW64\mwotu.exeC:\Windows\SysWOW64\mwotu.exe78⤵PID:684
-
C:\Windows\SysWOW64\qxuje.exeC:\Windows\system32\qxuje.exe 452 "C:\Windows\SysWOW64\mwotu.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Windows\SysWOW64\qxuje.exeC:\Windows\SysWOW64\qxuje.exe80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\cvwjg.exeC:\Windows\system32\cvwjg.exe 460 "C:\Windows\SysWOW64\qxuje.exe"81⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Windows\SysWOW64\cvwjg.exeC:\Windows\SysWOW64\cvwjg.exe82⤵PID:2528
-
C:\Windows\SysWOW64\joteo.exeC:\Windows\system32\joteo.exe 452 "C:\Windows\SysWOW64\cvwjg.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Windows\SysWOW64\joteo.exeC:\Windows\SysWOW64\joteo.exe84⤵PID:2744
-
C:\Windows\SysWOW64\phqhx.exeC:\Windows\system32\phqhx.exe 488 "C:\Windows\SysWOW64\joteo.exe"85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Windows\SysWOW64\phqhx.exeC:\Windows\SysWOW64\phqhx.exe86⤵
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\tetse.exeC:\Windows\system32\tetse.exe 452 "C:\Windows\SysWOW64\phqhx.exe"87⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Windows\SysWOW64\tetse.exeC:\Windows\SysWOW64\tetse.exe88⤵PID:2596
-
C:\Windows\SysWOW64\foyxj.exeC:\Windows\system32\foyxj.exe 452 "C:\Windows\SysWOW64\tetse.exe"89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:272 -
C:\Windows\SysWOW64\foyxj.exeC:\Windows\SysWOW64\foyxj.exe90⤵
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\mdsno.exeC:\Windows\system32\mdsno.exe 528 "C:\Windows\SysWOW64\foyxj.exe"91⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Windows\SysWOW64\mdsno.exeC:\Windows\SysWOW64\mdsno.exe92⤵
- Drops file in System32 directory
PID:1016 -
C:\Windows\SysWOW64\szavz.exeC:\Windows\system32\szavz.exe 472 "C:\Windows\SysWOW64\mdsno.exe"93⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Windows\SysWOW64\szavz.exeC:\Windows\SysWOW64\szavz.exe94⤵PID:1672
-
C:\Windows\SysWOW64\cgdqd.exeC:\Windows\system32\cgdqd.exe 472 "C:\Windows\SysWOW64\szavz.exe"95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Windows\SysWOW64\cgdqd.exeC:\Windows\SysWOW64\cgdqd.exe96⤵PID:2856
-
C:\Windows\SysWOW64\yhrnn.exeC:\Windows\system32\yhrnn.exe 476 "C:\Windows\SysWOW64\cgdqd.exe"97⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Windows\SysWOW64\yhrnn.exeC:\Windows\SysWOW64\yhrnn.exe98⤵PID:572
-
C:\Windows\SysWOW64\knkgh.exeC:\Windows\system32\knkgh.exe 452 "C:\Windows\SysWOW64\yhrnn.exe"99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Windows\SysWOW64\knkgh.exeC:\Windows\SysWOW64\knkgh.exe100⤵
- Drops file in System32 directory
PID:112 -
C:\Windows\SysWOW64\tbktq.exeC:\Windows\system32\tbktq.exe 468 "C:\Windows\SysWOW64\knkgh.exe"101⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Windows\SysWOW64\tbktq.exeC:\Windows\SysWOW64\tbktq.exe102⤵
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\ctxbw.exeC:\Windows\system32\ctxbw.exe 472 "C:\Windows\SysWOW64\tbktq.exe"103⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Windows\SysWOW64\ctxbw.exeC:\Windows\SysWOW64\ctxbw.exe104⤵
- System Location Discovery: System Language Discovery
PID:992 -
C:\Windows\SysWOW64\ognte.exeC:\Windows\system32\ognte.exe 472 "C:\Windows\SysWOW64\ctxbw.exe"105⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Windows\SysWOW64\ognte.exeC:\Windows\SysWOW64\ognte.exe106⤵
- Drops file in System32 directory
PID:980 -
C:\Windows\SysWOW64\ahszb.exeC:\Windows\system32\ahszb.exe 480 "C:\Windows\SysWOW64\ognte.exe"107⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Windows\SysWOW64\ahszb.exeC:\Windows\SysWOW64\ahszb.exe108⤵PID:2416
-
C:\Windows\SysWOW64\efvjq.exeC:\Windows\system32\efvjq.exe 472 "C:\Windows\SysWOW64\ahszb.exe"109⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2504 -
C:\Windows\SysWOW64\efvjq.exeC:\Windows\SysWOW64\efvjq.exe110⤵PID:2680
-
C:\Windows\SysWOW64\qoapm.exeC:\Windows\system32\qoapm.exe 484 "C:\Windows\SysWOW64\efvjq.exe"111⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Windows\SysWOW64\qoapm.exeC:\Windows\SysWOW64\qoapm.exe112⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\xhxsv.exeC:\Windows\system32\xhxsv.exe 468 "C:\Windows\SysWOW64\qoapm.exe"113⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Windows\SysWOW64\xhxsv.exeC:\Windows\SysWOW64\xhxsv.exe114⤵PID:2804
-
C:\Windows\SysWOW64\grlsb.exeC:\Windows\system32\grlsb.exe 500 "C:\Windows\SysWOW64\xhxsv.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Windows\SysWOW64\grlsb.exeC:\Windows\SysWOW64\grlsb.exe116⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\hjgsi.exeC:\Windows\system32\hjgsi.exe 480 "C:\Windows\SysWOW64\grlsb.exe"117⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Windows\SysWOW64\hjgsi.exeC:\Windows\SysWOW64\hjgsi.exe118⤵
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\rtuao.exeC:\Windows\system32\rtuao.exe 500 "C:\Windows\SysWOW64\hjgsi.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Windows\SysWOW64\rtuao.exeC:\Windows\SysWOW64\rtuao.exe120⤵PID:2064
-
C:\Windows\SysWOW64\aaxnk.exeC:\Windows\system32\aaxnk.exe 468 "C:\Windows\SysWOW64\rtuao.exe"121⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Windows\SysWOW64\aaxnk.exeC:\Windows\SysWOW64\aaxnk.exe122⤵PID:1236
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-