Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 04:53
Behavioral task
behavioral1
Sample
c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe
-
Size
214KB
-
MD5
c600781fde274aaae3e3cc8d8182c96a
-
SHA1
01826294aba79842e5d3e8c5379ebc49072764aa
-
SHA256
f31d7d76860d41aae3b486113685349d00e0bd70d0f39239136df87e144e0c8d
-
SHA512
a40614b0df4929f8d0d73de0c1de06b670b4787bd803d0c7134715524c90d9d6b4bc74d41653cf97c182c9dc9e66a7e1776a3de40537bc8841a5eb1f1ddacfe8
-
SSDEEP
3072:B6eYiCbQmQQaCZWF7QhDXkJVJ8XFRGS9XhKaE74nk2le1wdQLeKzb1/d6+d+GB/o:X2c2XqJ82S9Ql75strq3HBez0Y5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 21 IoCs
resource yara_rule behavioral2/memory/4196-4-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/files/0x000b000000023b71-9.dat modiloader_stage2 behavioral2/memory/1508-14-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/976-27-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/4288-37-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/2412-47-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/4432-57-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/1504-65-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/2432-75-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/1004-83-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/2188-92-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/4472-101-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/3708-110-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/4152-120-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/4104-129-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/316-137-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/3972-147-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/4952-155-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/228-164-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/2304-173-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 behavioral2/memory/1116-182-0x0000000010000000-0x000000001003C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 1508 yllcbyznz.exe 1032 yllcbyznz.exe 976 yxxuykdzg.exe 4028 yxxuykdzg.exe 4288 isyfffefu.exe 5052 isyfffefu.exe 2412 qalfsunpt.exe 4544 qalfsunpt.exe 4432 awmphoouh.exe 2864 awmphoouh.exe 1504 idjvflvej.exe 4924 idjvflvej.exe 2432 szbfvgwbw.exe 1940 szbfvgwbw.exe 1004 futvakdol.exe 2500 futvakdol.exe 2188 thltgobtz.exe 3568 thltgobtz.exe 4472 ddddoicqn.exe 3612 ddddoicqn.exe 3708 ncqbyhkqn.exe 3428 ncqbyhkqn.exe 4152 cvmvivmht.exe 4144 cvmvivmht.exe 4104 qiwlozluh.exe 1652 qiwlozluh.exe 316 aexwdtlrv.exe 3220 aexwdtlrv.exe 3972 nndggllbo.exe 2144 nndggllbo.exe 4952 aeyjptrjp.exe 3660 aeyjptrjp.exe 228 iiioyeuyc.exe 1380 iiioyeuyc.exe 2304 sejhogueq.exe 1696 sejhogueq.exe 1116 fcejwgalq.exe 1068 fcejwgalq.exe 5036 hbihhfikr.exe 3104 hbihhfikr.exe 4172 vozwnjgpf.exe 3456 vozwnjgpf.exe 4028 lsirrodkm.exe 3212 lsirrodkm.exe 4436 vampbnljm.exe 4920 vampbnljm.exe 4284 leukfahet.exe 3100 leukfahet.exe 1504 vdyhyzpdb.exe 2396 vdyhyzpdb.exe 1620 fccfiyxdb.exe 1188 fccfiyxdb.exe 4072 smiplxonv.exe 3280 smiplxonv.exe 4644 fklsuyuvw.exe 2112 fklsuyuvw.exe 964 sxvizbtzk.exe 3572 sxvizbtzk.exe 2216 caksnfhbx.exe 3288 caksnfhbx.exe 3420 pvciaiggd.exe 3336 pvciaiggd.exe 5076 ditygeftr.exe 1880 ditygeftr.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tuuozpgiw.exe gzcyllzvh.exe File created C:\Windows\SysWOW64\qbsqzpsja.exe Process not Found File created C:\Windows\SysWOW64\dweyifpjw.exe Process not Found File opened for modification C:\Windows\SysWOW64\kzojeuryf.exe Process not Found File created C:\Windows\SysWOW64\fccfiyxdb.exe vdyhyzpdb.exe File created C:\Windows\SysWOW64\jladehkvl.exe wyqoqdljx.exe File created C:\Windows\SysWOW64\hahtqjcad.exe ubeqhbwtc.exe File opened for modification C:\Windows\SysWOW64\jboncebsn.exe xhixrapih.exe File created C:\Windows\SysWOW64\esbsudlmz.exe ttxmjedmy.exe File opened for modification C:\Windows\SysWOW64\nigucgoet.exe Process not Found File opened for modification C:\Windows\SysWOW64\mkfydpdda.exe ybhvaxdth.exe File created C:\Windows\SysWOW64\jlzqlanei.exe wypafeorc.exe File opened for modification C:\Windows\SysWOW64\xbomvucox.exe nrrcirvuc.exe File created C:\Windows\SysWOW64\hvkaahhwb.exe xogdiiaxb.exe File opened for modification C:\Windows\SysWOW64\emoijnqeu.exe ukyxnkckh.exe File opened for modification C:\Windows\SysWOW64\nipfrzqsc.exe dilhyaitu.exe File opened for modification C:\Windows\SysWOW64\seyingwyu.exe fjhticxlg.exe File opened for modification C:\Windows\SysWOW64\ysocpcbej.exe lqineypuw.exe File opened for modification C:\Windows\SysWOW64\qqvbxiiud.exe chpyuiijb.exe File opened for modification C:\Windows\SysWOW64\ceinzpddm.exe prqxttwqg.exe File opened for modification C:\Windows\SysWOW64\glyetxjgr.exe qgpjpsmmc.exe File created C:\Windows\SysWOW64\uankpluhv.exe Process not Found File created C:\Windows\SysWOW64\qveisymwp.exe Process not Found File created C:\Windows\SysWOW64\bqfyyehqt.exe odnjsajln.exe File created C:\Windows\SysWOW64\fkrljsnua.exe vpqbbymxn.exe File opened for modification C:\Windows\SysWOW64\utjgfdqhz.exe egjlbylvs.exe File opened for modification C:\Windows\SysWOW64\zfydypxly.exe mshnsmyhk.exe File opened for modification C:\Windows\SysWOW64\vqlkcqfxj.exe Process not Found File opened for modification C:\Windows\SysWOW64\agvyyjypw.exe Process not Found File created C:\Windows\SysWOW64\kfhvjigpw.exe Process not Found File opened for modification C:\Windows\SysWOW64\qslzzvmrf.exe cfujtrnmz.exe File opened for modification C:\Windows\SysWOW64\rnxnjduba.exe moclbdoti.exe File opened for modification C:\Windows\SysWOW64\wcozcaesj.exe lgnpvfdvw.exe File created C:\Windows\SysWOW64\kkfnokdmc.exe apmcgquoo.exe File created C:\Windows\SysWOW64\szmwuihry.exe fmcgoeimr.exe File created C:\Windows\SysWOW64\yajkancqw.exe jobpwigwh.exe File created C:\Windows\SysWOW64\ddddoicqn.exe thltgobtz.exe File opened for modification C:\Windows\SysWOW64\tnpirlxsj.exe gsgslizfv.exe File created C:\Windows\SysWOW64\xhixrapih.exe jxcnoaxyg.exe File opened for modification C:\Windows\SysWOW64\wlqmjpqyj.exe jqzpdlrld.exe File created C:\Windows\SysWOW64\emxvunovx.exe rwusmniow.exe File opened for modification C:\Windows\SysWOW64\jhvqqderu.exe Process not Found File opened for modification C:\Windows\SysWOW64\ubtxmdlcp.exe kyenzawac.exe File opened for modification C:\Windows\SysWOW64\taswkfzow.exe gqmlhghdu.exe File created C:\Windows\SysWOW64\nhxvrdmtr.exe ditygeftr.exe File created C:\Windows\SysWOW64\cfeqpwlje.exe sgasfxlje.exe File created C:\Windows\SysWOW64\uiediaiyd.exe kgotvxcwi.exe File created C:\Windows\SysWOW64\rnxnjduba.exe moclbdoti.exe File created C:\Windows\SysWOW64\byerfdden.exe rwohsaxca.exe File created C:\Windows\SysWOW64\oxuonuuuo.exe ywfgmmwct.exe File opened for modification C:\Windows\SysWOW64\idjvflvej.exe awmphoouh.exe File opened for modification C:\Windows\SysWOW64\iiioyeuyc.exe aeyjptrjp.exe File created C:\Windows\SysWOW64\ymgfyalia.exe Process not Found File created C:\Windows\SysWOW64\gcothrkja.exe Process not Found File created C:\Windows\SysWOW64\hxujxbwfg.exe Process not Found File created C:\Windows\SysWOW64\fxbtypruz.exe vqxvoqkuz.exe File created C:\Windows\SysWOW64\jtbllwnzn.exe wcgjdwhsu.exe File created C:\Windows\SysWOW64\xyszxsyul.exe nzobftrvl.exe File created C:\Windows\SysWOW64\cklmtklln.exe shnbfpeja.exe File opened for modification C:\Windows\SysWOW64\scyqinkfy.exe ehhbcjlak.exe File created C:\Windows\SysWOW64\eywskqfus.exe ribpcianr.exe File created C:\Windows\SysWOW64\diqrfrtvd.exe Process not Found File opened for modification C:\Windows\SysWOW64\ghrjfqtar.exe tmzuzmund.exe File opened for modification C:\Windows\SysWOW64\ssrmpcezy.exe ffiokhgmk.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 4196 set thread context of 1068 4196 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 82 PID 1508 set thread context of 1032 1508 yllcbyznz.exe 84 PID 976 set thread context of 4028 976 yxxuykdzg.exe 86 PID 4288 set thread context of 5052 4288 isyfffefu.exe 88 PID 2412 set thread context of 4544 2412 qalfsunpt.exe 90 PID 4432 set thread context of 2864 4432 awmphoouh.exe 92 PID 1504 set thread context of 4924 1504 idjvflvej.exe 94 PID 2432 set thread context of 1940 2432 szbfvgwbw.exe 96 PID 1004 set thread context of 2500 1004 futvakdol.exe 98 PID 2188 set thread context of 3568 2188 thltgobtz.exe 100 PID 4472 set thread context of 3612 4472 ddddoicqn.exe 102 PID 3708 set thread context of 3428 3708 ncqbyhkqn.exe 104 PID 4152 set thread context of 4144 4152 cvmvivmht.exe 106 PID 4104 set thread context of 1652 4104 qiwlozluh.exe 108 PID 316 set thread context of 3220 316 aexwdtlrv.exe 110 PID 3972 set thread context of 2144 3972 nndggllbo.exe 112 PID 4952 set thread context of 3660 4952 aeyjptrjp.exe 114 PID 228 set thread context of 1380 228 iiioyeuyc.exe 116 PID 2304 set thread context of 1696 2304 sejhogueq.exe 118 PID 1116 set thread context of 1068 1116 fcejwgalq.exe 120 PID 5036 set thread context of 3104 5036 hbihhfikr.exe 122 PID 4172 set thread context of 3456 4172 vozwnjgpf.exe 124 PID 4028 set thread context of 3212 4028 lsirrodkm.exe 126 PID 4436 set thread context of 4920 4436 vampbnljm.exe 128 PID 4284 set thread context of 3100 4284 leukfahet.exe 130 PID 1504 set thread context of 2396 1504 vdyhyzpdb.exe 132 PID 1620 set thread context of 1188 1620 fccfiyxdb.exe 134 PID 4072 set thread context of 3280 4072 smiplxonv.exe 136 PID 4644 set thread context of 2112 4644 fklsuyuvw.exe 138 PID 964 set thread context of 3572 964 sxvizbtzk.exe 140 PID 2216 set thread context of 3288 2216 caksnfhbx.exe 142 PID 3420 set thread context of 3336 3420 pvciaiggd.exe 144 PID 5076 set thread context of 1880 5076 ditygeftr.exe 146 PID 2808 set thread context of 3328 2808 nhxvrdmtr.exe 148 PID 2936 set thread context of 3228 2936 axsyzlkas.exe 150 PID 1832 set thread context of 4652 1832 nhziclkkm.exe 152 PID 5056 set thread context of 1936 5056 xrolpoqeh.exe 154 PID 1744 set thread context of 4776 1744 kbuwsnqpa.exe 156 PID 404 set thread context of 2428 404 ajgezxulc.exe 158 PID 2144 set thread context of 4456 2144 kqsbswblc.exe 160 PID 1580 set thread context of 1920 1580 xdjrxaaqi.exe 162 PID 2516 set thread context of 4512 2516 icnoiyzqi.exe 164 PID 3132 set thread context of 4656 3132 vmuzlqzak.exe 166 PID 244 set thread context of 3588 244 fojbgtgcx.exe 168 PID 1632 set thread context of 4172 1632 sypmjsgmy.exe 170 PID 2036 set thread context of 3912 2036 cfujtrnmz.exe 172 PID 2392 set thread context of 552 2392 qslzzvmrf.exe 174 PID 3772 set thread context of 4812 3772 arpwkuurf.exe 178 PID 4972 set thread context of 1840 4972 nehupysdt.exe 180 PID 100 set thread context of 2512 100 xziffstbh.exe 182 PID 2792 set thread context of 3148 2792 kmruloagv.exe 184 PID 4208 set thread context of 2044 4208 vudsvnzfv.exe 187 PID 2608 set thread context of 3052 2608 kyenzawac.exe 189 PID 3320 set thread context of 644 3320 ubtxmdlcp.exe 192 PID 812 set thread context of 1664 812 ikzipddmr.exe 194 PID 3176 set thread context of 4868 3176 sgasfxlje.exe 196 PID 4348 set thread context of 1652 4348 cfeqpwlje.exe 198 PID 4060 set thread context of 4652 4060 pawfvssot.exe 200 PID 4032 set thread context of 1788 4032 avxydmstg.exe 202 PID 2424 set thread context of 4776 2424 npdfozxvm.exe 204 PID 4712 set thread context of 2428 4712 xlwyetxaz.exe 206 PID 3696 set thread context of 4200 3696 kjybmbdha.exe 208 PID 5012 set thread context of 3004 5012 xtfdptdrc.exe 210 PID 1600 set thread context of 4512 1600 kgotvxcwi.exe 212 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdiescucm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zpxembigj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gsgslizfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxnltyape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqoyyojlq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyluexbnz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kskuqcfus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nojmdlhgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmkqofiqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjhticxlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiwlozluh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxgfswbpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiezbonsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byerfdden.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxwhrzctg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otbtfmvvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmloprgzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zonmdlswx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lboysrcjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmgqoelzz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ukyxnkckh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtfdptdrc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eakncflky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkfiuhwen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejxrmwyxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvbbaxgje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqmlhghdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqwicrecf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xszekmkdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ehhbcjlak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jladehkvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gynztnfdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uhxorzmvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfzcdqbua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnxyjztdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvmvivmht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcejwgalq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnvjvkogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsiaexeve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjovslwxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffiokhgmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjhwclboh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avxydmstg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odmdhbdus.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 1068 4196 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 82 PID 4196 wrote to memory of 1068 4196 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 82 PID 4196 wrote to memory of 1068 4196 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 82 PID 4196 wrote to memory of 1068 4196 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 82 PID 4196 wrote to memory of 1068 4196 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 82 PID 1068 wrote to memory of 1508 1068 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 83 PID 1068 wrote to memory of 1508 1068 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 83 PID 1068 wrote to memory of 1508 1068 c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe 83 PID 1508 wrote to memory of 1032 1508 yllcbyznz.exe 84 PID 1508 wrote to memory of 1032 1508 yllcbyznz.exe 84 PID 1508 wrote to memory of 1032 1508 yllcbyznz.exe 84 PID 1508 wrote to memory of 1032 1508 yllcbyznz.exe 84 PID 1508 wrote to memory of 1032 1508 yllcbyznz.exe 84 PID 1032 wrote to memory of 976 1032 yllcbyznz.exe 85 PID 1032 wrote to memory of 976 1032 yllcbyznz.exe 85 PID 1032 wrote to memory of 976 1032 yllcbyznz.exe 85 PID 976 wrote to memory of 4028 976 yxxuykdzg.exe 86 PID 976 wrote to memory of 4028 976 yxxuykdzg.exe 86 PID 976 wrote to memory of 4028 976 yxxuykdzg.exe 86 PID 976 wrote to memory of 4028 976 yxxuykdzg.exe 86 PID 976 wrote to memory of 4028 976 yxxuykdzg.exe 86 PID 4028 wrote to memory of 4288 4028 yxxuykdzg.exe 87 PID 4028 wrote to memory of 4288 4028 yxxuykdzg.exe 87 PID 4028 wrote to memory of 4288 4028 yxxuykdzg.exe 87 PID 4288 wrote to memory of 5052 4288 isyfffefu.exe 88 PID 4288 wrote to memory of 5052 4288 isyfffefu.exe 88 PID 4288 wrote to memory of 5052 4288 isyfffefu.exe 88 PID 4288 wrote to memory of 5052 4288 isyfffefu.exe 88 PID 4288 wrote to memory of 5052 4288 isyfffefu.exe 88 PID 5052 wrote to memory of 2412 5052 isyfffefu.exe 89 PID 5052 wrote to memory of 2412 5052 isyfffefu.exe 89 PID 5052 wrote to memory of 2412 5052 isyfffefu.exe 89 PID 2412 wrote to memory of 4544 2412 qalfsunpt.exe 90 PID 2412 wrote to memory of 4544 2412 qalfsunpt.exe 90 PID 2412 wrote to memory of 4544 2412 qalfsunpt.exe 90 PID 2412 wrote to memory of 4544 2412 qalfsunpt.exe 90 PID 2412 wrote to memory of 4544 2412 qalfsunpt.exe 90 PID 4544 wrote to memory of 4432 4544 qalfsunpt.exe 91 PID 4544 wrote to memory of 4432 4544 qalfsunpt.exe 91 PID 4544 wrote to memory of 4432 4544 qalfsunpt.exe 91 PID 4432 wrote to memory of 2864 4432 awmphoouh.exe 92 PID 4432 wrote to memory of 2864 4432 awmphoouh.exe 92 PID 4432 wrote to memory of 2864 4432 awmphoouh.exe 92 PID 4432 wrote to memory of 2864 4432 awmphoouh.exe 92 PID 4432 wrote to memory of 2864 4432 awmphoouh.exe 92 PID 2864 wrote to memory of 1504 2864 awmphoouh.exe 93 PID 2864 wrote to memory of 1504 2864 awmphoouh.exe 93 PID 2864 wrote to memory of 1504 2864 awmphoouh.exe 93 PID 1504 wrote to memory of 4924 1504 idjvflvej.exe 94 PID 1504 wrote to memory of 4924 1504 idjvflvej.exe 94 PID 1504 wrote to memory of 4924 1504 idjvflvej.exe 94 PID 1504 wrote to memory of 4924 1504 idjvflvej.exe 94 PID 1504 wrote to memory of 4924 1504 idjvflvej.exe 94 PID 4924 wrote to memory of 2432 4924 idjvflvej.exe 95 PID 4924 wrote to memory of 2432 4924 idjvflvej.exe 95 PID 4924 wrote to memory of 2432 4924 idjvflvej.exe 95 PID 2432 wrote to memory of 1940 2432 szbfvgwbw.exe 96 PID 2432 wrote to memory of 1940 2432 szbfvgwbw.exe 96 PID 2432 wrote to memory of 1940 2432 szbfvgwbw.exe 96 PID 2432 wrote to memory of 1940 2432 szbfvgwbw.exe 96 PID 2432 wrote to memory of 1940 2432 szbfvgwbw.exe 96 PID 1940 wrote to memory of 1004 1940 szbfvgwbw.exe 97 PID 1940 wrote to memory of 1004 1940 szbfvgwbw.exe 97 PID 1940 wrote to memory of 1004 1940 szbfvgwbw.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\yllcbyznz.exeC:\Windows\system32\yllcbyznz.exe 1004 "C:\Users\Admin\AppData\Local\Temp\c600781fde274aaae3e3cc8d8182c96a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\yllcbyznz.exeC:\Windows\SysWOW64\yllcbyznz.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\yxxuykdzg.exeC:\Windows\system32\yxxuykdzg.exe 1140 "C:\Windows\SysWOW64\yllcbyznz.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\yxxuykdzg.exeC:\Windows\SysWOW64\yxxuykdzg.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\isyfffefu.exeC:\Windows\system32\isyfffefu.exe 1148 "C:\Windows\SysWOW64\yxxuykdzg.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\isyfffefu.exeC:\Windows\SysWOW64\isyfffefu.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\qalfsunpt.exeC:\Windows\system32\qalfsunpt.exe 1148 "C:\Windows\SysWOW64\isyfffefu.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\qalfsunpt.exeC:\Windows\SysWOW64\qalfsunpt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\awmphoouh.exeC:\Windows\system32\awmphoouh.exe 1148 "C:\Windows\SysWOW64\qalfsunpt.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\awmphoouh.exeC:\Windows\SysWOW64\awmphoouh.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\idjvflvej.exeC:\Windows\system32\idjvflvej.exe 1040 "C:\Windows\SysWOW64\awmphoouh.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\idjvflvej.exeC:\Windows\SysWOW64\idjvflvej.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\szbfvgwbw.exeC:\Windows\system32\szbfvgwbw.exe 1140 "C:\Windows\SysWOW64\idjvflvej.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\szbfvgwbw.exeC:\Windows\SysWOW64\szbfvgwbw.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\futvakdol.exeC:\Windows\system32\futvakdol.exe 1148 "C:\Windows\SysWOW64\szbfvgwbw.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1004 -
C:\Windows\SysWOW64\futvakdol.exeC:\Windows\SysWOW64\futvakdol.exe18⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\thltgobtz.exeC:\Windows\system32\thltgobtz.exe 1148 "C:\Windows\SysWOW64\futvakdol.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2188 -
C:\Windows\SysWOW64\thltgobtz.exeC:\Windows\SysWOW64\thltgobtz.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3568 -
C:\Windows\SysWOW64\ddddoicqn.exeC:\Windows\system32\ddddoicqn.exe 1148 "C:\Windows\SysWOW64\thltgobtz.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4472 -
C:\Windows\SysWOW64\ddddoicqn.exeC:\Windows\SysWOW64\ddddoicqn.exe22⤵
- Executes dropped EXE
PID:3612 -
C:\Windows\SysWOW64\ncqbyhkqn.exeC:\Windows\system32\ncqbyhkqn.exe 1040 "C:\Windows\SysWOW64\ddddoicqn.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3708 -
C:\Windows\SysWOW64\ncqbyhkqn.exeC:\Windows\SysWOW64\ncqbyhkqn.exe24⤵
- Executes dropped EXE
PID:3428 -
C:\Windows\SysWOW64\cvmvivmht.exeC:\Windows\system32\cvmvivmht.exe 1152 "C:\Windows\SysWOW64\ncqbyhkqn.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4152 -
C:\Windows\SysWOW64\cvmvivmht.exeC:\Windows\SysWOW64\cvmvivmht.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4144 -
C:\Windows\SysWOW64\qiwlozluh.exeC:\Windows\system32\qiwlozluh.exe 1148 "C:\Windows\SysWOW64\cvmvivmht.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4104 -
C:\Windows\SysWOW64\qiwlozluh.exeC:\Windows\SysWOW64\qiwlozluh.exe28⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\aexwdtlrv.exeC:\Windows\system32\aexwdtlrv.exe 1148 "C:\Windows\SysWOW64\qiwlozluh.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:316 -
C:\Windows\SysWOW64\aexwdtlrv.exeC:\Windows\SysWOW64\aexwdtlrv.exe30⤵
- Executes dropped EXE
PID:3220 -
C:\Windows\SysWOW64\nndggllbo.exeC:\Windows\system32\nndggllbo.exe 1152 "C:\Windows\SysWOW64\aexwdtlrv.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3972 -
C:\Windows\SysWOW64\nndggllbo.exeC:\Windows\SysWOW64\nndggllbo.exe32⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\aeyjptrjp.exeC:\Windows\system32\aeyjptrjp.exe 1140 "C:\Windows\SysWOW64\nndggllbo.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4952 -
C:\Windows\SysWOW64\aeyjptrjp.exeC:\Windows\SysWOW64\aeyjptrjp.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3660 -
C:\Windows\SysWOW64\iiioyeuyc.exeC:\Windows\system32\iiioyeuyc.exe 1140 "C:\Windows\SysWOW64\aeyjptrjp.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:228 -
C:\Windows\SysWOW64\iiioyeuyc.exeC:\Windows\SysWOW64\iiioyeuyc.exe36⤵
- Executes dropped EXE
PID:1380 -
C:\Windows\SysWOW64\sejhogueq.exeC:\Windows\system32\sejhogueq.exe 1140 "C:\Windows\SysWOW64\iiioyeuyc.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2304 -
C:\Windows\SysWOW64\sejhogueq.exeC:\Windows\SysWOW64\sejhogueq.exe38⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\fcejwgalq.exeC:\Windows\system32\fcejwgalq.exe 1148 "C:\Windows\SysWOW64\sejhogueq.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1116 -
C:\Windows\SysWOW64\fcejwgalq.exeC:\Windows\SysWOW64\fcejwgalq.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\hbihhfikr.exeC:\Windows\system32\hbihhfikr.exe 1148 "C:\Windows\SysWOW64\fcejwgalq.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5036 -
C:\Windows\SysWOW64\hbihhfikr.exeC:\Windows\SysWOW64\hbihhfikr.exe42⤵
- Executes dropped EXE
PID:3104 -
C:\Windows\SysWOW64\vozwnjgpf.exeC:\Windows\system32\vozwnjgpf.exe 1148 "C:\Windows\SysWOW64\hbihhfikr.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4172 -
C:\Windows\SysWOW64\vozwnjgpf.exeC:\Windows\SysWOW64\vozwnjgpf.exe44⤵
- Executes dropped EXE
PID:3456 -
C:\Windows\SysWOW64\lsirrodkm.exeC:\Windows\system32\lsirrodkm.exe 1148 "C:\Windows\SysWOW64\vozwnjgpf.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4028 -
C:\Windows\SysWOW64\lsirrodkm.exeC:\Windows\SysWOW64\lsirrodkm.exe46⤵
- Executes dropped EXE
PID:3212 -
C:\Windows\SysWOW64\vampbnljm.exeC:\Windows\system32\vampbnljm.exe 1164 "C:\Windows\SysWOW64\lsirrodkm.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4436 -
C:\Windows\SysWOW64\vampbnljm.exeC:\Windows\SysWOW64\vampbnljm.exe48⤵
- Executes dropped EXE
PID:4920 -
C:\Windows\SysWOW64\leukfahet.exeC:\Windows\system32\leukfahet.exe 1148 "C:\Windows\SysWOW64\vampbnljm.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4284 -
C:\Windows\SysWOW64\leukfahet.exeC:\Windows\SysWOW64\leukfahet.exe50⤵
- Executes dropped EXE
PID:3100 -
C:\Windows\SysWOW64\vdyhyzpdb.exeC:\Windows\system32\vdyhyzpdb.exe 1156 "C:\Windows\SysWOW64\leukfahet.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1504 -
C:\Windows\SysWOW64\vdyhyzpdb.exeC:\Windows\SysWOW64\vdyhyzpdb.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\fccfiyxdb.exeC:\Windows\system32\fccfiyxdb.exe 1140 "C:\Windows\SysWOW64\vdyhyzpdb.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1620 -
C:\Windows\SysWOW64\fccfiyxdb.exeC:\Windows\SysWOW64\fccfiyxdb.exe54⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\smiplxonv.exeC:\Windows\system32\smiplxonv.exe 1148 "C:\Windows\SysWOW64\fccfiyxdb.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4072 -
C:\Windows\SysWOW64\smiplxonv.exeC:\Windows\SysWOW64\smiplxonv.exe56⤵
- Executes dropped EXE
PID:3280 -
C:\Windows\SysWOW64\fklsuyuvw.exeC:\Windows\system32\fklsuyuvw.exe 1028 "C:\Windows\SysWOW64\smiplxonv.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4644 -
C:\Windows\SysWOW64\fklsuyuvw.exeC:\Windows\SysWOW64\fklsuyuvw.exe58⤵
- Executes dropped EXE
PID:2112 -
C:\Windows\SysWOW64\sxvizbtzk.exeC:\Windows\system32\sxvizbtzk.exe 1152 "C:\Windows\SysWOW64\fklsuyuvw.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:964 -
C:\Windows\SysWOW64\sxvizbtzk.exeC:\Windows\SysWOW64\sxvizbtzk.exe60⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\caksnfhbx.exeC:\Windows\system32\caksnfhbx.exe 1148 "C:\Windows\SysWOW64\sxvizbtzk.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2216 -
C:\Windows\SysWOW64\caksnfhbx.exeC:\Windows\SysWOW64\caksnfhbx.exe62⤵
- Executes dropped EXE
PID:3288 -
C:\Windows\SysWOW64\pvciaiggd.exeC:\Windows\system32\pvciaiggd.exe 1148 "C:\Windows\SysWOW64\caksnfhbx.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3420 -
C:\Windows\SysWOW64\pvciaiggd.exeC:\Windows\SysWOW64\pvciaiggd.exe64⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\SysWOW64\ditygeftr.exeC:\Windows\system32\ditygeftr.exe 1148 "C:\Windows\SysWOW64\pvciaiggd.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5076 -
C:\Windows\SysWOW64\ditygeftr.exeC:\Windows\SysWOW64\ditygeftr.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1880 -
C:\Windows\SysWOW64\nhxvrdmtr.exeC:\Windows\system32\nhxvrdmtr.exe 1148 "C:\Windows\SysWOW64\ditygeftr.exe"67⤵
- Suspicious use of SetThreadContext
PID:2808 -
C:\Windows\SysWOW64\nhxvrdmtr.exeC:\Windows\SysWOW64\nhxvrdmtr.exe68⤵PID:3328
-
C:\Windows\SysWOW64\axsyzlkas.exeC:\Windows\system32\axsyzlkas.exe 1140 "C:\Windows\SysWOW64\nhxvrdmtr.exe"69⤵
- Suspicious use of SetThreadContext
PID:2936 -
C:\Windows\SysWOW64\axsyzlkas.exeC:\Windows\SysWOW64\axsyzlkas.exe70⤵PID:3228
-
C:\Windows\SysWOW64\nhziclkkm.exeC:\Windows\system32\nhziclkkm.exe 1152 "C:\Windows\SysWOW64\axsyzlkas.exe"71⤵
- Suspicious use of SetThreadContext
PID:1832 -
C:\Windows\SysWOW64\nhziclkkm.exeC:\Windows\SysWOW64\nhziclkkm.exe72⤵PID:4652
-
C:\Windows\SysWOW64\xrolpoqeh.exeC:\Windows\system32\xrolpoqeh.exe 1140 "C:\Windows\SysWOW64\nhziclkkm.exe"73⤵
- Suspicious use of SetThreadContext
PID:5056 -
C:\Windows\SysWOW64\xrolpoqeh.exeC:\Windows\SysWOW64\xrolpoqeh.exe74⤵PID:1936
-
C:\Windows\SysWOW64\kbuwsnqpa.exeC:\Windows\system32\kbuwsnqpa.exe 1148 "C:\Windows\SysWOW64\xrolpoqeh.exe"75⤵
- Suspicious use of SetThreadContext
PID:1744 -
C:\Windows\SysWOW64\kbuwsnqpa.exeC:\Windows\SysWOW64\kbuwsnqpa.exe76⤵PID:4776
-
C:\Windows\SysWOW64\ajgezxulc.exeC:\Windows\system32\ajgezxulc.exe 1140 "C:\Windows\SysWOW64\kbuwsnqpa.exe"77⤵
- Suspicious use of SetThreadContext
PID:404 -
C:\Windows\SysWOW64\ajgezxulc.exeC:\Windows\SysWOW64\ajgezxulc.exe78⤵PID:2428
-
C:\Windows\SysWOW64\kqsbswblc.exeC:\Windows\system32\kqsbswblc.exe 1148 "C:\Windows\SysWOW64\ajgezxulc.exe"79⤵
- Suspicious use of SetThreadContext
PID:2144 -
C:\Windows\SysWOW64\kqsbswblc.exeC:\Windows\SysWOW64\kqsbswblc.exe80⤵PID:4456
-
C:\Windows\SysWOW64\xdjrxaaqi.exeC:\Windows\system32\xdjrxaaqi.exe 1152 "C:\Windows\SysWOW64\kqsbswblc.exe"81⤵
- Suspicious use of SetThreadContext
PID:1580 -
C:\Windows\SysWOW64\xdjrxaaqi.exeC:\Windows\SysWOW64\xdjrxaaqi.exe82⤵PID:1920
-
C:\Windows\SysWOW64\icnoiyzqi.exeC:\Windows\system32\icnoiyzqi.exe 1160 "C:\Windows\SysWOW64\xdjrxaaqi.exe"83⤵
- Suspicious use of SetThreadContext
PID:2516 -
C:\Windows\SysWOW64\icnoiyzqi.exeC:\Windows\SysWOW64\icnoiyzqi.exe84⤵PID:4512
-
C:\Windows\SysWOW64\vmuzlqzak.exeC:\Windows\system32\vmuzlqzak.exe 1148 "C:\Windows\SysWOW64\icnoiyzqi.exe"85⤵
- Suspicious use of SetThreadContext
PID:3132 -
C:\Windows\SysWOW64\vmuzlqzak.exeC:\Windows\SysWOW64\vmuzlqzak.exe86⤵PID:4656
-
C:\Windows\SysWOW64\fojbgtgcx.exeC:\Windows\system32\fojbgtgcx.exe 1148 "C:\Windows\SysWOW64\vmuzlqzak.exe"87⤵
- Suspicious use of SetThreadContext
PID:244 -
C:\Windows\SysWOW64\fojbgtgcx.exeC:\Windows\SysWOW64\fojbgtgcx.exe88⤵PID:3588
-
C:\Windows\SysWOW64\sypmjsgmy.exeC:\Windows\system32\sypmjsgmy.exe 1148 "C:\Windows\SysWOW64\fojbgtgcx.exe"89⤵
- Suspicious use of SetThreadContext
PID:1632 -
C:\Windows\SysWOW64\sypmjsgmy.exeC:\Windows\SysWOW64\sypmjsgmy.exe90⤵PID:4172
-
C:\Windows\SysWOW64\cfujtrnmz.exeC:\Windows\system32\cfujtrnmz.exe 1148 "C:\Windows\SysWOW64\sypmjsgmy.exe"91⤵
- Suspicious use of SetThreadContext
PID:2036 -
C:\Windows\SysWOW64\cfujtrnmz.exeC:\Windows\SysWOW64\cfujtrnmz.exe92⤵
- Drops file in System32 directory
PID:3912 -
C:\Windows\SysWOW64\qslzzvmrf.exeC:\Windows\system32\qslzzvmrf.exe 1148 "C:\Windows\SysWOW64\cfujtrnmz.exe"93⤵
- Suspicious use of SetThreadContext
PID:2392 -
C:\Windows\SysWOW64\qslzzvmrf.exeC:\Windows\SysWOW64\qslzzvmrf.exe94⤵PID:552
-
C:\Windows\SysWOW64\arpwkuurf.exeC:\Windows\system32\arpwkuurf.exe 1152 "C:\Windows\SysWOW64\qslzzvmrf.exe"95⤵
- Suspicious use of SetThreadContext
PID:3772 -
C:\Windows\SysWOW64\arpwkuurf.exeC:\Windows\SysWOW64\arpwkuurf.exe96⤵PID:4812
-
C:\Windows\SysWOW64\nehupysdt.exeC:\Windows\system32\nehupysdt.exe 1156 "C:\Windows\SysWOW64\arpwkuurf.exe"97⤵
- Suspicious use of SetThreadContext
PID:4972 -
C:\Windows\SysWOW64\nehupysdt.exeC:\Windows\SysWOW64\nehupysdt.exe98⤵PID:1840
-
C:\Windows\SysWOW64\xziffstbh.exeC:\Windows\system32\xziffstbh.exe 1148 "C:\Windows\SysWOW64\nehupysdt.exe"99⤵
- Suspicious use of SetThreadContext
PID:100 -
C:\Windows\SysWOW64\xziffstbh.exeC:\Windows\SysWOW64\xziffstbh.exe100⤵PID:2512
-
C:\Windows\SysWOW64\kmruloagv.exeC:\Windows\system32\kmruloagv.exe 1148 "C:\Windows\SysWOW64\xziffstbh.exe"101⤵
- Suspicious use of SetThreadContext
PID:2792 -
C:\Windows\SysWOW64\kmruloagv.exeC:\Windows\SysWOW64\kmruloagv.exe102⤵PID:3148
-
C:\Windows\SysWOW64\vudsvnzfv.exeC:\Windows\system32\vudsvnzfv.exe 1148 "C:\Windows\SysWOW64\kmruloagv.exe"103⤵
- Suspicious use of SetThreadContext
PID:4208 -
C:\Windows\SysWOW64\vudsvnzfv.exeC:\Windows\SysWOW64\vudsvnzfv.exe104⤵PID:2044
-
C:\Windows\SysWOW64\kyenzawac.exeC:\Windows\system32\kyenzawac.exe 1148 "C:\Windows\SysWOW64\vudsvnzfv.exe"105⤵
- Suspicious use of SetThreadContext
PID:2608 -
C:\Windows\SysWOW64\kyenzawac.exeC:\Windows\SysWOW64\kyenzawac.exe106⤵
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\ubtxmdlcp.exeC:\Windows\system32\ubtxmdlcp.exe 1148 "C:\Windows\SysWOW64\kyenzawac.exe"107⤵
- Suspicious use of SetThreadContext
PID:3320 -
C:\Windows\SysWOW64\ubtxmdlcp.exeC:\Windows\SysWOW64\ubtxmdlcp.exe108⤵PID:644
-
C:\Windows\SysWOW64\ikzipddmr.exeC:\Windows\system32\ikzipddmr.exe 1148 "C:\Windows\SysWOW64\ubtxmdlcp.exe"109⤵
- Suspicious use of SetThreadContext
PID:812 -
C:\Windows\SysWOW64\ikzipddmr.exeC:\Windows\SysWOW64\ikzipddmr.exe110⤵PID:1664
-
C:\Windows\SysWOW64\sgasfxlje.exeC:\Windows\system32\sgasfxlje.exe 1148 "C:\Windows\SysWOW64\ikzipddmr.exe"111⤵
- Suspicious use of SetThreadContext
PID:3176 -
C:\Windows\SysWOW64\sgasfxlje.exeC:\Windows\SysWOW64\sgasfxlje.exe112⤵
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\cfeqpwlje.exeC:\Windows\system32\cfeqpwlje.exe 1016 "C:\Windows\SysWOW64\sgasfxlje.exe"113⤵
- Suspicious use of SetThreadContext
PID:4348 -
C:\Windows\SysWOW64\cfeqpwlje.exeC:\Windows\SysWOW64\cfeqpwlje.exe114⤵PID:1652
-
C:\Windows\SysWOW64\pawfvssot.exeC:\Windows\system32\pawfvssot.exe 1144 "C:\Windows\SysWOW64\cfeqpwlje.exe"115⤵
- Suspicious use of SetThreadContext
PID:4060 -
C:\Windows\SysWOW64\pawfvssot.exeC:\Windows\SysWOW64\pawfvssot.exe116⤵PID:4652
-
C:\Windows\SysWOW64\avxydmstg.exeC:\Windows\system32\avxydmstg.exe 1148 "C:\Windows\SysWOW64\pawfvssot.exe"117⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4032 -
C:\Windows\SysWOW64\avxydmstg.exeC:\Windows\SysWOW64\avxydmstg.exe118⤵PID:1788
-
C:\Windows\SysWOW64\npdfozxvm.exeC:\Windows\system32\npdfozxvm.exe 1152 "C:\Windows\SysWOW64\avxydmstg.exe"119⤵
- Suspicious use of SetThreadContext
PID:2424 -
C:\Windows\SysWOW64\npdfozxvm.exeC:\Windows\SysWOW64\npdfozxvm.exe120⤵PID:4776
-
C:\Windows\SysWOW64\xlwyetxaz.exeC:\Windows\system32\xlwyetxaz.exe 1148 "C:\Windows\SysWOW64\npdfozxvm.exe"121⤵
- Suspicious use of SetThreadContext
PID:4712 -
C:\Windows\SysWOW64\xlwyetxaz.exeC:\Windows\SysWOW64\xlwyetxaz.exe122⤵PID:2428
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-