Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe
-
Size
216KB
-
MD5
ba8a46d6910ea0e5b6958d330df95846
-
SHA1
7bb2e84a2016bae7673ae2d4e1a10893576590c0
-
SHA256
1db293f665a0457f1bf241b351dc7e4b92c9c2538a9b6ec61dbf79e97cf80305
-
SHA512
99844529382cd059d84dbfc02bb817f784c01531c6a55a94e264844793882af084658b60f106e41a59cb063c7e13fcb46befce1fe6d4450a8c3875845ed93649
-
SSDEEP
3072:P7PYO4HB1NxoMnmgnbd4UyAA5pJCiV8xC7813q57SytpwjdwmFc68Vq:TuHoMmISAg2iVYq5HqjdwmG6cq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 3172 ismwvdt.exe 3788 ismwvdt.exe 3652 kyszkvu.exe 3984 kyszkvu.exe 3992 yiyjnuu.exe 1180 yiyjnuu.exe 1392 idzuvov.exe 3656 idzuvov.exe 2372 nqtcoya.exe 3316 nqtcoya.exe 2448 ahnewyf.exe 212 ahnewyf.exe 2512 qikmyhd.exe 4776 qikmyhd.exe 5056 dyfpgpb.exe 3544 dyfpgpb.exe 3896 nugawkk.exe 3136 nugawkk.exe 4176 awmphoo.exe 2572 awmphoo.exe 4780 locvmfq.exe 2272 locvmfq.exe 4876 awnvtwl.exe 1636 awnvtwl.exe 3868 iaxichw.exe 1616 iaxichw.exe 1956 vysllpu.exe 3844 vysllpu.exe 3872 vfqqkyf.exe 4976 vfqqkyf.exe 3988 ddddoic.exe 1164 ddddoic.exe 4000 kkzviym.exe 2580 kkzviym.exe 3092 xxitobk.exe 3588 xxitobk.exe 4028 lhpwrtk.exe 1632 lhpwrtk.exe 2056 yxryzbi.exe 4032 yxryzbi.exe 2796 lwmbijn.exe 3032 lwmbijn.exe 4340 vrnmqeo.exe 4212 vrnmqeo.exe 4644 iltbbib.exe 3004 iltbbib.exe 3984 vvaeeis.exe 2556 vvaeeis.exe 1656 ixguxuf.exe 796 ixguxuf.exe 5060 nkpjdye.exe 3656 nkpjdye.exe 2448 xjbhoxl.exe 3296 xjbhoxl.exe 220 khwjwxj.exe 2416 khwjwxj.exe 3748 xrcuzwj.exe 5056 xrcuzwj.exe 872 leukfah.exe 3232 leukfah.exe 3460 yupnobn.exe 940 yupnobn.exe 1224 ictkgzv.exe 1924 ictkgzv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cozcvre.exe rsyrfww.exe File opened for modification C:\Windows\SysWOW64\juabvtq.exe xsutkgm.exe File opened for modification C:\Windows\SysWOW64\pbaalzm.exe efzqdfl.exe File created C:\Windows\SysWOW64\idzrhsm.exe vqhcboo.exe File created C:\Windows\SysWOW64\xhrfppt.exe nafixqu.exe File created C:\Windows\SysWOW64\zwsvepj.exe puctqmv.exe File opened for modification C:\Windows\SysWOW64\qruyzel.exe deditam.exe File opened for modification C:\Windows\SysWOW64\mjfqbms.exe zwwavqt.exe File opened for modification C:\Windows\SysWOW64\wbyewja.exe mfylooz.exe File opened for modification C:\Windows\SysWOW64\spblsbr.exe Process not Found File opened for modification C:\Windows\SysWOW64\zgxtbrv.exe mpcqtry.exe File created C:\Windows\SysWOW64\wgmjaex.exe jprgsdr.exe File created C:\Windows\SysWOW64\qpvznuy.exe Process not Found File opened for modification C:\Windows\SysWOW64\pofautw.exe Process not Found File created C:\Windows\SysWOW64\xayotox.exe Process not Found File opened for modification C:\Windows\SysWOW64\leukfah.exe xrcuzwj.exe File opened for modification C:\Windows\SysWOW64\gyejowa.exe thcggod.exe File opened for modification C:\Windows\SysWOW64\lcarler.exe balhqbl.exe File opened for modification C:\Windows\SysWOW64\mwtacml.exe zjklwqm.exe File created C:\Windows\SysWOW64\rlmcfmg.exe ejgmtiu.exe File created C:\Windows\SysWOW64\ksbbfnf.exe xfrmzjg.exe File opened for modification C:\Windows\SysWOW64\hswvxiv.exe Process not Found File opened for modification C:\Windows\SysWOW64\auswwby.exe nhigifr.exe File created C:\Windows\SysWOW64\raenvct.exe ebckmco.exe File opened for modification C:\Windows\SysWOW64\eizklly.exe rjwhcds.exe File created C:\Windows\SysWOW64\bsqayyb.exe ocvxiyw.exe File created C:\Windows\SysWOW64\anrqiof.exe qccfnlr.exe File created C:\Windows\SysWOW64\kyszkvu.exe ismwvdt.exe File opened for modification C:\Windows\SysWOW64\ilydthl.exe Process not Found File created C:\Windows\SysWOW64\aoejcqx.exe Process not Found File created C:\Windows\SysWOW64\ktnvjoc.exe Process not Found File opened for modification C:\Windows\SysWOW64\pkabzun.exe cxjltyo.exe File opened for modification C:\Windows\SysWOW64\xtfllxc.exe kgnwfbd.exe File opened for modification C:\Windows\SysWOW64\rhvabxa.exe eumkvtb.exe File opened for modification C:\Windows\SysWOW64\vpkamdt.exe ictkgzv.exe File opened for modification C:\Windows\SysWOW64\rtelvoy.exe dguwpkz.exe File opened for modification C:\Windows\SysWOW64\oxdrxtt.exe acmtspu.exe File created C:\Windows\SysWOW64\conahwa.exe pbvlbst.exe File opened for modification C:\Windows\SysWOW64\prganzp.exe fvopgfo.exe File opened for modification C:\Windows\SysWOW64\zpcdmgw.exe mukngdx.exe File opened for modification C:\Windows\SysWOW64\gahaaxb.exe Process not Found File opened for modification C:\Windows\SysWOW64\lwrugoc.exe Process not Found File opened for modification C:\Windows\SysWOW64\sqestod.exe foykiky.exe File opened for modification C:\Windows\SysWOW64\rifsshp.exe bhicrgr.exe File created C:\Windows\SysWOW64\yulkfcx.exe khbuzgz.exe File opened for modification C:\Windows\SysWOW64\sfztfgd.exe Process not Found File created C:\Windows\SysWOW64\dnkljxi.exe Process not Found File opened for modification C:\Windows\SysWOW64\sqfgfwi.exe fdnqzsb.exe File opened for modification C:\Windows\SysWOW64\xgmbfay.exe ktdlzer.exe File opened for modification C:\Windows\SysWOW64\zcgpnib.exe lsafkqb.exe File created C:\Windows\SysWOW64\efzqdfl.exe owcicwn.exe File created C:\Windows\SysWOW64\mpcqtry.exe ctbglxp.exe File created C:\Windows\SysWOW64\mzddufg.exe cszfkgz.exe File created C:\Windows\SysWOW64\vxcmjcp.exe iksxdyq.exe File created C:\Windows\SysWOW64\aycvfgz.exe qnnlscl.exe File created C:\Windows\SysWOW64\cbsxbko.exe poiivgi.exe File created C:\Windows\SysWOW64\xwrwefh.exe kjzgybj.exe File opened for modification C:\Windows\SysWOW64\hmdctvb.exe unahdnd.exe File opened for modification C:\Windows\SysWOW64\hnarugb.exe uajbgkc.exe File opened for modification C:\Windows\SysWOW64\vktxivn.exe Process not Found File created C:\Windows\SysWOW64\sbiamsk.exe frbxjtk.exe File opened for modification C:\Windows\SysWOW64\wgmjaex.exe jprgsdr.exe File opened for modification C:\Windows\SysWOW64\rurscxs.exe ehacxtu.exe File created C:\Windows\SysWOW64\mmvtfyj.exe yzedzcl.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1556 set thread context of 4920 1556 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 83 PID 3172 set thread context of 3788 3172 ismwvdt.exe 85 PID 3652 set thread context of 3984 3652 kyszkvu.exe 87 PID 3992 set thread context of 1180 3992 yiyjnuu.exe 89 PID 1392 set thread context of 3656 1392 idzuvov.exe 91 PID 2372 set thread context of 3316 2372 nqtcoya.exe 93 PID 2448 set thread context of 212 2448 ahnewyf.exe 95 PID 2512 set thread context of 4776 2512 qikmyhd.exe 97 PID 5056 set thread context of 3544 5056 dyfpgpb.exe 99 PID 3896 set thread context of 3136 3896 nugawkk.exe 101 PID 4176 set thread context of 2572 4176 awmphoo.exe 103 PID 4780 set thread context of 2272 4780 locvmfq.exe 105 PID 4876 set thread context of 1636 4876 awnvtwl.exe 107 PID 3868 set thread context of 1616 3868 iaxichw.exe 109 PID 1956 set thread context of 3844 1956 vysllpu.exe 111 PID 3872 set thread context of 4976 3872 vfqqkyf.exe 113 PID 3988 set thread context of 1164 3988 ddddoic.exe 115 PID 4000 set thread context of 2580 4000 kkzviym.exe 117 PID 3092 set thread context of 3588 3092 xxitobk.exe 119 PID 2056 set thread context of 4032 2056 yxryzbi.exe 123 PID 2796 set thread context of 3032 2796 lwmbijn.exe 125 PID 4340 set thread context of 4212 4340 vrnmqeo.exe 127 PID 4644 set thread context of 3004 4644 iltbbib.exe 129 PID 3984 set thread context of 2556 3984 vvaeeis.exe 131 PID 1656 set thread context of 796 1656 ixguxuf.exe 133 PID 5060 set thread context of 3656 5060 nkpjdye.exe 135 PID 2448 set thread context of 3296 2448 xjbhoxl.exe 137 PID 220 set thread context of 2416 220 khwjwxj.exe 139 PID 3748 set thread context of 5056 3748 xrcuzwj.exe 141 PID 872 set thread context of 3232 872 leukfah.exe 143 PID 3460 set thread context of 940 3460 yupnobn.exe 145 PID 1224 set thread context of 1924 1224 ictkgzv.exe 147 PID 1596 set thread context of 4896 1596 vpkamdt.exe 149 PID 4876 set thread context of 3924 4876 iccpshs.exe 151 PID 648 set thread context of 3412 648 serafky.exe 153 PID 388 set thread context of 1528 388 foykiky.exe 155 PID 1788 set thread context of 5100 1788 sqestod.exe 157 PID 3964 set thread context of 4456 3964 fdnqzsb.exe 159 PID 3696 set thread context of 4872 3696 sqfgfwi.exe 161 PID 1316 set thread context of 3036 1316 cxjdxvi.exe 163 PID 3420 set thread context of 2348 3420 pnmggvn.exe 165 PID 4892 set thread context of 1244 4892 cavvmzm.exe 167 PID 1584 set thread context of 2880 1584 qnnlscl.exe 169 PID 1632 set thread context of 768 1632 aycvfgz.exe 171 PID 2120 set thread context of 3652 2120 nhigifr.exe 173 PID 728 set thread context of 688 728 auswwby.exe 175 PID 3972 set thread context of 1380 3972 kxpgjee.exe 177 PID 2164 set thread context of 1988 2164 xszwpid.exe 179 PID 2452 set thread context of 2384 2452 kiczxqj.exe 181 PID 2528 set thread context of 2948 2528 ysabaqj.exe 183 PID 1992 set thread context of 3664 1992 hvxmnlp.exe 185 PID 4516 set thread context of 2116 4516 vqhcboo.exe 187 PID 3488 set thread context of 3524 3488 idzrhsm.exe 189 PID 3544 set thread context of 2676 3544 vttuqas.exe 191 PID 5096 set thread context of 4584 5096 fsfraza.exe 193 PID 4552 set thread context of 3484 4552 sraujzx.exe 195 PID 2404 set thread context of 4860 2404 fahfmzx.exe 197 PID 2840 set thread context of 4692 2840 srbhuhd.exe 199 PID 1636 set thread context of 4480 1636 fetxadb.exe 201 PID 644 set thread context of 5012 644 poiivgi.exe 203 PID 4452 set thread context of 2944 4452 cbsxbko.exe 205 PID 4128 set thread context of 1156 4128 qlyaejg.exe 207 PID 2668 set thread context of 2168 2668 anokrnv.exe 209 PID 2176 set thread context of 1124 2176 nafixqu.exe 211 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbsxbko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qaaoxge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pubnaiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjjxhei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zcgpnib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjchtuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewkecwl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrmzjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhvabxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chtvliw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqzgbwq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mukngdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jggsbbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgvvpub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccafxon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cirshfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnhyagh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cynnikj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwapgrc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qikmyhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyfpgpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxitobk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjlpybl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zenkdkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npcemlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgpbtof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kovwhoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxwbedw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ityvbic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ytlxqev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvaeeis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odxhyvq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixgctye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyfbbuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vysllpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xixmxqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khbuzgz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rzxepgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttxmjed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmtjfqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqsuygt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqpjyll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moyoksi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ficchxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhakqft.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1556 wrote to memory of 4920 1556 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 83 PID 1556 wrote to memory of 4920 1556 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 83 PID 1556 wrote to memory of 4920 1556 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 83 PID 1556 wrote to memory of 4920 1556 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 83 PID 1556 wrote to memory of 4920 1556 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 83 PID 4920 wrote to memory of 3172 4920 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 84 PID 4920 wrote to memory of 3172 4920 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 84 PID 4920 wrote to memory of 3172 4920 ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe 84 PID 3172 wrote to memory of 3788 3172 ismwvdt.exe 85 PID 3172 wrote to memory of 3788 3172 ismwvdt.exe 85 PID 3172 wrote to memory of 3788 3172 ismwvdt.exe 85 PID 3172 wrote to memory of 3788 3172 ismwvdt.exe 85 PID 3172 wrote to memory of 3788 3172 ismwvdt.exe 85 PID 3788 wrote to memory of 3652 3788 ismwvdt.exe 86 PID 3788 wrote to memory of 3652 3788 ismwvdt.exe 86 PID 3788 wrote to memory of 3652 3788 ismwvdt.exe 86 PID 3652 wrote to memory of 3984 3652 kyszkvu.exe 87 PID 3652 wrote to memory of 3984 3652 kyszkvu.exe 87 PID 3652 wrote to memory of 3984 3652 kyszkvu.exe 87 PID 3652 wrote to memory of 3984 3652 kyszkvu.exe 87 PID 3652 wrote to memory of 3984 3652 kyszkvu.exe 87 PID 3984 wrote to memory of 3992 3984 kyszkvu.exe 88 PID 3984 wrote to memory of 3992 3984 kyszkvu.exe 88 PID 3984 wrote to memory of 3992 3984 kyszkvu.exe 88 PID 3992 wrote to memory of 1180 3992 yiyjnuu.exe 89 PID 3992 wrote to memory of 1180 3992 yiyjnuu.exe 89 PID 3992 wrote to memory of 1180 3992 yiyjnuu.exe 89 PID 3992 wrote to memory of 1180 3992 yiyjnuu.exe 89 PID 3992 wrote to memory of 1180 3992 yiyjnuu.exe 89 PID 1180 wrote to memory of 1392 1180 yiyjnuu.exe 90 PID 1180 wrote to memory of 1392 1180 yiyjnuu.exe 90 PID 1180 wrote to memory of 1392 1180 yiyjnuu.exe 90 PID 1392 wrote to memory of 3656 1392 idzuvov.exe 91 PID 1392 wrote to memory of 3656 1392 idzuvov.exe 91 PID 1392 wrote to memory of 3656 1392 idzuvov.exe 91 PID 1392 wrote to memory of 3656 1392 idzuvov.exe 91 PID 1392 wrote to memory of 3656 1392 idzuvov.exe 91 PID 3656 wrote to memory of 2372 3656 idzuvov.exe 92 PID 3656 wrote to memory of 2372 3656 idzuvov.exe 92 PID 3656 wrote to memory of 2372 3656 idzuvov.exe 92 PID 2372 wrote to memory of 3316 2372 nqtcoya.exe 93 PID 2372 wrote to memory of 3316 2372 nqtcoya.exe 93 PID 2372 wrote to memory of 3316 2372 nqtcoya.exe 93 PID 2372 wrote to memory of 3316 2372 nqtcoya.exe 93 PID 2372 wrote to memory of 3316 2372 nqtcoya.exe 93 PID 3316 wrote to memory of 2448 3316 nqtcoya.exe 94 PID 3316 wrote to memory of 2448 3316 nqtcoya.exe 94 PID 3316 wrote to memory of 2448 3316 nqtcoya.exe 94 PID 2448 wrote to memory of 212 2448 ahnewyf.exe 95 PID 2448 wrote to memory of 212 2448 ahnewyf.exe 95 PID 2448 wrote to memory of 212 2448 ahnewyf.exe 95 PID 2448 wrote to memory of 212 2448 ahnewyf.exe 95 PID 2448 wrote to memory of 212 2448 ahnewyf.exe 95 PID 212 wrote to memory of 2512 212 ahnewyf.exe 96 PID 212 wrote to memory of 2512 212 ahnewyf.exe 96 PID 212 wrote to memory of 2512 212 ahnewyf.exe 96 PID 2512 wrote to memory of 4776 2512 qikmyhd.exe 97 PID 2512 wrote to memory of 4776 2512 qikmyhd.exe 97 PID 2512 wrote to memory of 4776 2512 qikmyhd.exe 97 PID 2512 wrote to memory of 4776 2512 qikmyhd.exe 97 PID 2512 wrote to memory of 4776 2512 qikmyhd.exe 97 PID 4776 wrote to memory of 5056 4776 qikmyhd.exe 98 PID 4776 wrote to memory of 5056 4776 qikmyhd.exe 98 PID 4776 wrote to memory of 5056 4776 qikmyhd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\ismwvdt.exeC:\Windows\system32\ismwvdt.exe 1000 "C:\Users\Admin\AppData\Local\Temp\ba8a46d6910ea0e5b6958d330df95846_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\ismwvdt.exeC:\Windows\SysWOW64\ismwvdt.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\kyszkvu.exeC:\Windows\system32\kyszkvu.exe 1148 "C:\Windows\SysWOW64\ismwvdt.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\kyszkvu.exeC:\Windows\SysWOW64\kyszkvu.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\yiyjnuu.exeC:\Windows\system32\yiyjnuu.exe 1148 "C:\Windows\SysWOW64\kyszkvu.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\yiyjnuu.exeC:\Windows\SysWOW64\yiyjnuu.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\idzuvov.exeC:\Windows\system32\idzuvov.exe 1148 "C:\Windows\SysWOW64\yiyjnuu.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\idzuvov.exeC:\Windows\SysWOW64\idzuvov.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\nqtcoya.exeC:\Windows\system32\nqtcoya.exe 1152 "C:\Windows\SysWOW64\idzuvov.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\nqtcoya.exeC:\Windows\SysWOW64\nqtcoya.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\ahnewyf.exeC:\Windows\system32\ahnewyf.exe 1148 "C:\Windows\SysWOW64\nqtcoya.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\ahnewyf.exeC:\Windows\SysWOW64\ahnewyf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\qikmyhd.exeC:\Windows\system32\qikmyhd.exe 1148 "C:\Windows\SysWOW64\ahnewyf.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\qikmyhd.exeC:\Windows\SysWOW64\qikmyhd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\dyfpgpb.exeC:\Windows\system32\dyfpgpb.exe 1152 "C:\Windows\SysWOW64\qikmyhd.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5056 -
C:\Windows\SysWOW64\dyfpgpb.exeC:\Windows\SysWOW64\dyfpgpb.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\SysWOW64\nugawkk.exeC:\Windows\system32\nugawkk.exe 1148 "C:\Windows\SysWOW64\dyfpgpb.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3896 -
C:\Windows\SysWOW64\nugawkk.exeC:\Windows\SysWOW64\nugawkk.exe20⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\awmphoo.exeC:\Windows\system32\awmphoo.exe 1148 "C:\Windows\SysWOW64\nugawkk.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4176 -
C:\Windows\SysWOW64\awmphoo.exeC:\Windows\SysWOW64\awmphoo.exe22⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\locvmfq.exeC:\Windows\system32\locvmfq.exe 1148 "C:\Windows\SysWOW64\awmphoo.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4780 -
C:\Windows\SysWOW64\locvmfq.exeC:\Windows\SysWOW64\locvmfq.exe24⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\awnvtwl.exeC:\Windows\system32\awnvtwl.exe 1148 "C:\Windows\SysWOW64\locvmfq.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4876 -
C:\Windows\SysWOW64\awnvtwl.exeC:\Windows\SysWOW64\awnvtwl.exe26⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\iaxichw.exeC:\Windows\system32\iaxichw.exe 1148 "C:\Windows\SysWOW64\awnvtwl.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3868 -
C:\Windows\SysWOW64\iaxichw.exeC:\Windows\SysWOW64\iaxichw.exe28⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\vysllpu.exeC:\Windows\system32\vysllpu.exe 1148 "C:\Windows\SysWOW64\iaxichw.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\vysllpu.exeC:\Windows\SysWOW64\vysllpu.exe30⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\vfqqkyf.exeC:\Windows\system32\vfqqkyf.exe 1040 "C:\Windows\SysWOW64\vysllpu.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3872 -
C:\Windows\SysWOW64\vfqqkyf.exeC:\Windows\SysWOW64\vfqqkyf.exe32⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\SysWOW64\ddddoic.exeC:\Windows\system32\ddddoic.exe 1036 "C:\Windows\SysWOW64\vfqqkyf.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3988 -
C:\Windows\SysWOW64\ddddoic.exeC:\Windows\SysWOW64\ddddoic.exe34⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\kkzviym.exeC:\Windows\system32\kkzviym.exe 1148 "C:\Windows\SysWOW64\ddddoic.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4000 -
C:\Windows\SysWOW64\kkzviym.exeC:\Windows\SysWOW64\kkzviym.exe36⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\xxitobk.exeC:\Windows\system32\xxitobk.exe 1152 "C:\Windows\SysWOW64\kkzviym.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3092 -
C:\Windows\SysWOW64\xxitobk.exeC:\Windows\SysWOW64\xxitobk.exe38⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\SysWOW64\lhpwrtk.exeC:\Windows\system32\lhpwrtk.exe 1148 "C:\Windows\SysWOW64\xxitobk.exe"39⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\lhpwrtk.exeC:\Windows\SysWOW64\lhpwrtk.exe40⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\yxryzbi.exeC:\Windows\system32\yxryzbi.exe 1148 "C:\Windows\SysWOW64\lhpwrtk.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2056 -
C:\Windows\SysWOW64\yxryzbi.exeC:\Windows\SysWOW64\yxryzbi.exe42⤵
- Executes dropped EXE
PID:4032 -
C:\Windows\SysWOW64\lwmbijn.exeC:\Windows\system32\lwmbijn.exe 1148 "C:\Windows\SysWOW64\yxryzbi.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2796 -
C:\Windows\SysWOW64\lwmbijn.exeC:\Windows\SysWOW64\lwmbijn.exe44⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\vrnmqeo.exeC:\Windows\system32\vrnmqeo.exe 1148 "C:\Windows\SysWOW64\lwmbijn.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4340 -
C:\Windows\SysWOW64\vrnmqeo.exeC:\Windows\SysWOW64\vrnmqeo.exe46⤵
- Executes dropped EXE
PID:4212 -
C:\Windows\SysWOW64\iltbbib.exeC:\Windows\system32\iltbbib.exe 1148 "C:\Windows\SysWOW64\vrnmqeo.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4644 -
C:\Windows\SysWOW64\iltbbib.exeC:\Windows\SysWOW64\iltbbib.exe48⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\vvaeeis.exeC:\Windows\system32\vvaeeis.exe 1144 "C:\Windows\SysWOW64\iltbbib.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3984 -
C:\Windows\SysWOW64\vvaeeis.exeC:\Windows\SysWOW64\vvaeeis.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\ixguxuf.exeC:\Windows\system32\ixguxuf.exe 1148 "C:\Windows\SysWOW64\vvaeeis.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1656 -
C:\Windows\SysWOW64\ixguxuf.exeC:\Windows\SysWOW64\ixguxuf.exe52⤵
- Executes dropped EXE
PID:796 -
C:\Windows\SysWOW64\nkpjdye.exeC:\Windows\system32\nkpjdye.exe 1152 "C:\Windows\SysWOW64\ixguxuf.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5060 -
C:\Windows\SysWOW64\nkpjdye.exeC:\Windows\SysWOW64\nkpjdye.exe54⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\SysWOW64\xjbhoxl.exeC:\Windows\system32\xjbhoxl.exe 1148 "C:\Windows\SysWOW64\nkpjdye.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2448 -
C:\Windows\SysWOW64\xjbhoxl.exeC:\Windows\SysWOW64\xjbhoxl.exe56⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\khwjwxj.exeC:\Windows\system32\khwjwxj.exe 1148 "C:\Windows\SysWOW64\xjbhoxl.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:220 -
C:\Windows\SysWOW64\khwjwxj.exeC:\Windows\SysWOW64\khwjwxj.exe58⤵
- Executes dropped EXE
PID:2416 -
C:\Windows\SysWOW64\xrcuzwj.exeC:\Windows\system32\xrcuzwj.exe 1132 "C:\Windows\SysWOW64\khwjwxj.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3748 -
C:\Windows\SysWOW64\xrcuzwj.exeC:\Windows\SysWOW64\xrcuzwj.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5056 -
C:\Windows\SysWOW64\leukfah.exeC:\Windows\system32\leukfah.exe 1148 "C:\Windows\SysWOW64\xrcuzwj.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:872 -
C:\Windows\SysWOW64\leukfah.exeC:\Windows\SysWOW64\leukfah.exe62⤵
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\yupnobn.exeC:\Windows\system32\yupnobn.exe 1148 "C:\Windows\SysWOW64\leukfah.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3460 -
C:\Windows\SysWOW64\yupnobn.exeC:\Windows\SysWOW64\yupnobn.exe64⤵
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\ictkgzv.exeC:\Windows\system32\ictkgzv.exe 1148 "C:\Windows\SysWOW64\yupnobn.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1224 -
C:\Windows\SysWOW64\ictkgzv.exeC:\Windows\SysWOW64\ictkgzv.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\vpkamdt.exeC:\Windows\system32\vpkamdt.exe 1148 "C:\Windows\SysWOW64\ictkgzv.exe"67⤵
- Suspicious use of SetThreadContext
PID:1596 -
C:\Windows\SysWOW64\vpkamdt.exeC:\Windows\SysWOW64\vpkamdt.exe68⤵PID:4896
-
C:\Windows\SysWOW64\iccpshs.exeC:\Windows\system32\iccpshs.exe 1152 "C:\Windows\SysWOW64\vpkamdt.exe"69⤵
- Suspicious use of SetThreadContext
PID:4876 -
C:\Windows\SysWOW64\iccpshs.exeC:\Windows\SysWOW64\iccpshs.exe70⤵PID:3924
-
C:\Windows\SysWOW64\serafky.exeC:\Windows\system32\serafky.exe 1148 "C:\Windows\SysWOW64\iccpshs.exe"71⤵
- Suspicious use of SetThreadContext
PID:648 -
C:\Windows\SysWOW64\serafky.exeC:\Windows\SysWOW64\serafky.exe72⤵PID:3412
-
C:\Windows\SysWOW64\foykiky.exeC:\Windows\system32\foykiky.exe 1148 "C:\Windows\SysWOW64\serafky.exe"73⤵
- Suspicious use of SetThreadContext
PID:388 -
C:\Windows\SysWOW64\foykiky.exeC:\Windows\SysWOW64\foykiky.exe74⤵
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\sqestod.exeC:\Windows\system32\sqestod.exe 1148 "C:\Windows\SysWOW64\foykiky.exe"75⤵
- Suspicious use of SetThreadContext
PID:1788 -
C:\Windows\SysWOW64\sqestod.exeC:\Windows\SysWOW64\sqestod.exe76⤵PID:5100
-
C:\Windows\SysWOW64\fdnqzsb.exeC:\Windows\system32\fdnqzsb.exe 1148 "C:\Windows\SysWOW64\sqestod.exe"77⤵
- Suspicious use of SetThreadContext
PID:3964 -
C:\Windows\SysWOW64\fdnqzsb.exeC:\Windows\SysWOW64\fdnqzsb.exe78⤵
- Drops file in System32 directory
PID:4456 -
C:\Windows\SysWOW64\sqfgfwi.exeC:\Windows\system32\sqfgfwi.exe 1148 "C:\Windows\SysWOW64\fdnqzsb.exe"79⤵
- Suspicious use of SetThreadContext
PID:3696 -
C:\Windows\SysWOW64\sqfgfwi.exeC:\Windows\SysWOW64\sqfgfwi.exe80⤵PID:4872
-
C:\Windows\SysWOW64\cxjdxvi.exeC:\Windows\system32\cxjdxvi.exe 1140 "C:\Windows\SysWOW64\sqfgfwi.exe"81⤵
- Suspicious use of SetThreadContext
PID:1316 -
C:\Windows\SysWOW64\cxjdxvi.exeC:\Windows\SysWOW64\cxjdxvi.exe82⤵PID:3036
-
C:\Windows\SysWOW64\pnmggvn.exeC:\Windows\system32\pnmggvn.exe 1148 "C:\Windows\SysWOW64\cxjdxvi.exe"83⤵
- Suspicious use of SetThreadContext
PID:3420 -
C:\Windows\SysWOW64\pnmggvn.exeC:\Windows\SysWOW64\pnmggvn.exe84⤵PID:2348
-
C:\Windows\SysWOW64\cavvmzm.exeC:\Windows\system32\cavvmzm.exe 1152 "C:\Windows\SysWOW64\pnmggvn.exe"85⤵
- Suspicious use of SetThreadContext
PID:4892 -
C:\Windows\SysWOW64\cavvmzm.exeC:\Windows\SysWOW64\cavvmzm.exe86⤵PID:1244
-
C:\Windows\SysWOW64\qnnlscl.exeC:\Windows\system32\qnnlscl.exe 1148 "C:\Windows\SysWOW64\cavvmzm.exe"87⤵
- Suspicious use of SetThreadContext
PID:1584 -
C:\Windows\SysWOW64\qnnlscl.exeC:\Windows\SysWOW64\qnnlscl.exe88⤵
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\aycvfgz.exeC:\Windows\system32\aycvfgz.exe 1152 "C:\Windows\SysWOW64\qnnlscl.exe"89⤵
- Suspicious use of SetThreadContext
PID:1632 -
C:\Windows\SysWOW64\aycvfgz.exeC:\Windows\SysWOW64\aycvfgz.exe90⤵PID:768
-
C:\Windows\SysWOW64\nhigifr.exeC:\Windows\system32\nhigifr.exe 1148 "C:\Windows\SysWOW64\aycvfgz.exe"91⤵
- Suspicious use of SetThreadContext
PID:2120 -
C:\Windows\SysWOW64\nhigifr.exeC:\Windows\SysWOW64\nhigifr.exe92⤵
- Drops file in System32 directory
PID:3652 -
C:\Windows\SysWOW64\auswwby.exeC:\Windows\system32\auswwby.exe 1148 "C:\Windows\SysWOW64\nhigifr.exe"93⤵
- Suspicious use of SetThreadContext
PID:728 -
C:\Windows\SysWOW64\auswwby.exeC:\Windows\SysWOW64\auswwby.exe94⤵PID:688
-
C:\Windows\SysWOW64\kxpgjee.exeC:\Windows\system32\kxpgjee.exe 1148 "C:\Windows\SysWOW64\auswwby.exe"95⤵
- Suspicious use of SetThreadContext
PID:3972 -
C:\Windows\SysWOW64\kxpgjee.exeC:\Windows\SysWOW64\kxpgjee.exe96⤵PID:1380
-
C:\Windows\SysWOW64\xszwpid.exeC:\Windows\system32\xszwpid.exe 1148 "C:\Windows\SysWOW64\kxpgjee.exe"97⤵
- Suspicious use of SetThreadContext
PID:2164 -
C:\Windows\SysWOW64\xszwpid.exeC:\Windows\SysWOW64\xszwpid.exe98⤵PID:1988
-
C:\Windows\SysWOW64\kiczxqj.exeC:\Windows\system32\kiczxqj.exe 1148 "C:\Windows\SysWOW64\xszwpid.exe"99⤵
- Suspicious use of SetThreadContext
PID:2452 -
C:\Windows\SysWOW64\kiczxqj.exeC:\Windows\SysWOW64\kiczxqj.exe100⤵PID:2384
-
C:\Windows\SysWOW64\ysabaqj.exeC:\Windows\system32\ysabaqj.exe 1132 "C:\Windows\SysWOW64\kiczxqj.exe"101⤵
- Suspicious use of SetThreadContext
PID:2528 -
C:\Windows\SysWOW64\ysabaqj.exeC:\Windows\SysWOW64\ysabaqj.exe102⤵PID:2948
-
C:\Windows\SysWOW64\hvxmnlp.exeC:\Windows\system32\hvxmnlp.exe 1156 "C:\Windows\SysWOW64\ysabaqj.exe"103⤵
- Suspicious use of SetThreadContext
PID:1992 -
C:\Windows\SysWOW64\hvxmnlp.exeC:\Windows\SysWOW64\hvxmnlp.exe104⤵PID:3664
-
C:\Windows\SysWOW64\vqhcboo.exeC:\Windows\system32\vqhcboo.exe 1148 "C:\Windows\SysWOW64\hvxmnlp.exe"105⤵
- Suspicious use of SetThreadContext
PID:4516 -
C:\Windows\SysWOW64\vqhcboo.exeC:\Windows\SysWOW64\vqhcboo.exe106⤵
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\idzrhsm.exeC:\Windows\system32\idzrhsm.exe 1148 "C:\Windows\SysWOW64\vqhcboo.exe"107⤵
- Suspicious use of SetThreadContext
PID:3488 -
C:\Windows\SysWOW64\idzrhsm.exeC:\Windows\SysWOW64\idzrhsm.exe108⤵PID:3524
-
C:\Windows\SysWOW64\vttuqas.exeC:\Windows\system32\vttuqas.exe 1140 "C:\Windows\SysWOW64\idzrhsm.exe"109⤵
- Suspicious use of SetThreadContext
PID:3544 -
C:\Windows\SysWOW64\vttuqas.exeC:\Windows\SysWOW64\vttuqas.exe110⤵PID:2676
-
C:\Windows\SysWOW64\fsfraza.exeC:\Windows\system32\fsfraza.exe 1148 "C:\Windows\SysWOW64\vttuqas.exe"111⤵
- Suspicious use of SetThreadContext
PID:5096 -
C:\Windows\SysWOW64\fsfraza.exeC:\Windows\SysWOW64\fsfraza.exe112⤵PID:4584
-
C:\Windows\SysWOW64\sraujzx.exeC:\Windows\system32\sraujzx.exe 1152 "C:\Windows\SysWOW64\fsfraza.exe"113⤵
- Suspicious use of SetThreadContext
PID:4552 -
C:\Windows\SysWOW64\sraujzx.exeC:\Windows\SysWOW64\sraujzx.exe114⤵PID:3484
-
C:\Windows\SysWOW64\fahfmzx.exeC:\Windows\system32\fahfmzx.exe 1148 "C:\Windows\SysWOW64\sraujzx.exe"115⤵
- Suspicious use of SetThreadContext
PID:2404 -
C:\Windows\SysWOW64\fahfmzx.exeC:\Windows\SysWOW64\fahfmzx.exe116⤵PID:4860
-
C:\Windows\SysWOW64\srbhuhd.exeC:\Windows\system32\srbhuhd.exe 1148 "C:\Windows\SysWOW64\fahfmzx.exe"117⤵
- Suspicious use of SetThreadContext
PID:2840 -
C:\Windows\SysWOW64\srbhuhd.exeC:\Windows\SysWOW64\srbhuhd.exe118⤵PID:4692
-
C:\Windows\SysWOW64\fetxadb.exeC:\Windows\system32\fetxadb.exe 1152 "C:\Windows\SysWOW64\srbhuhd.exe"119⤵
- Suspicious use of SetThreadContext
PID:1636 -
C:\Windows\SysWOW64\fetxadb.exeC:\Windows\SysWOW64\fetxadb.exe120⤵PID:4480
-
C:\Windows\SysWOW64\poiivgi.exeC:\Windows\system32\poiivgi.exe 1152 "C:\Windows\SysWOW64\fetxadb.exe"121⤵
- Suspicious use of SetThreadContext
PID:644 -
C:\Windows\SysWOW64\poiivgi.exeC:\Windows\SysWOW64\poiivgi.exe122⤵
- Drops file in System32 directory
PID:5012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-