Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe
-
Size
216KB
-
MD5
e040c94783257f9bf033cbc20b183746
-
SHA1
73dc2cbf4d014d5ad837b170bfbb48f71ac9a6ab
-
SHA256
e1f0eafeff7232d5aa2f26b2deff354cd711c209704d8e10944cb331c1938adb
-
SHA512
0e915caf8b6328c09635db7c2f3a6d9aa622cc67c9b8b7bcb5e5b28cd04f3ff40790ec957e0f28bfc895ddd43325b6fa3771aea6517632dec1f18662eaa4221a
-
SSDEEP
6144:2dKrJbpIgAbFH5a6e6ABoI0jPgJzkzlNwWVZAMQA+YVG83:ZrJbSgAbFH5a6eqI0jPglUwW8I+YVZ3
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 1976 wmisqtl.exe -
Executes dropped EXE 64 IoCs
pid Process 2108 wmisqtl.exe 1976 wmisqtl.exe 2724 wmisqtl.exe 2552 wmisqtl.exe 1644 wmisqtl.exe 2932 wmisqtl.exe 2804 wmisqtl.exe 2052 wmisqtl.exe 1504 wmisqtl.exe 2948 wmisqtl.exe 1980 wmisqtl.exe 2432 wmisqtl.exe 2892 wmisqtl.exe 1592 wmisqtl.exe 996 wmisqtl.exe 1412 wmisqtl.exe 1596 wmisqtl.exe 2036 wmisqtl.exe 1656 wmisqtl.exe 528 wmisqtl.exe 2316 wmisqtl.exe 2340 wmisqtl.exe 2652 wmisqtl.exe 2820 wmisqtl.exe 2732 wmisqtl.exe 2616 wmisqtl.exe 1984 wmisqtl.exe 2884 wmisqtl.exe 2876 wmisqtl.exe 2648 wmisqtl.exe 2912 wmisqtl.exe 2016 wmisqtl.exe 684 wmisqtl.exe 112 wmisqtl.exe 836 wmisqtl.exe 908 wmisqtl.exe 1952 wmisqtl.exe 1716 wmisqtl.exe 1668 wmisqtl.exe 1536 wmisqtl.exe 1328 wmisqtl.exe 1096 wmisqtl.exe 2276 wmisqtl.exe 1580 wmisqtl.exe 1560 wmisqtl.exe 2352 wmisqtl.exe 2756 wmisqtl.exe 2684 wmisqtl.exe 2600 wmisqtl.exe 3044 wmisqtl.exe 2420 wmisqtl.exe 2040 wmisqtl.exe 2848 wmisqtl.exe 2916 wmisqtl.exe 1828 wmisqtl.exe 2132 wmisqtl.exe 1064 wmisqtl.exe 1604 wmisqtl.exe 2200 wmisqtl.exe 1192 wmisqtl.exe 2136 wmisqtl.exe 1752 wmisqtl.exe 2376 wmisqtl.exe 992 wmisqtl.exe -
Loads dropped DLL 64 IoCs
pid Process 1832 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 1832 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 2108 wmisqtl.exe 1976 wmisqtl.exe 1976 wmisqtl.exe 2552 wmisqtl.exe 2552 wmisqtl.exe 2932 wmisqtl.exe 2932 wmisqtl.exe 2052 wmisqtl.exe 2052 wmisqtl.exe 2948 wmisqtl.exe 2948 wmisqtl.exe 2432 wmisqtl.exe 2432 wmisqtl.exe 1592 wmisqtl.exe 1592 wmisqtl.exe 1412 wmisqtl.exe 1412 wmisqtl.exe 2036 wmisqtl.exe 2036 wmisqtl.exe 528 wmisqtl.exe 528 wmisqtl.exe 2340 wmisqtl.exe 2340 wmisqtl.exe 2820 wmisqtl.exe 2820 wmisqtl.exe 2616 wmisqtl.exe 2616 wmisqtl.exe 2884 wmisqtl.exe 2884 wmisqtl.exe 2648 wmisqtl.exe 2648 wmisqtl.exe 2016 wmisqtl.exe 2016 wmisqtl.exe 112 wmisqtl.exe 112 wmisqtl.exe 908 wmisqtl.exe 908 wmisqtl.exe 1716 wmisqtl.exe 1716 wmisqtl.exe 1536 wmisqtl.exe 1536 wmisqtl.exe 1096 wmisqtl.exe 1096 wmisqtl.exe 1580 wmisqtl.exe 1580 wmisqtl.exe 2352 wmisqtl.exe 2352 wmisqtl.exe 2684 wmisqtl.exe 2684 wmisqtl.exe 3044 wmisqtl.exe 3044 wmisqtl.exe 2040 wmisqtl.exe 2040 wmisqtl.exe 2916 wmisqtl.exe 2916 wmisqtl.exe 2132 wmisqtl.exe 2132 wmisqtl.exe 1604 wmisqtl.exe 1604 wmisqtl.exe 1192 wmisqtl.exe 1192 wmisqtl.exe 1752 wmisqtl.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File opened for modification C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe File created C:\Windows\SysWOW64\wmisqtl.exe wmisqtl.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2256 set thread context of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 2108 set thread context of 1976 2108 wmisqtl.exe 33 PID 2724 set thread context of 2552 2724 wmisqtl.exe 35 PID 1644 set thread context of 2932 1644 wmisqtl.exe 37 PID 2804 set thread context of 2052 2804 wmisqtl.exe 39 PID 1504 set thread context of 2948 1504 wmisqtl.exe 41 PID 1980 set thread context of 2432 1980 wmisqtl.exe 43 PID 2892 set thread context of 1592 2892 wmisqtl.exe 45 PID 996 set thread context of 1412 996 wmisqtl.exe 47 PID 1596 set thread context of 2036 1596 wmisqtl.exe 49 PID 1656 set thread context of 528 1656 wmisqtl.exe 51 PID 2316 set thread context of 2340 2316 wmisqtl.exe 53 PID 2652 set thread context of 2820 2652 wmisqtl.exe 55 PID 2732 set thread context of 2616 2732 wmisqtl.exe 57 PID 1984 set thread context of 2884 1984 wmisqtl.exe 59 PID 2876 set thread context of 2648 2876 wmisqtl.exe 61 PID 2912 set thread context of 2016 2912 wmisqtl.exe 63 PID 684 set thread context of 112 684 wmisqtl.exe 65 PID 836 set thread context of 908 836 wmisqtl.exe 67 PID 1952 set thread context of 1716 1952 wmisqtl.exe 69 PID 1668 set thread context of 1536 1668 wmisqtl.exe 71 PID 1328 set thread context of 1096 1328 wmisqtl.exe 73 PID 2276 set thread context of 1580 2276 wmisqtl.exe 75 PID 1560 set thread context of 2352 1560 wmisqtl.exe 77 PID 2756 set thread context of 2684 2756 wmisqtl.exe 79 PID 2600 set thread context of 3044 2600 wmisqtl.exe 81 PID 2420 set thread context of 2040 2420 wmisqtl.exe 83 PID 2848 set thread context of 2916 2848 wmisqtl.exe 85 PID 1828 set thread context of 2132 1828 wmisqtl.exe 87 PID 1064 set thread context of 1604 1064 wmisqtl.exe 89 PID 2200 set thread context of 1192 2200 wmisqtl.exe 91 PID 2136 set thread context of 1752 2136 wmisqtl.exe 93 PID 2376 set thread context of 992 2376 wmisqtl.exe 95 PID 1484 set thread context of 1328 1484 wmisqtl.exe 97 PID 2072 set thread context of 3004 2072 wmisqtl.exe 99 PID 2336 set thread context of 1680 2336 wmisqtl.exe 101 PID 2976 set thread context of 2756 2976 wmisqtl.exe 103 PID 2728 set thread context of 1688 2728 wmisqtl.exe 105 PID 536 set thread context of 640 536 wmisqtl.exe 107 PID 2920 set thread context of 848 2920 wmisqtl.exe 109 PID 3024 set thread context of 2152 3024 wmisqtl.exe 111 PID 1064 set thread context of 2656 1064 wmisqtl.exe 113 PID 1988 set thread context of 1208 1988 wmisqtl.exe 115 PID 1884 set thread context of 1244 1884 wmisqtl.exe 117 PID 2960 set thread context of 2204 2960 wmisqtl.exe 119 PID 1824 set thread context of 2096 1824 wmisqtl.exe 121 PID 2836 set thread context of 2288 2836 wmisqtl.exe 123 PID 2328 set thread context of 2712 2328 wmisqtl.exe 125 PID 2324 set thread context of 2732 2324 wmisqtl.exe 127 PID 3060 set thread context of 2420 3060 wmisqtl.exe 129 PID 1336 set thread context of 2804 1336 wmisqtl.exe 131 PID 1436 set thread context of 1944 1436 wmisqtl.exe 133 PID 1980 set thread context of 2308 1980 wmisqtl.exe 135 PID 1728 set thread context of 1740 1728 wmisqtl.exe 137 PID 560 set thread context of 1884 560 wmisqtl.exe 139 PID 2176 set thread context of 2960 2176 wmisqtl.exe 141 PID 1088 set thread context of 1824 1088 wmisqtl.exe 143 PID 3000 set thread context of 1560 3000 wmisqtl.exe 145 PID 2700 set thread context of 2108 2700 wmisqtl.exe 147 PID 2588 set thread context of 3052 2588 wmisqtl.exe 149 PID 864 set thread context of 1816 864 wmisqtl.exe 151 PID 2920 set thread context of 1628 2920 wmisqtl.exe 154 PID 3024 set thread context of 2520 3024 wmisqtl.exe 156 PID 1456 set thread context of 1876 1456 wmisqtl.exe 158 -
resource yara_rule behavioral1/memory/1832-4-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1832-6-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1832-9-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1832-15-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1832-14-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1832-13-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1832-12-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1832-11-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1832-28-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1976-42-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1976-45-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1976-44-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1976-43-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1976-51-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2552-65-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2552-64-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2552-63-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2552-70-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2932-85-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2932-90-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2052-105-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2052-104-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2052-103-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2052-111-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2948-125-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2948-131-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2432-146-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2432-151-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1592-166-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1592-172-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1412-187-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1412-192-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2036-207-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2036-212-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/528-227-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/528-234-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2340-247-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2340-252-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2820-267-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2820-273-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2616-287-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2616-291-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2884-303-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2884-307-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2648-320-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2648-323-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2016-335-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2016-339-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/112-352-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/112-355-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/908-368-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/908-372-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1716-384-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1716-387-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1536-400-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1536-403-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1096-416-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1096-419-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1580-432-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1580-435-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2352-448-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2352-451-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2684-464-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2684-467-0x0000000000400000-0x0000000000460000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisqtl.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1832 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 1976 wmisqtl.exe 2552 wmisqtl.exe 2932 wmisqtl.exe 2052 wmisqtl.exe 2948 wmisqtl.exe 2432 wmisqtl.exe 1592 wmisqtl.exe 1412 wmisqtl.exe 2036 wmisqtl.exe 528 wmisqtl.exe 2340 wmisqtl.exe 2820 wmisqtl.exe 2616 wmisqtl.exe 2884 wmisqtl.exe 2648 wmisqtl.exe 2016 wmisqtl.exe 112 wmisqtl.exe 908 wmisqtl.exe 1716 wmisqtl.exe 1536 wmisqtl.exe 1096 wmisqtl.exe 1580 wmisqtl.exe 2352 wmisqtl.exe 2684 wmisqtl.exe 3044 wmisqtl.exe 2040 wmisqtl.exe 2916 wmisqtl.exe 2132 wmisqtl.exe 1604 wmisqtl.exe 1192 wmisqtl.exe 1752 wmisqtl.exe 992 wmisqtl.exe 1328 wmisqtl.exe 3004 wmisqtl.exe 1680 wmisqtl.exe 2756 wmisqtl.exe 1688 wmisqtl.exe 640 wmisqtl.exe 848 wmisqtl.exe 2152 wmisqtl.exe 2656 wmisqtl.exe 1208 wmisqtl.exe 1244 wmisqtl.exe 2204 wmisqtl.exe 2096 wmisqtl.exe 2288 wmisqtl.exe 2712 wmisqtl.exe 2732 wmisqtl.exe 2420 wmisqtl.exe 2804 wmisqtl.exe 1944 wmisqtl.exe 2308 wmisqtl.exe 1740 wmisqtl.exe 1884 wmisqtl.exe 2960 wmisqtl.exe 1824 wmisqtl.exe 1560 wmisqtl.exe 2108 wmisqtl.exe 3052 wmisqtl.exe 1816 wmisqtl.exe 1628 wmisqtl.exe 2520 wmisqtl.exe 1876 wmisqtl.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 2108 wmisqtl.exe 2724 wmisqtl.exe 1644 wmisqtl.exe 2804 wmisqtl.exe 1504 wmisqtl.exe 1980 wmisqtl.exe 2892 wmisqtl.exe 996 wmisqtl.exe 1596 wmisqtl.exe 1656 wmisqtl.exe 2316 wmisqtl.exe 2652 wmisqtl.exe 2732 wmisqtl.exe 1984 wmisqtl.exe 2876 wmisqtl.exe 2912 wmisqtl.exe 684 wmisqtl.exe 836 wmisqtl.exe 1952 wmisqtl.exe 1668 wmisqtl.exe 1328 wmisqtl.exe 2276 wmisqtl.exe 1560 wmisqtl.exe 2756 wmisqtl.exe 2600 wmisqtl.exe 2420 wmisqtl.exe 2848 wmisqtl.exe 1828 wmisqtl.exe 1064 wmisqtl.exe 2200 wmisqtl.exe 2136 wmisqtl.exe 2376 wmisqtl.exe 1484 wmisqtl.exe 2072 wmisqtl.exe 2336 wmisqtl.exe 2976 wmisqtl.exe 2728 wmisqtl.exe 536 wmisqtl.exe 2920 wmisqtl.exe 3024 wmisqtl.exe 1064 wmisqtl.exe 1988 wmisqtl.exe 1884 wmisqtl.exe 2960 wmisqtl.exe 1824 wmisqtl.exe 2836 wmisqtl.exe 2328 wmisqtl.exe 2324 wmisqtl.exe 3060 wmisqtl.exe 1336 wmisqtl.exe 1436 wmisqtl.exe 1980 wmisqtl.exe 1728 wmisqtl.exe 560 wmisqtl.exe 2176 wmisqtl.exe 1088 wmisqtl.exe 3000 wmisqtl.exe 2700 wmisqtl.exe 2588 wmisqtl.exe 864 wmisqtl.exe 2920 wmisqtl.exe 3024 wmisqtl.exe 1456 wmisqtl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 2256 wrote to memory of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 2256 wrote to memory of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 2256 wrote to memory of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 2256 wrote to memory of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 2256 wrote to memory of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 2256 wrote to memory of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 2256 wrote to memory of 1832 2256 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 31 PID 1832 wrote to memory of 2108 1832 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 32 PID 1832 wrote to memory of 2108 1832 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 32 PID 1832 wrote to memory of 2108 1832 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 32 PID 1832 wrote to memory of 2108 1832 e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe 32 PID 2108 wrote to memory of 1976 2108 wmisqtl.exe 33 PID 2108 wrote to memory of 1976 2108 wmisqtl.exe 33 PID 2108 wrote to memory of 1976 2108 wmisqtl.exe 33 PID 2108 wrote to memory of 1976 2108 wmisqtl.exe 33 PID 2108 wrote to memory of 1976 2108 wmisqtl.exe 33 PID 2108 wrote to memory of 1976 2108 wmisqtl.exe 33 PID 2108 wrote to memory of 1976 2108 wmisqtl.exe 33 PID 2108 wrote to memory of 1976 2108 wmisqtl.exe 33 PID 1976 wrote to memory of 2724 1976 wmisqtl.exe 34 PID 1976 wrote to memory of 2724 1976 wmisqtl.exe 34 PID 1976 wrote to memory of 2724 1976 wmisqtl.exe 34 PID 1976 wrote to memory of 2724 1976 wmisqtl.exe 34 PID 2724 wrote to memory of 2552 2724 wmisqtl.exe 35 PID 2724 wrote to memory of 2552 2724 wmisqtl.exe 35 PID 2724 wrote to memory of 2552 2724 wmisqtl.exe 35 PID 2724 wrote to memory of 2552 2724 wmisqtl.exe 35 PID 2724 wrote to memory of 2552 2724 wmisqtl.exe 35 PID 2724 wrote to memory of 2552 2724 wmisqtl.exe 35 PID 2724 wrote to memory of 2552 2724 wmisqtl.exe 35 PID 2724 wrote to memory of 2552 2724 wmisqtl.exe 35 PID 2552 wrote to memory of 1644 2552 wmisqtl.exe 36 PID 2552 wrote to memory of 1644 2552 wmisqtl.exe 36 PID 2552 wrote to memory of 1644 2552 wmisqtl.exe 36 PID 2552 wrote to memory of 1644 2552 wmisqtl.exe 36 PID 1644 wrote to memory of 2932 1644 wmisqtl.exe 37 PID 1644 wrote to memory of 2932 1644 wmisqtl.exe 37 PID 1644 wrote to memory of 2932 1644 wmisqtl.exe 37 PID 1644 wrote to memory of 2932 1644 wmisqtl.exe 37 PID 1644 wrote to memory of 2932 1644 wmisqtl.exe 37 PID 1644 wrote to memory of 2932 1644 wmisqtl.exe 37 PID 1644 wrote to memory of 2932 1644 wmisqtl.exe 37 PID 1644 wrote to memory of 2932 1644 wmisqtl.exe 37 PID 2932 wrote to memory of 2804 2932 wmisqtl.exe 38 PID 2932 wrote to memory of 2804 2932 wmisqtl.exe 38 PID 2932 wrote to memory of 2804 2932 wmisqtl.exe 38 PID 2932 wrote to memory of 2804 2932 wmisqtl.exe 38 PID 2804 wrote to memory of 2052 2804 wmisqtl.exe 39 PID 2804 wrote to memory of 2052 2804 wmisqtl.exe 39 PID 2804 wrote to memory of 2052 2804 wmisqtl.exe 39 PID 2804 wrote to memory of 2052 2804 wmisqtl.exe 39 PID 2804 wrote to memory of 2052 2804 wmisqtl.exe 39 PID 2804 wrote to memory of 2052 2804 wmisqtl.exe 39 PID 2804 wrote to memory of 2052 2804 wmisqtl.exe 39 PID 2804 wrote to memory of 2052 2804 wmisqtl.exe 39 PID 2052 wrote to memory of 1504 2052 wmisqtl.exe 40 PID 2052 wrote to memory of 1504 2052 wmisqtl.exe 40 PID 2052 wrote to memory of 1504 2052 wmisqtl.exe 40 PID 2052 wrote to memory of 1504 2052 wmisqtl.exe 40 PID 1504 wrote to memory of 2948 1504 wmisqtl.exe 41 PID 1504 wrote to memory of 2948 1504 wmisqtl.exe 41 PID 1504 wrote to memory of 2948 1504 wmisqtl.exe 41 PID 1504 wrote to memory of 2948 1504 wmisqtl.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e040c94783257f9bf033cbc20b183746_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Users\Admin\AppData\Local\Temp\E040C9~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Users\Admin\AppData\Local\Temp\E040C9~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:996 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:528 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2912 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1536 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1328 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe67⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe68⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe70⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe72⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe74⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe76⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe77⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe78⤵
- Suspicious behavior: EnumeratesProcesses
PID:640 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe80⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe84⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe87⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe88⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe90⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe91⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe92⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe93⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe94⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe96⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe97⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe98⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe100⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe101⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1336 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe102⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe103⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe104⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe105⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe106⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe107⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe108⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe109⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:560 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe110⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe111⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe112⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe113⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe114⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe115⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe116⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe117⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe118⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe119⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe120⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe121⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Windows\SysWOW64\wmisqtl.exe"C:\Windows\system32\wmisqtl.exe" C:\Windows\SysWOW64\wmisqtl.exe122⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-