Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe
-
Size
216KB
-
MD5
ba8a46d6910ea0e5b6958d330df95846
-
SHA1
7bb2e84a2016bae7673ae2d4e1a10893576590c0
-
SHA256
1db293f665a0457f1bf241b351dc7e4b92c9c2538a9b6ec61dbf79e97cf80305
-
SHA512
99844529382cd059d84dbfc02bb817f784c01531c6a55a94e264844793882af084658b60f106e41a59cb063c7e13fcb46befce1fe6d4450a8c3875845ed93649
-
SSDEEP
3072:P7PYO4HB1NxoMnmgnbd4UyAA5pJCiV8xC7813q57SytpwjdwmFc68Vq:TuHoMmISAg2iVYq5HqjdwmG6cq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 1740 jokhlbf.exe 3024 jokhlbf.exe 2796 lcnsocl.exe 2792 lcnsocl.exe 780 avkfppw.exe 484 avkfppw.exe 812 nmmigyt.exe 2012 nmmigyt.exe 752 xanfwfg.exe 952 xanfwfg.exe 1760 isdcbvi.exe 2844 isdcbvi.exe 2120 xpdcnnk.exe 3040 xpdcnnk.exe 956 kfffwwp.exe 1620 kfffwwp.exe 1036 xeaiewv.exe 3064 xeaiewv.exe 2212 jygxqiz.exe 2220 jygxqiz.exe 2364 tiwillf.exe 1464 tiwillf.exe 1568 bnedprk.exe 1364 bnedprk.exe 3044 lbxsfyp.exe 1248 lbxsfyp.exe 2268 bffnjlu.exe 2536 bffnjlu.exe 2528 ktflzlz.exe 2812 ktflzlz.exe 2984 ygpafog.exe 2684 ygpafog.exe 2828 kfsdnxd.exe 812 kfsdnxd.exe 2736 ulsaler.exe 760 ulsaler.exe 2956 hjnduew.exe 2100 hjnduew.exe 1912 uaigdmc.exe 300 uaigdmc.exe 1096 hqlilvz.exe 1336 hqlilvz.exe 764 upgluvf.exe 2412 upgluvf.exe 1376 ddgascs.exe 2400 ddgascs.exe 1936 qubdakx.exe 2916 qubdakx.exe 1768 dkegjsv.exe 3036 dkegjsv.exe 1596 qizjstb.exe 2220 qizjstb.exe 2652 dzulabg.exe 2668 dzulabg.exe 3044 nnujyil.exe 2352 nnujyil.exe 2800 aepdhir.exe 2524 aepdhir.exe 2976 ncsgprw.exe 780 ncsgprw.exe 580 zeywbdb.exe 2000 zeywbdb.exe 1816 mrhlhzz.exe 2716 mrhlhzz.exe -
Loads dropped DLL 64 IoCs
pid Process 3008 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 3008 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 1740 jokhlbf.exe 3024 jokhlbf.exe 3024 jokhlbf.exe 2796 lcnsocl.exe 2792 lcnsocl.exe 2792 lcnsocl.exe 780 avkfppw.exe 484 avkfppw.exe 484 avkfppw.exe 2012 nmmigyt.exe 2012 nmmigyt.exe 952 xanfwfg.exe 952 xanfwfg.exe 2844 isdcbvi.exe 2844 isdcbvi.exe 3040 xpdcnnk.exe 3040 xpdcnnk.exe 1620 kfffwwp.exe 1620 kfffwwp.exe 3064 xeaiewv.exe 3064 xeaiewv.exe 2220 jygxqiz.exe 2220 jygxqiz.exe 1464 tiwillf.exe 1464 tiwillf.exe 1364 bnedprk.exe 1364 bnedprk.exe 1248 lbxsfyp.exe 1248 lbxsfyp.exe 2536 bffnjlu.exe 2536 bffnjlu.exe 2812 ktflzlz.exe 2812 ktflzlz.exe 2684 ygpafog.exe 2684 ygpafog.exe 812 kfsdnxd.exe 812 kfsdnxd.exe 760 ulsaler.exe 760 ulsaler.exe 2100 hjnduew.exe 2100 hjnduew.exe 300 uaigdmc.exe 300 uaigdmc.exe 1336 hqlilvz.exe 1336 hqlilvz.exe 2412 upgluvf.exe 2412 upgluvf.exe 2400 ddgascs.exe 2400 ddgascs.exe 2916 qubdakx.exe 2916 qubdakx.exe 3036 dkegjsv.exe 3036 dkegjsv.exe 2220 qizjstb.exe 2220 qizjstb.exe 2668 dzulabg.exe 2668 dzulabg.exe 2352 nnujyil.exe 2352 nnujyil.exe 2524 aepdhir.exe 2524 aepdhir.exe 780 ncsgprw.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cgeakvx.exe pijxbnr.exe File created C:\Windows\SysWOW64\uzghevi.exe hjlevnd.exe File created C:\Windows\SysWOW64\pixjgtt.exe cjugxtw.exe File opened for modification C:\Windows\SysWOW64\aqmejfp.exe nogwxbl.exe File opened for modification C:\Windows\SysWOW64\ltdttfv.exe Process not Found File created C:\Windows\SysWOW64\bhtgkfm.exe Process not Found File created C:\Windows\SysWOW64\mghmkhg.exe Process not Found File opened for modification C:\Windows\SysWOW64\ktjwoul.exe Process not Found File created C:\Windows\SysWOW64\sevzbte.exe iqdcllr.exe File created C:\Windows\SysWOW64\qktvqui.exe duysimd.exe File opened for modification C:\Windows\SysWOW64\qxmuwlg.exe Process not Found File created C:\Windows\SysWOW64\cfciejf.exe Process not Found File opened for modification C:\Windows\SysWOW64\vluxmgx.exe Process not Found File created C:\Windows\SysWOW64\bbctcmc.exe Process not Found File opened for modification C:\Windows\SysWOW64\pbsgicu.exe Process not Found File opened for modification C:\Windows\SysWOW64\mkrkylh.exe Process not Found File created C:\Windows\SysWOW64\anfggyc.exe Process not Found File created C:\Windows\SysWOW64\kndngfk.exe xwakxff.exe File opened for modification C:\Windows\SysWOW64\xqyxyna.exe ksdvpfu.exe File created C:\Windows\SysWOW64\ckjrspi.exe sejtuid.exe File created C:\Windows\SysWOW64\qwvokbr.exe Process not Found File opened for modification C:\Windows\SysWOW64\jrbvdfv.exe Process not Found File created C:\Windows\SysWOW64\kspioxu.exe Process not Found File opened for modification C:\Windows\SysWOW64\svuyshw.exe Process not Found File created C:\Windows\SysWOW64\aepdhir.exe nnujyil.exe File created C:\Windows\SysWOW64\vwipmce.exe iffmwcy.exe File opened for modification C:\Windows\SysWOW64\ebipral.exe rlnmarf.exe File opened for modification C:\Windows\SysWOW64\bvbmhyz.exe oegsypb.exe File opened for modification C:\Windows\SysWOW64\ixfxmis.exe vhcvdiu.exe File opened for modification C:\Windows\SysWOW64\ycpkpmi.exe mmmpgec.exe File opened for modification C:\Windows\SysWOW64\geuvsmp.exe Process not Found File created C:\Windows\SysWOW64\osyisjz.exe Process not Found File created C:\Windows\SysWOW64\ktjwoul.exe Process not Found File created C:\Windows\SysWOW64\dzazdlu.exe qbffudo.exe File opened for modification C:\Windows\SysWOW64\yfrroio.exe lgxogaj.exe File created C:\Windows\SysWOW64\ukwusth.exe gxnfmpi.exe File opened for modification C:\Windows\SysWOW64\xjjlxfz.exe Process not Found File opened for modification C:\Windows\SysWOW64\xetllhk.exe Process not Found File created C:\Windows\SysWOW64\fgnabpy.exe sptysot.exe File created C:\Windows\SysWOW64\nddcojw.exe aqmejfp.exe File created C:\Windows\SysWOW64\xeaiewv.exe kfffwwp.exe File created C:\Windows\SysWOW64\eaucmqs.exe rjrhdqu.exe File created C:\Windows\SysWOW64\gnlvmxb.exe toqsdpv.exe File created C:\Windows\SysWOW64\xawmnfr.exe oleppge.exe File opened for modification C:\Windows\SysWOW64\mpovxct.exe cjnxhvg.exe File created C:\Windows\SysWOW64\kigbnco.exe Process not Found File created C:\Windows\SysWOW64\mqsaqty.exe zaxyhts.exe File opened for modification C:\Windows\SysWOW64\iyzudso.exe vwtesgj.exe File created C:\Windows\SysWOW64\byxwxfl.exe Process not Found File created C:\Windows\SysWOW64\jsqfqno.exe Process not Found File opened for modification C:\Windows\SysWOW64\curnvrq.exe Process not Found File opened for modification C:\Windows\SysWOW64\vvmbgjp.exe Process not Found File opened for modification C:\Windows\SysWOW64\xeaiewv.exe kfffwwp.exe File opened for modification C:\Windows\SysWOW64\dppkynt.exe qyviqfn.exe File opened for modification C:\Windows\SysWOW64\mkpxhyt.exe cwoarqg.exe File opened for modification C:\Windows\SysWOW64\cyxxkgz.exe picuugc.exe File created C:\Windows\SysWOW64\fejvixt.exe Process not Found File created C:\Windows\SysWOW64\erfgwdh.exe vdejydu.exe File created C:\Windows\SysWOW64\yfrroio.exe lgxogaj.exe File created C:\Windows\SysWOW64\qgleakk.exe eqqjrce.exe File opened for modification C:\Windows\SysWOW64\wmgowxy.exe jwllfps.exe File created C:\Windows\SysWOW64\qbffudo.exe dkkcmvj.exe File opened for modification C:\Windows\SysWOW64\kcstxwv.exe xlxqooq.exe File created C:\Windows\SysWOW64\ufqnmml.exe hgolddg.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 540 set thread context of 3008 540 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 31 PID 1740 set thread context of 3024 1740 jokhlbf.exe 33 PID 2796 set thread context of 2792 2796 lcnsocl.exe 35 PID 780 set thread context of 484 780 avkfppw.exe 37 PID 812 set thread context of 2012 812 nmmigyt.exe 39 PID 752 set thread context of 952 752 xanfwfg.exe 41 PID 1760 set thread context of 2844 1760 isdcbvi.exe 43 PID 2120 set thread context of 3040 2120 xpdcnnk.exe 45 PID 956 set thread context of 1620 956 kfffwwp.exe 47 PID 1036 set thread context of 3064 1036 xeaiewv.exe 49 PID 2212 set thread context of 2220 2212 jygxqiz.exe 51 PID 2364 set thread context of 1464 2364 tiwillf.exe 53 PID 1568 set thread context of 1364 1568 bnedprk.exe 55 PID 3044 set thread context of 1248 3044 lbxsfyp.exe 57 PID 2268 set thread context of 2536 2268 bffnjlu.exe 59 PID 2528 set thread context of 2812 2528 ktflzlz.exe 61 PID 2984 set thread context of 2684 2984 ygpafog.exe 63 PID 2828 set thread context of 812 2828 kfsdnxd.exe 65 PID 2736 set thread context of 760 2736 ulsaler.exe 67 PID 2956 set thread context of 2100 2956 hjnduew.exe 69 PID 1912 set thread context of 300 1912 uaigdmc.exe 71 PID 1096 set thread context of 1336 1096 hqlilvz.exe 73 PID 764 set thread context of 2412 764 upgluvf.exe 75 PID 1376 set thread context of 2400 1376 ddgascs.exe 77 PID 1936 set thread context of 2916 1936 qubdakx.exe 79 PID 1768 set thread context of 3036 1768 dkegjsv.exe 81 PID 1596 set thread context of 2220 1596 qizjstb.exe 83 PID 2652 set thread context of 2668 2652 dzulabg.exe 85 PID 3044 set thread context of 2352 3044 nnujyil.exe 87 PID 2800 set thread context of 2524 2800 aepdhir.exe 89 PID 2976 set thread context of 780 2976 ncsgprw.exe 91 PID 580 set thread context of 2000 580 zeywbdb.exe 93 PID 1816 set thread context of 2716 1816 mrhlhzz.exe 95 PID 600 set thread context of 2600 600 wxijxgm.exe 97 PID 1616 set thread context of 1244 1616 jwllfps.exe 99 PID 1760 set thread context of 2108 1760 wmgowxy.exe 101 PID 1736 set thread context of 300 1736 jlarfxv.exe 103 PID 1708 set thread context of 2080 1708 wbdtnfb.exe 105 PID 3048 set thread context of 2344 3048 fpwjdmo.exe 107 PID 880 set thread context of 2400 880 sgzmmnt.exe 109 PID 2284 set thread context of 2272 2284 feuouvr.exe 111 PID 1592 set thread context of 2620 1592 svorddw.exe 113 PID 2820 set thread context of 2700 2820 flruudc.exe 115 PID 2748 set thread context of 2508 2748 pzsrklp.exe 117 PID 2512 set thread context of 2988 2512 cynustn.exe 119 PID 3052 set thread context of 2720 3052 oohobts.exe 121 PID 396 set thread context of 2728 396 bfkrjby.exe 123 PID 2968 set thread context of 2612 2968 odfusjv.exe 125 PID 1972 set thread context of 2832 1972 yrgrqri.exe 127 PID 1800 set thread context of 2160 1800 lephwmh.exe 129 PID 1012 set thread context of 676 1012 yydwhzu.exe 131 PID 2240 set thread context of 1524 2240 lxyzqhr.exe 133 PID 1048 set thread context of 2304 1048 yntczhx.exe 135 PID 2408 set thread context of 2440 2408 hbtrxpk.exe 137 PID 2212 set thread context of 1716 2212 usoufxp.exe 139 PID 268 set thread context of 3036 268 hqrxoxn.exe 141 PID 756 set thread context of 2488 756 uhmzwfs.exe 143 PID 1748 set thread context of 1740 1748 hfhcfny.exe 145 PID 2836 set thread context of 2536 2836 rmhzvvl.exe 147 PID 2508 set thread context of 2392 2508 dkkcmvj.exe 149 PID 2416 set thread context of 2684 2416 qbffudo.exe 151 PID 2000 set thread context of 2964 2000 dzazdlu.exe 153 PID 536 set thread context of 2608 536 iqdcllr.exe 155 PID 2404 set thread context of 1956 2404 sevzbte.exe 157 -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txkvucb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpdcnnk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmgowxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpwjdmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tploczr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hedwmwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mumvxhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggmlsdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvlqvuj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkdicun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gamxelb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eezzdre.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndkfbgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zeywbdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgfioxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imjgqvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppkynt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbrstwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktflzlz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcstxwv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhqqlde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imuddzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxgnnts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gamxelb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixmiynm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ulsaler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imjgqvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqqlurm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjmiyjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ncsgprw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdeeryd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivblcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ckbcavj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wssjwgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifzbjge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyxxkgz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cawrise.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhqqlde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdxafis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpgwozt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mqsaqty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hchkcum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laubghe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrglvha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufqnmml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdxafis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 3008 540 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 31 PID 540 wrote to memory of 3008 540 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 31 PID 540 wrote to memory of 3008 540 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 31 PID 540 wrote to memory of 3008 540 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 31 PID 540 wrote to memory of 3008 540 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 31 PID 540 wrote to memory of 3008 540 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 31 PID 3008 wrote to memory of 1740 3008 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 32 PID 3008 wrote to memory of 1740 3008 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 32 PID 3008 wrote to memory of 1740 3008 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 32 PID 3008 wrote to memory of 1740 3008 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 32 PID 1740 wrote to memory of 3024 1740 jokhlbf.exe 33 PID 1740 wrote to memory of 3024 1740 jokhlbf.exe 33 PID 1740 wrote to memory of 3024 1740 jokhlbf.exe 33 PID 1740 wrote to memory of 3024 1740 jokhlbf.exe 33 PID 1740 wrote to memory of 3024 1740 jokhlbf.exe 33 PID 1740 wrote to memory of 3024 1740 jokhlbf.exe 33 PID 3024 wrote to memory of 2796 3024 jokhlbf.exe 34 PID 3024 wrote to memory of 2796 3024 jokhlbf.exe 34 PID 3024 wrote to memory of 2796 3024 jokhlbf.exe 34 PID 3024 wrote to memory of 2796 3024 jokhlbf.exe 34 PID 2796 wrote to memory of 2792 2796 lcnsocl.exe 35 PID 2796 wrote to memory of 2792 2796 lcnsocl.exe 35 PID 2796 wrote to memory of 2792 2796 lcnsocl.exe 35 PID 2796 wrote to memory of 2792 2796 lcnsocl.exe 35 PID 2796 wrote to memory of 2792 2796 lcnsocl.exe 35 PID 2796 wrote to memory of 2792 2796 lcnsocl.exe 35 PID 2792 wrote to memory of 780 2792 lcnsocl.exe 36 PID 2792 wrote to memory of 780 2792 lcnsocl.exe 36 PID 2792 wrote to memory of 780 2792 lcnsocl.exe 36 PID 2792 wrote to memory of 780 2792 lcnsocl.exe 36 PID 780 wrote to memory of 484 780 avkfppw.exe 37 PID 780 wrote to memory of 484 780 avkfppw.exe 37 PID 780 wrote to memory of 484 780 avkfppw.exe 37 PID 780 wrote to memory of 484 780 avkfppw.exe 37 PID 780 wrote to memory of 484 780 avkfppw.exe 37 PID 780 wrote to memory of 484 780 avkfppw.exe 37 PID 484 wrote to memory of 812 484 avkfppw.exe 38 PID 484 wrote to memory of 812 484 avkfppw.exe 38 PID 484 wrote to memory of 812 484 avkfppw.exe 38 PID 484 wrote to memory of 812 484 avkfppw.exe 38 PID 812 wrote to memory of 2012 812 nmmigyt.exe 39 PID 812 wrote to memory of 2012 812 nmmigyt.exe 39 PID 812 wrote to memory of 2012 812 nmmigyt.exe 39 PID 812 wrote to memory of 2012 812 nmmigyt.exe 39 PID 812 wrote to memory of 2012 812 nmmigyt.exe 39 PID 812 wrote to memory of 2012 812 nmmigyt.exe 39 PID 2012 wrote to memory of 752 2012 nmmigyt.exe 40 PID 2012 wrote to memory of 752 2012 nmmigyt.exe 40 PID 2012 wrote to memory of 752 2012 nmmigyt.exe 40 PID 2012 wrote to memory of 752 2012 nmmigyt.exe 40 PID 752 wrote to memory of 952 752 xanfwfg.exe 41 PID 752 wrote to memory of 952 752 xanfwfg.exe 41 PID 752 wrote to memory of 952 752 xanfwfg.exe 41 PID 752 wrote to memory of 952 752 xanfwfg.exe 41 PID 752 wrote to memory of 952 752 xanfwfg.exe 41 PID 752 wrote to memory of 952 752 xanfwfg.exe 41 PID 952 wrote to memory of 1760 952 xanfwfg.exe 42 PID 952 wrote to memory of 1760 952 xanfwfg.exe 42 PID 952 wrote to memory of 1760 952 xanfwfg.exe 42 PID 952 wrote to memory of 1760 952 xanfwfg.exe 42 PID 1760 wrote to memory of 2844 1760 isdcbvi.exe 43 PID 1760 wrote to memory of 2844 1760 isdcbvi.exe 43 PID 1760 wrote to memory of 2844 1760 isdcbvi.exe 43 PID 1760 wrote to memory of 2844 1760 isdcbvi.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\jokhlbf.exeC:\Windows\system32\jokhlbf.exe 476 "C:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\jokhlbf.exeC:\Windows\SysWOW64\jokhlbf.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\lcnsocl.exeC:\Windows\system32\lcnsocl.exe 528 "C:\Windows\SysWOW64\jokhlbf.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\lcnsocl.exeC:\Windows\SysWOW64\lcnsocl.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\avkfppw.exeC:\Windows\system32\avkfppw.exe 528 "C:\Windows\SysWOW64\lcnsocl.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\avkfppw.exeC:\Windows\SysWOW64\avkfppw.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\nmmigyt.exeC:\Windows\system32\nmmigyt.exe 528 "C:\Windows\SysWOW64\avkfppw.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\nmmigyt.exeC:\Windows\SysWOW64\nmmigyt.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\xanfwfg.exeC:\Windows\system32\xanfwfg.exe 528 "C:\Windows\SysWOW64\nmmigyt.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\xanfwfg.exeC:\Windows\SysWOW64\xanfwfg.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\isdcbvi.exeC:\Windows\system32\isdcbvi.exe 528 "C:\Windows\SysWOW64\xanfwfg.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\isdcbvi.exeC:\Windows\SysWOW64\isdcbvi.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2844 -
C:\Windows\SysWOW64\xpdcnnk.exeC:\Windows\system32\xpdcnnk.exe 532 "C:\Windows\SysWOW64\isdcbvi.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\xpdcnnk.exeC:\Windows\SysWOW64\xpdcnnk.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3040 -
C:\Windows\SysWOW64\kfffwwp.exeC:\Windows\system32\kfffwwp.exe 536 "C:\Windows\SysWOW64\xpdcnnk.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:956 -
C:\Windows\SysWOW64\kfffwwp.exeC:\Windows\SysWOW64\kfffwwp.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\xeaiewv.exeC:\Windows\system32\xeaiewv.exe 528 "C:\Windows\SysWOW64\kfffwwp.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1036 -
C:\Windows\SysWOW64\xeaiewv.exeC:\Windows\SysWOW64\xeaiewv.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064 -
C:\Windows\SysWOW64\jygxqiz.exeC:\Windows\system32\jygxqiz.exe 528 "C:\Windows\SysWOW64\xeaiewv.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2212 -
C:\Windows\SysWOW64\jygxqiz.exeC:\Windows\SysWOW64\jygxqiz.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220 -
C:\Windows\SysWOW64\tiwillf.exeC:\Windows\system32\tiwillf.exe 528 "C:\Windows\SysWOW64\jygxqiz.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2364 -
C:\Windows\SysWOW64\tiwillf.exeC:\Windows\SysWOW64\tiwillf.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1464 -
C:\Windows\SysWOW64\bnedprk.exeC:\Windows\system32\bnedprk.exe 532 "C:\Windows\SysWOW64\tiwillf.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1568 -
C:\Windows\SysWOW64\bnedprk.exeC:\Windows\SysWOW64\bnedprk.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364 -
C:\Windows\SysWOW64\lbxsfyp.exeC:\Windows\system32\lbxsfyp.exe 528 "C:\Windows\SysWOW64\bnedprk.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\SysWOW64\lbxsfyp.exeC:\Windows\SysWOW64\lbxsfyp.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1248 -
C:\Windows\SysWOW64\bffnjlu.exeC:\Windows\system32\bffnjlu.exe 528 "C:\Windows\SysWOW64\lbxsfyp.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2268 -
C:\Windows\SysWOW64\bffnjlu.exeC:\Windows\SysWOW64\bffnjlu.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536 -
C:\Windows\SysWOW64\ktflzlz.exeC:\Windows\system32\ktflzlz.exe 528 "C:\Windows\SysWOW64\bffnjlu.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2528 -
C:\Windows\SysWOW64\ktflzlz.exeC:\Windows\SysWOW64\ktflzlz.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\ygpafog.exeC:\Windows\system32\ygpafog.exe 532 "C:\Windows\SysWOW64\ktflzlz.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2984 -
C:\Windows\SysWOW64\ygpafog.exeC:\Windows\SysWOW64\ygpafog.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684 -
C:\Windows\SysWOW64\kfsdnxd.exeC:\Windows\system32\kfsdnxd.exe 528 "C:\Windows\SysWOW64\ygpafog.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2828 -
C:\Windows\SysWOW64\kfsdnxd.exeC:\Windows\SysWOW64\kfsdnxd.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:812 -
C:\Windows\SysWOW64\ulsaler.exeC:\Windows\system32\ulsaler.exe 528 "C:\Windows\SysWOW64\kfsdnxd.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\ulsaler.exeC:\Windows\SysWOW64\ulsaler.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760 -
C:\Windows\SysWOW64\hjnduew.exeC:\Windows\system32\hjnduew.exe 532 "C:\Windows\SysWOW64\ulsaler.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2956 -
C:\Windows\SysWOW64\hjnduew.exeC:\Windows\SysWOW64\hjnduew.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Windows\SysWOW64\uaigdmc.exeC:\Windows\system32\uaigdmc.exe 528 "C:\Windows\SysWOW64\hjnduew.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1912 -
C:\Windows\SysWOW64\uaigdmc.exeC:\Windows\SysWOW64\uaigdmc.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:300 -
C:\Windows\SysWOW64\hqlilvz.exeC:\Windows\system32\hqlilvz.exe 528 "C:\Windows\SysWOW64\uaigdmc.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1096 -
C:\Windows\SysWOW64\hqlilvz.exeC:\Windows\SysWOW64\hqlilvz.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1336 -
C:\Windows\SysWOW64\upgluvf.exeC:\Windows\system32\upgluvf.exe 528 "C:\Windows\SysWOW64\hqlilvz.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:764 -
C:\Windows\SysWOW64\upgluvf.exeC:\Windows\SysWOW64\upgluvf.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412 -
C:\Windows\SysWOW64\ddgascs.exeC:\Windows\system32\ddgascs.exe 528 "C:\Windows\SysWOW64\upgluvf.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1376 -
C:\Windows\SysWOW64\ddgascs.exeC:\Windows\SysWOW64\ddgascs.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Windows\SysWOW64\qubdakx.exeC:\Windows\system32\qubdakx.exe 528 "C:\Windows\SysWOW64\ddgascs.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1936 -
C:\Windows\SysWOW64\qubdakx.exeC:\Windows\SysWOW64\qubdakx.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2916 -
C:\Windows\SysWOW64\dkegjsv.exeC:\Windows\system32\dkegjsv.exe 532 "C:\Windows\SysWOW64\qubdakx.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1768 -
C:\Windows\SysWOW64\dkegjsv.exeC:\Windows\SysWOW64\dkegjsv.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3036 -
C:\Windows\SysWOW64\qizjstb.exeC:\Windows\system32\qizjstb.exe 532 "C:\Windows\SysWOW64\dkegjsv.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1596 -
C:\Windows\SysWOW64\qizjstb.exeC:\Windows\SysWOW64\qizjstb.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220 -
C:\Windows\SysWOW64\dzulabg.exeC:\Windows\system32\dzulabg.exe 528 "C:\Windows\SysWOW64\qizjstb.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2652 -
C:\Windows\SysWOW64\dzulabg.exeC:\Windows\SysWOW64\dzulabg.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668 -
C:\Windows\SysWOW64\nnujyil.exeC:\Windows\system32\nnujyil.exe 528 "C:\Windows\SysWOW64\dzulabg.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3044 -
C:\Windows\SysWOW64\nnujyil.exeC:\Windows\SysWOW64\nnujyil.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2352 -
C:\Windows\SysWOW64\aepdhir.exeC:\Windows\system32\aepdhir.exe 528 "C:\Windows\SysWOW64\nnujyil.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2800 -
C:\Windows\SysWOW64\aepdhir.exeC:\Windows\SysWOW64\aepdhir.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524 -
C:\Windows\SysWOW64\ncsgprw.exeC:\Windows\system32\ncsgprw.exe 528 "C:\Windows\SysWOW64\aepdhir.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\ncsgprw.exeC:\Windows\SysWOW64\ncsgprw.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:780 -
C:\Windows\SysWOW64\zeywbdb.exeC:\Windows\system32\zeywbdb.exe 536 "C:\Windows\SysWOW64\ncsgprw.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:580 -
C:\Windows\SysWOW64\zeywbdb.exeC:\Windows\SysWOW64\zeywbdb.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\mrhlhzz.exeC:\Windows\system32\mrhlhzz.exe 532 "C:\Windows\SysWOW64\zeywbdb.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1816 -
C:\Windows\SysWOW64\mrhlhzz.exeC:\Windows\SysWOW64\mrhlhzz.exe66⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\wxijxgm.exeC:\Windows\system32\wxijxgm.exe 532 "C:\Windows\SysWOW64\mrhlhzz.exe"67⤵
- Suspicious use of SetThreadContext
PID:600 -
C:\Windows\SysWOW64\wxijxgm.exeC:\Windows\SysWOW64\wxijxgm.exe68⤵PID:2600
-
C:\Windows\SysWOW64\jwllfps.exeC:\Windows\system32\jwllfps.exe 528 "C:\Windows\SysWOW64\wxijxgm.exe"69⤵
- Suspicious use of SetThreadContext
PID:1616 -
C:\Windows\SysWOW64\jwllfps.exeC:\Windows\SysWOW64\jwllfps.exe70⤵
- Drops file in System32 directory
PID:1244 -
C:\Windows\SysWOW64\wmgowxy.exeC:\Windows\system32\wmgowxy.exe 528 "C:\Windows\SysWOW64\jwllfps.exe"71⤵
- Suspicious use of SetThreadContext
PID:1760 -
C:\Windows\SysWOW64\wmgowxy.exeC:\Windows\SysWOW64\wmgowxy.exe72⤵
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\jlarfxv.exeC:\Windows\system32\jlarfxv.exe 528 "C:\Windows\SysWOW64\wmgowxy.exe"73⤵
- Suspicious use of SetThreadContext
PID:1736 -
C:\Windows\SysWOW64\jlarfxv.exeC:\Windows\SysWOW64\jlarfxv.exe74⤵PID:300
-
C:\Windows\SysWOW64\wbdtnfb.exeC:\Windows\system32\wbdtnfb.exe 528 "C:\Windows\SysWOW64\jlarfxv.exe"75⤵
- Suspicious use of SetThreadContext
PID:1708 -
C:\Windows\SysWOW64\wbdtnfb.exeC:\Windows\SysWOW64\wbdtnfb.exe76⤵PID:2080
-
C:\Windows\SysWOW64\fpwjdmo.exeC:\Windows\system32\fpwjdmo.exe 528 "C:\Windows\SysWOW64\wbdtnfb.exe"77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\fpwjdmo.exeC:\Windows\SysWOW64\fpwjdmo.exe78⤵PID:2344
-
C:\Windows\SysWOW64\sgzmmnt.exeC:\Windows\system32\sgzmmnt.exe 528 "C:\Windows\SysWOW64\fpwjdmo.exe"79⤵
- Suspicious use of SetThreadContext
PID:880 -
C:\Windows\SysWOW64\sgzmmnt.exeC:\Windows\SysWOW64\sgzmmnt.exe80⤵PID:2400
-
C:\Windows\SysWOW64\feuouvr.exeC:\Windows\system32\feuouvr.exe 532 "C:\Windows\SysWOW64\sgzmmnt.exe"81⤵
- Suspicious use of SetThreadContext
PID:2284 -
C:\Windows\SysWOW64\feuouvr.exeC:\Windows\SysWOW64\feuouvr.exe82⤵PID:2272
-
C:\Windows\SysWOW64\svorddw.exeC:\Windows\system32\svorddw.exe 532 "C:\Windows\SysWOW64\feuouvr.exe"83⤵
- Suspicious use of SetThreadContext
PID:1592 -
C:\Windows\SysWOW64\svorddw.exeC:\Windows\SysWOW64\svorddw.exe84⤵PID:2620
-
C:\Windows\SysWOW64\flruudc.exeC:\Windows\system32\flruudc.exe 532 "C:\Windows\SysWOW64\svorddw.exe"85⤵
- Suspicious use of SetThreadContext
PID:2820 -
C:\Windows\SysWOW64\flruudc.exeC:\Windows\SysWOW64\flruudc.exe86⤵PID:2700
-
C:\Windows\SysWOW64\pzsrklp.exeC:\Windows\system32\pzsrklp.exe 540 "C:\Windows\SysWOW64\flruudc.exe"87⤵
- Suspicious use of SetThreadContext
PID:2748 -
C:\Windows\SysWOW64\pzsrklp.exeC:\Windows\SysWOW64\pzsrklp.exe88⤵PID:2508
-
C:\Windows\SysWOW64\cynustn.exeC:\Windows\system32\cynustn.exe 532 "C:\Windows\SysWOW64\pzsrklp.exe"89⤵
- Suspicious use of SetThreadContext
PID:2512 -
C:\Windows\SysWOW64\cynustn.exeC:\Windows\SysWOW64\cynustn.exe90⤵PID:2988
-
C:\Windows\SysWOW64\oohobts.exeC:\Windows\system32\oohobts.exe 532 "C:\Windows\SysWOW64\cynustn.exe"91⤵
- Suspicious use of SetThreadContext
PID:3052 -
C:\Windows\SysWOW64\oohobts.exeC:\Windows\SysWOW64\oohobts.exe92⤵PID:2720
-
C:\Windows\SysWOW64\bfkrjby.exeC:\Windows\system32\bfkrjby.exe 532 "C:\Windows\SysWOW64\oohobts.exe"93⤵
- Suspicious use of SetThreadContext
PID:396 -
C:\Windows\SysWOW64\bfkrjby.exeC:\Windows\SysWOW64\bfkrjby.exe94⤵PID:2728
-
C:\Windows\SysWOW64\odfusjv.exeC:\Windows\system32\odfusjv.exe 528 "C:\Windows\SysWOW64\bfkrjby.exe"95⤵
- Suspicious use of SetThreadContext
PID:2968 -
C:\Windows\SysWOW64\odfusjv.exeC:\Windows\SysWOW64\odfusjv.exe96⤵PID:2612
-
C:\Windows\SysWOW64\yrgrqri.exeC:\Windows\system32\yrgrqri.exe 528 "C:\Windows\SysWOW64\odfusjv.exe"97⤵
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\SysWOW64\yrgrqri.exeC:\Windows\SysWOW64\yrgrqri.exe98⤵PID:2832
-
C:\Windows\SysWOW64\lephwmh.exeC:\Windows\system32\lephwmh.exe 536 "C:\Windows\SysWOW64\yrgrqri.exe"99⤵
- Suspicious use of SetThreadContext
PID:1800 -
C:\Windows\SysWOW64\lephwmh.exeC:\Windows\SysWOW64\lephwmh.exe100⤵PID:2160
-
C:\Windows\SysWOW64\yydwhzu.exeC:\Windows\system32\yydwhzu.exe 528 "C:\Windows\SysWOW64\lephwmh.exe"101⤵
- Suspicious use of SetThreadContext
PID:1012 -
C:\Windows\SysWOW64\yydwhzu.exeC:\Windows\SysWOW64\yydwhzu.exe102⤵PID:676
-
C:\Windows\SysWOW64\lxyzqhr.exeC:\Windows\system32\lxyzqhr.exe 532 "C:\Windows\SysWOW64\yydwhzu.exe"103⤵
- Suspicious use of SetThreadContext
PID:2240 -
C:\Windows\SysWOW64\lxyzqhr.exeC:\Windows\SysWOW64\lxyzqhr.exe104⤵PID:1524
-
C:\Windows\SysWOW64\yntczhx.exeC:\Windows\system32\yntczhx.exe 536 "C:\Windows\SysWOW64\lxyzqhr.exe"105⤵
- Suspicious use of SetThreadContext
PID:1048 -
C:\Windows\SysWOW64\yntczhx.exeC:\Windows\SysWOW64\yntczhx.exe106⤵PID:2304
-
C:\Windows\SysWOW64\hbtrxpk.exeC:\Windows\system32\hbtrxpk.exe 532 "C:\Windows\SysWOW64\yntczhx.exe"107⤵
- Suspicious use of SetThreadContext
PID:2408 -
C:\Windows\SysWOW64\hbtrxpk.exeC:\Windows\SysWOW64\hbtrxpk.exe108⤵PID:2440
-
C:\Windows\SysWOW64\usoufxp.exeC:\Windows\system32\usoufxp.exe 528 "C:\Windows\SysWOW64\hbtrxpk.exe"109⤵
- Suspicious use of SetThreadContext
PID:2212 -
C:\Windows\SysWOW64\usoufxp.exeC:\Windows\SysWOW64\usoufxp.exe110⤵PID:1716
-
C:\Windows\SysWOW64\hqrxoxn.exeC:\Windows\system32\hqrxoxn.exe 528 "C:\Windows\SysWOW64\usoufxp.exe"111⤵
- Suspicious use of SetThreadContext
PID:268 -
C:\Windows\SysWOW64\hqrxoxn.exeC:\Windows\SysWOW64\hqrxoxn.exe112⤵PID:3036
-
C:\Windows\SysWOW64\uhmzwfs.exeC:\Windows\system32\uhmzwfs.exe 528 "C:\Windows\SysWOW64\hqrxoxn.exe"113⤵
- Suspicious use of SetThreadContext
PID:756 -
C:\Windows\SysWOW64\uhmzwfs.exeC:\Windows\SysWOW64\uhmzwfs.exe114⤵PID:2488
-
C:\Windows\SysWOW64\hfhcfny.exeC:\Windows\system32\hfhcfny.exe 528 "C:\Windows\SysWOW64\uhmzwfs.exe"115⤵
- Suspicious use of SetThreadContext
PID:1748 -
C:\Windows\SysWOW64\hfhcfny.exeC:\Windows\SysWOW64\hfhcfny.exe116⤵PID:1740
-
C:\Windows\SysWOW64\rmhzvvl.exeC:\Windows\system32\rmhzvvl.exe 520 "C:\Windows\SysWOW64\hfhcfny.exe"117⤵
- Suspicious use of SetThreadContext
PID:2836 -
C:\Windows\SysWOW64\rmhzvvl.exeC:\Windows\SysWOW64\rmhzvvl.exe118⤵PID:2536
-
C:\Windows\SysWOW64\dkkcmvj.exeC:\Windows\system32\dkkcmvj.exe 532 "C:\Windows\SysWOW64\rmhzvvl.exe"119⤵
- Suspicious use of SetThreadContext
PID:2508 -
C:\Windows\SysWOW64\dkkcmvj.exeC:\Windows\SysWOW64\dkkcmvj.exe120⤵
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\qbffudo.exeC:\Windows\system32\qbffudo.exe 528 "C:\Windows\SysWOW64\dkkcmvj.exe"121⤵
- Suspicious use of SetThreadContext
PID:2416 -
C:\Windows\SysWOW64\qbffudo.exeC:\Windows\SysWOW64\qbffudo.exe122⤵
- Drops file in System32 directory
PID:2684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-