Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 09:15
Behavioral task
behavioral1
Sample
f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe
-
Size
237KB
-
MD5
f3501af5dc8b0b319e544e6a10e1906a
-
SHA1
75197310bd9e7ef576bbf4166fc1044c374d8aa4
-
SHA256
e0ae1fd7a171e754d040c4a1e6a7ea5e130b354498e1d8ebfb7592e3edb10e8d
-
SHA512
23f1c6ec841377fed2744ac71303c84cc82e68a00744d19e67fba7d15734b190c1127db64798ee88a28084836b8631255f2d2ce40699b62cd065185427161a99
-
SSDEEP
6144:c8uZgVdFVTjOYkli66UpQrASF2nOewP/wnwR3:cXZi8pY66UpQ/F6O9t
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/596-15-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral1/files/0x000b000000012280-22.dat modiloader_stage2 behavioral1/memory/2312-48-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral1/memory/2960-80-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral1/memory/2428-109-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2312 vyxtqqxu.exe 2568 vyxtqqxu.exe 2960 aifoynda.exe 2956 aifoynda.exe 2428 khjlqmla.exe 1156 khjlqmla.exe 2656 uvkigtqw.exe 2124 uvkigtqw.exe 1248 zidqadce.exe 468 zidqadce.exe 2928 bdebhxdb.exe 2256 bdebhxdb.exe 548 lgtlvake.exe 1380 lgtlvake.exe 1608 wyjrhrmg.exe 1944 wyjrhrmg.exe 552 gxnospty.exe 1512 gxnospty.exe 2052 qlolqpgv.exe 688 qlolqpgv.exe 2784 dyfbwtfh.exe 3040 dyfbwtfh.exe 2824 nxjygrmh.exe 2996 nxjygrmh.exe 2704 awmbpako.exe 932 awmbpako.exe 1436 mtwwdivs.exe 2016 mtwwdivs.exe 1624 waibvhds.exe 2088 waibvhds.exe 848 juojhuhc.exe 1672 juojhuhc.exe 1324 wtjmpcnj.exe 2276 wtjmpcnj.exe 1352 gsvjabui.exe 1872 gsvjabui.exe 1668 tipmibsq.exe 1808 tipmibsq.exe 2664 dtfwdegs.exe 884 dtfwdegs.exe 352 qjizmmez.exe 552 qjizmmez.exe 2608 dicbvmjg.exe 1536 dicbvmjg.exe 1516 nksmippa.exe 2820 nksmippa.exe 2876 ajnoryvh.exe 2716 ajnoryvh.exe 2688 nweewbuu.exe 2368 nweewbuu.exe 1092 xvicpabu.exe 2720 xvicpabu.exe 2020 hjjzfaoq.exe 2140 hjjzfaoq.exe 1860 uwapldnd.exe 2908 uwapldnd.exe 1700 hnvrtmtk.exe 3016 hnvrtmtk.exe 3024 qbwprtgh.exe 1564 qbwprtgh.exe 2508 dzrjatdo.exe 1660 dzrjatdo.exe 1444 qmihgxkt.exe 2620 qmihgxkt.exe -
Loads dropped DLL 64 IoCs
pid Process 2120 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 2120 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 2312 vyxtqqxu.exe 2568 vyxtqqxu.exe 2568 vyxtqqxu.exe 2960 aifoynda.exe 2956 aifoynda.exe 2956 aifoynda.exe 2428 khjlqmla.exe 1156 khjlqmla.exe 1156 khjlqmla.exe 2656 uvkigtqw.exe 2124 uvkigtqw.exe 2124 uvkigtqw.exe 1248 zidqadce.exe 468 zidqadce.exe 468 zidqadce.exe 2928 bdebhxdb.exe 2256 bdebhxdb.exe 2256 bdebhxdb.exe 1380 lgtlvake.exe 1380 lgtlvake.exe 1944 wyjrhrmg.exe 1944 wyjrhrmg.exe 1512 gxnospty.exe 1512 gxnospty.exe 688 qlolqpgv.exe 688 qlolqpgv.exe 3040 dyfbwtfh.exe 3040 dyfbwtfh.exe 2996 nxjygrmh.exe 2996 nxjygrmh.exe 932 awmbpako.exe 932 awmbpako.exe 2016 mtwwdivs.exe 2016 mtwwdivs.exe 2088 waibvhds.exe 2088 waibvhds.exe 1672 juojhuhc.exe 1672 juojhuhc.exe 2276 wtjmpcnj.exe 2276 wtjmpcnj.exe 1872 gsvjabui.exe 1872 gsvjabui.exe 1808 tipmibsq.exe 1808 tipmibsq.exe 884 dtfwdegs.exe 884 dtfwdegs.exe 552 qjizmmez.exe 552 qjizmmez.exe 1536 dicbvmjg.exe 1536 dicbvmjg.exe 1516 nksmippa.exe 2820 nksmippa.exe 2820 nksmippa.exe 2716 ajnoryvh.exe 2716 ajnoryvh.exe 2368 nweewbuu.exe 2368 nweewbuu.exe 2720 xvicpabu.exe 2720 xvicpabu.exe 2140 hjjzfaoq.exe 2140 hjjzfaoq.exe 2908 uwapldnd.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\qcrccsoc.exe dewzlkiu.exe File created C:\Windows\SysWOW64\wwashbaz.exe niavrtnc.exe File opened for modification C:\Windows\SysWOW64\qjizmmez.exe dtfwdegs.exe File created C:\Windows\SysWOW64\nfvynnwy.exe apawwfrr.exe File opened for modification C:\Windows\SysWOW64\odluiimg.exe Process not Found File opened for modification C:\Windows\SysWOW64\aetwzutm.exe Process not Found File opened for modification C:\Windows\SysWOW64\gicmkvdg.exe Process not Found File opened for modification C:\Windows\SysWOW64\mvgaxwdx.exe zfdypwxq.exe File opened for modification C:\Windows\SysWOW64\jphqrnrr.exe Process not Found File created C:\Windows\SysWOW64\qapuwhnx.exe Process not Found File created C:\Windows\SysWOW64\fqpuzhrc.exe savrrzlv.exe File opened for modification C:\Windows\SysWOW64\vyiqvldp.exe jinnnlyi.exe File opened for modification C:\Windows\SysWOW64\shyskzkd.exe fqeqcrew.exe File opened for modification C:\Windows\SysWOW64\fdprptrh.exe smuoglla.exe File opened for modification C:\Windows\SysWOW64\fhfzsrrf.exe srcwjjly.exe File created C:\Windows\SysWOW64\bbgxrqkn.exe Process not Found File created C:\Windows\SysWOW64\lbjlfkar.exe Process not Found File opened for modification C:\Windows\SysWOW64\jeyopmut.exe aqxqrfhw.exe File created C:\Windows\SysWOW64\xwupmmkr.exe kysmdmfk.exe File opened for modification C:\Windows\SysWOW64\evymaqlv.exe uhfwkjyz.exe File opened for modification C:\Windows\SysWOW64\whkvxhkj.exe Process not Found File opened for modification C:\Windows\SysWOW64\bmiraihz.exe Process not Found File created C:\Windows\SysWOW64\irnrxjkv.exe Process not Found File opened for modification C:\Windows\SysWOW64\fxzlemjy.exe syeivedj.exe File created C:\Windows\SysWOW64\mdsnovne.exe zfpkfvhx.exe File opened for modification C:\Windows\SysWOW64\mmyvftvv.exe zksgthrt.exe File opened for modification C:\Windows\SysWOW64\ykayyhym.exe llxwpzbf.exe File created C:\Windows\SysWOW64\oexzedry.exe bncxwvmr.exe File opened for modification C:\Windows\SysWOW64\ucluqloc.exe kolfaebf.exe File opened for modification C:\Windows\SysWOW64\hiecqcxx.exe ujbzhtrq.exe File opened for modification C:\Windows\SysWOW64\gpqtyuyy.exe Process not Found File created C:\Windows\SysWOW64\waibvhds.exe mtwwdivs.exe File opened for modification C:\Windows\SysWOW64\omphijre.exe bkjzxfnu.exe File created C:\Windows\SysWOW64\lyqxcbnq.exe yhvutshj.exe File created C:\Windows\SysWOW64\pmcdftvb.exe fbntsxpz.exe File created C:\Windows\SysWOW64\bacudhmv.exe smbwnagz.exe File created C:\Windows\SysWOW64\nzbozelr.exe Process not Found File created C:\Windows\SysWOW64\wfctanxy.exe Process not Found File created C:\Windows\SysWOW64\tipmibsq.exe gsvjabui.exe File opened for modification C:\Windows\SysWOW64\iugoanss.exe vdllrfml.exe File opened for modification C:\Windows\SysWOW64\ulepzawc.exe hujnqzzv.exe File created C:\Windows\SysWOW64\lbjllpfe.exe ylojchzw.exe File created C:\Windows\SysWOW64\yvxmsnkz.exe Process not Found File created C:\Windows\SysWOW64\noytqmwf.exe Process not Found File created C:\Windows\SysWOW64\wyjrhrmg.exe lgtlvake.exe File created C:\Windows\SysWOW64\kjcpmvcw.exe xszmdvwg.exe File opened for modification C:\Windows\SysWOW64\hghirhme.exe xerxwegc.exe File opened for modification C:\Windows\SysWOW64\xpicrwwy.exe kznzbvqr.exe File opened for modification C:\Windows\SysWOW64\pbotjjzz.exe cltqajus.exe File created C:\Windows\SysWOW64\qfqrbgpr.exe Process not Found File opened for modification C:\Windows\SysWOW64\nensakdp.exe aosxrkyi.exe File created C:\Windows\SysWOW64\otowowhn.exe erymbtbt.exe File opened for modification C:\Windows\SysWOW64\bqojhxyt.exe pzthypse.exe File opened for modification C:\Windows\SysWOW64\oqmfbeeb.exe Process not Found File opened for modification C:\Windows\SysWOW64\djicucsq.exe Process not Found File created C:\Windows\SysWOW64\nridtrdv.exe egttgowb.exe File opened for modification C:\Windows\SysWOW64\nygtckqp.exe ahlrtcth.exe File opened for modification C:\Windows\SysWOW64\hkjqqxiw.exe xwjaapvz.exe File opened for modification C:\Windows\SysWOW64\qqlizoku.exe daigqgfm.exe File created C:\Windows\SysWOW64\whfnpxjh.exe Process not Found File opened for modification C:\Windows\SysWOW64\xvicpabu.exe nweewbuu.exe File opened for modification C:\Windows\SysWOW64\dgtdyrhy.exe renommvw.exe File opened for modification C:\Windows\SysWOW64\yrgolbkv.exe leozffdq.exe File opened for modification C:\Windows\SysWOW64\evnuhfzu.exe uspkucsa.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 596 set thread context of 2120 596 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 30 PID 2312 set thread context of 2568 2312 vyxtqqxu.exe 32 PID 2960 set thread context of 2956 2960 aifoynda.exe 34 PID 2428 set thread context of 1156 2428 khjlqmla.exe 36 PID 2656 set thread context of 2124 2656 uvkigtqw.exe 38 PID 1248 set thread context of 468 1248 zidqadce.exe 40 PID 2928 set thread context of 2256 2928 bdebhxdb.exe 42 PID 548 set thread context of 1380 548 lgtlvake.exe 44 PID 1608 set thread context of 1944 1608 wyjrhrmg.exe 46 PID 552 set thread context of 1512 552 gxnospty.exe 48 PID 2052 set thread context of 688 2052 qlolqpgv.exe 50 PID 2784 set thread context of 3040 2784 dyfbwtfh.exe 52 PID 2824 set thread context of 2996 2824 nxjygrmh.exe 54 PID 2704 set thread context of 932 2704 awmbpako.exe 56 PID 1436 set thread context of 2016 1436 mtwwdivs.exe 58 PID 1624 set thread context of 2088 1624 waibvhds.exe 60 PID 848 set thread context of 1672 848 juojhuhc.exe 62 PID 1324 set thread context of 2276 1324 wtjmpcnj.exe 64 PID 1352 set thread context of 1872 1352 gsvjabui.exe 66 PID 1668 set thread context of 1808 1668 tipmibsq.exe 68 PID 2664 set thread context of 884 2664 dtfwdegs.exe 70 PID 352 set thread context of 552 352 qjizmmez.exe 72 PID 2608 set thread context of 1536 2608 dicbvmjg.exe 74 PID 1516 set thread context of 2820 1516 nksmippa.exe 76 PID 2876 set thread context of 2716 2876 ajnoryvh.exe 78 PID 2688 set thread context of 2368 2688 nweewbuu.exe 81 PID 1092 set thread context of 2720 1092 xvicpabu.exe 83 PID 2020 set thread context of 2140 2020 hjjzfaoq.exe 85 PID 1860 set thread context of 2908 1860 uwapldnd.exe 87 PID 1700 set thread context of 3016 1700 hnvrtmtk.exe 89 PID 3024 set thread context of 1564 3024 qbwprtgh.exe 91 PID 2508 set thread context of 1660 2508 dzrjatdo.exe 93 PID 1444 set thread context of 2620 1444 qmihgxkt.exe 95 PID 880 set thread context of 2444 880 dgoprkoc.exe 97 PID 2612 set thread context of 2496 2612 qfjsakuk.exe 99 PID 552 set thread context of 2560 552 ahhcnnam.exe 101 PID 1536 set thread context of 2892 1536 ngbfdvgt.exe 103 PID 2820 set thread context of 2868 2820 awwhmdda.exe 105 PID 2716 set thread context of 2956 2716 khmszgsu.exe 107 PID 1120 set thread context of 1524 1120 tkjcnbyw.exe 109 PID 1280 set thread context of 1540 1280 hxsssfxj.exe 111 PID 2140 set thread context of 2176 2140 uvnujncq.exe 113 PID 2676 set thread context of 2000 2676 dboszvqn.exe 115 PID 2064 set thread context of 1552 2064 qwfifror.exe 117 PID 1564 set thread context of 1380 1564 dnaknzmz.exe 119 PID 1340 set thread context of 2104 1340 npqvjcab.exe 121 PID 1584 set thread context of 1064 1584 aosxrkyi.exe 123 PID 1728 set thread context of 2300 1728 nensakdp.exe 125 PID 2228 set thread context of 1996 2228 xsopqsqm.exe 127 PID 2936 set thread context of 2732 2936 kjjsyawt.exe 129 PID 2952 set thread context of 2712 2952 whmvhata.exe 131 PID 2868 set thread context of 1320 2868 jygxqizp.exe 133 PID 2956 set thread context of 1588 2956 tiwillfj.exe 135 PID 2016 set thread context of 1324 2016 bnedprke.exe 137 PID 2908 set thread context of 1988 2908 lbxsfypa.exe 139 PID 548 set thread context of 2176 548 yrzvogvh.exe 141 PID 2000 set thread context of 840 2000 lejttkuu.exe 143 PID 296 set thread context of 1944 296 ygpafogw.exe 145 PID 1380 set thread context of 3056 1380 hrmlasmy.exe 147 PID 2104 set thread context of 1828 2104 uhhnjasf.exe 149 PID 1064 set thread context of 2744 1064 hycqrapm.exe 151 PID 2516 set thread context of 2432 2516 uwftaivt.exe 153 PID 2944 set thread context of 2708 2944 elxqqqiq.exe 155 PID 2696 set thread context of 1120 2696 upgluvfk.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlbojqrc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhvutshj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfnnyhpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtwwdivs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yklnziai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcyguckf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfrroior.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhxsvehd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xobamkqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pmcdftvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awwhmdda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sflrkxbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uniudong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smbwnagz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lgtlvake.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voezpdmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xzlvvcfz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bycsutlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zyzfgfea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkonsmys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqhrsako.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvvicynx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkzoaves.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccxgnbbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdzactwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language renommvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nygtckqp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language poigwlvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfjjixhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxyfrscl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwftaivt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfuuhonc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojfhocbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqmhqhzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jzusfngk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mghfnpir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdklukkw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbntsxpz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrzvbagy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deghqhii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnfnnbod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language negpnojk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umszkjhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvafcpny.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 596 wrote to memory of 2120 596 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 30 PID 596 wrote to memory of 2120 596 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 30 PID 596 wrote to memory of 2120 596 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 30 PID 596 wrote to memory of 2120 596 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 30 PID 596 wrote to memory of 2120 596 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 30 PID 596 wrote to memory of 2120 596 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2312 2120 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2312 2120 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2312 2120 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2312 2120 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 31 PID 2312 wrote to memory of 2568 2312 vyxtqqxu.exe 32 PID 2312 wrote to memory of 2568 2312 vyxtqqxu.exe 32 PID 2312 wrote to memory of 2568 2312 vyxtqqxu.exe 32 PID 2312 wrote to memory of 2568 2312 vyxtqqxu.exe 32 PID 2312 wrote to memory of 2568 2312 vyxtqqxu.exe 32 PID 2312 wrote to memory of 2568 2312 vyxtqqxu.exe 32 PID 2568 wrote to memory of 2960 2568 vyxtqqxu.exe 33 PID 2568 wrote to memory of 2960 2568 vyxtqqxu.exe 33 PID 2568 wrote to memory of 2960 2568 vyxtqqxu.exe 33 PID 2568 wrote to memory of 2960 2568 vyxtqqxu.exe 33 PID 2960 wrote to memory of 2956 2960 aifoynda.exe 34 PID 2960 wrote to memory of 2956 2960 aifoynda.exe 34 PID 2960 wrote to memory of 2956 2960 aifoynda.exe 34 PID 2960 wrote to memory of 2956 2960 aifoynda.exe 34 PID 2960 wrote to memory of 2956 2960 aifoynda.exe 34 PID 2960 wrote to memory of 2956 2960 aifoynda.exe 34 PID 2956 wrote to memory of 2428 2956 aifoynda.exe 35 PID 2956 wrote to memory of 2428 2956 aifoynda.exe 35 PID 2956 wrote to memory of 2428 2956 aifoynda.exe 35 PID 2956 wrote to memory of 2428 2956 aifoynda.exe 35 PID 2428 wrote to memory of 1156 2428 khjlqmla.exe 36 PID 2428 wrote to memory of 1156 2428 khjlqmla.exe 36 PID 2428 wrote to memory of 1156 2428 khjlqmla.exe 36 PID 2428 wrote to memory of 1156 2428 khjlqmla.exe 36 PID 2428 wrote to memory of 1156 2428 khjlqmla.exe 36 PID 2428 wrote to memory of 1156 2428 khjlqmla.exe 36 PID 1156 wrote to memory of 2656 1156 khjlqmla.exe 37 PID 1156 wrote to memory of 2656 1156 khjlqmla.exe 37 PID 1156 wrote to memory of 2656 1156 khjlqmla.exe 37 PID 1156 wrote to memory of 2656 1156 khjlqmla.exe 37 PID 2656 wrote to memory of 2124 2656 uvkigtqw.exe 38 PID 2656 wrote to memory of 2124 2656 uvkigtqw.exe 38 PID 2656 wrote to memory of 2124 2656 uvkigtqw.exe 38 PID 2656 wrote to memory of 2124 2656 uvkigtqw.exe 38 PID 2656 wrote to memory of 2124 2656 uvkigtqw.exe 38 PID 2656 wrote to memory of 2124 2656 uvkigtqw.exe 38 PID 2124 wrote to memory of 1248 2124 uvkigtqw.exe 39 PID 2124 wrote to memory of 1248 2124 uvkigtqw.exe 39 PID 2124 wrote to memory of 1248 2124 uvkigtqw.exe 39 PID 2124 wrote to memory of 1248 2124 uvkigtqw.exe 39 PID 1248 wrote to memory of 468 1248 zidqadce.exe 40 PID 1248 wrote to memory of 468 1248 zidqadce.exe 40 PID 1248 wrote to memory of 468 1248 zidqadce.exe 40 PID 1248 wrote to memory of 468 1248 zidqadce.exe 40 PID 1248 wrote to memory of 468 1248 zidqadce.exe 40 PID 1248 wrote to memory of 468 1248 zidqadce.exe 40 PID 468 wrote to memory of 2928 468 zidqadce.exe 41 PID 468 wrote to memory of 2928 468 zidqadce.exe 41 PID 468 wrote to memory of 2928 468 zidqadce.exe 41 PID 468 wrote to memory of 2928 468 zidqadce.exe 41 PID 2928 wrote to memory of 2256 2928 bdebhxdb.exe 42 PID 2928 wrote to memory of 2256 2928 bdebhxdb.exe 42 PID 2928 wrote to memory of 2256 2928 bdebhxdb.exe 42 PID 2928 wrote to memory of 2256 2928 bdebhxdb.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\vyxtqqxu.exeC:\Windows\system32\vyxtqqxu.exe 452 "C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\vyxtqqxu.exeC:\Windows\SysWOW64\vyxtqqxu.exe 452 C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\aifoynda.exeC:\Windows\system32\aifoynda.exe 528 "C:\Windows\SysWOW64\vyxtqqxu.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\aifoynda.exeC:\Windows\SysWOW64\aifoynda.exe 528 C:\Windows\SysWOW64\vyxtqqxu.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\khjlqmla.exeC:\Windows\system32\khjlqmla.exe 528 "C:\Windows\SysWOW64\aifoynda.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\khjlqmla.exeC:\Windows\SysWOW64\khjlqmla.exe 528 C:\Windows\SysWOW64\aifoynda.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\uvkigtqw.exeC:\Windows\system32\uvkigtqw.exe 528 "C:\Windows\SysWOW64\khjlqmla.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\uvkigtqw.exeC:\Windows\SysWOW64\uvkigtqw.exe 528 C:\Windows\SysWOW64\khjlqmla.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\zidqadce.exeC:\Windows\system32\zidqadce.exe 516 "C:\Windows\SysWOW64\uvkigtqw.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\zidqadce.exeC:\Windows\SysWOW64\zidqadce.exe 516 C:\Windows\SysWOW64\uvkigtqw.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\bdebhxdb.exeC:\Windows\system32\bdebhxdb.exe 512 "C:\Windows\SysWOW64\zidqadce.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\bdebhxdb.exeC:\Windows\SysWOW64\bdebhxdb.exe 512 C:\Windows\SysWOW64\zidqadce.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2256 -
C:\Windows\SysWOW64\lgtlvake.exeC:\Windows\system32\lgtlvake.exe 540 "C:\Windows\SysWOW64\bdebhxdb.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\lgtlvake.exeC:\Windows\SysWOW64\lgtlvake.exe 540 C:\Windows\SysWOW64\bdebhxdb.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1380 -
C:\Windows\SysWOW64\wyjrhrmg.exeC:\Windows\system32\wyjrhrmg.exe 532 "C:\Windows\SysWOW64\lgtlvake.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1608 -
C:\Windows\SysWOW64\wyjrhrmg.exeC:\Windows\SysWOW64\wyjrhrmg.exe 532 C:\Windows\SysWOW64\lgtlvake.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Windows\SysWOW64\gxnospty.exeC:\Windows\system32\gxnospty.exe 540 "C:\Windows\SysWOW64\wyjrhrmg.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:552 -
C:\Windows\SysWOW64\gxnospty.exeC:\Windows\SysWOW64\gxnospty.exe 540 C:\Windows\SysWOW64\wyjrhrmg.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\qlolqpgv.exeC:\Windows\system32\qlolqpgv.exe 544 "C:\Windows\SysWOW64\gxnospty.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2052 -
C:\Windows\SysWOW64\qlolqpgv.exeC:\Windows\SysWOW64\qlolqpgv.exe 544 C:\Windows\SysWOW64\gxnospty.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:688 -
C:\Windows\SysWOW64\dyfbwtfh.exeC:\Windows\system32\dyfbwtfh.exe 528 "C:\Windows\SysWOW64\qlolqpgv.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2784 -
C:\Windows\SysWOW64\dyfbwtfh.exeC:\Windows\SysWOW64\dyfbwtfh.exe 528 C:\Windows\SysWOW64\qlolqpgv.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3040 -
C:\Windows\SysWOW64\nxjygrmh.exeC:\Windows\system32\nxjygrmh.exe 528 "C:\Windows\SysWOW64\dyfbwtfh.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2824 -
C:\Windows\SysWOW64\nxjygrmh.exeC:\Windows\SysWOW64\nxjygrmh.exe 528 C:\Windows\SysWOW64\dyfbwtfh.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996 -
C:\Windows\SysWOW64\awmbpako.exeC:\Windows\system32\awmbpako.exe 532 "C:\Windows\SysWOW64\nxjygrmh.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2704 -
C:\Windows\SysWOW64\awmbpako.exeC:\Windows\SysWOW64\awmbpako.exe 532 C:\Windows\SysWOW64\nxjygrmh.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:932 -
C:\Windows\SysWOW64\mtwwdivs.exeC:\Windows\system32\mtwwdivs.exe 528 "C:\Windows\SysWOW64\awmbpako.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1436 -
C:\Windows\SysWOW64\mtwwdivs.exeC:\Windows\SysWOW64\mtwwdivs.exe 528 C:\Windows\SysWOW64\awmbpako.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Windows\SysWOW64\waibvhds.exeC:\Windows\system32\waibvhds.exe 536 "C:\Windows\SysWOW64\mtwwdivs.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1624 -
C:\Windows\SysWOW64\waibvhds.exeC:\Windows\SysWOW64\waibvhds.exe 536 C:\Windows\SysWOW64\mtwwdivs.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\Windows\SysWOW64\juojhuhc.exeC:\Windows\system32\juojhuhc.exe 544 "C:\Windows\SysWOW64\waibvhds.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:848 -
C:\Windows\SysWOW64\juojhuhc.exeC:\Windows\SysWOW64\juojhuhc.exe 544 C:\Windows\SysWOW64\waibvhds.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Windows\SysWOW64\wtjmpcnj.exeC:\Windows\system32\wtjmpcnj.exe 536 "C:\Windows\SysWOW64\juojhuhc.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1324 -
C:\Windows\SysWOW64\wtjmpcnj.exeC:\Windows\SysWOW64\wtjmpcnj.exe 536 C:\Windows\SysWOW64\juojhuhc.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276 -
C:\Windows\SysWOW64\gsvjabui.exeC:\Windows\system32\gsvjabui.exe 528 "C:\Windows\SysWOW64\wtjmpcnj.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1352 -
C:\Windows\SysWOW64\gsvjabui.exeC:\Windows\SysWOW64\gsvjabui.exe 528 C:\Windows\SysWOW64\wtjmpcnj.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1872 -
C:\Windows\SysWOW64\tipmibsq.exeC:\Windows\system32\tipmibsq.exe 540 "C:\Windows\SysWOW64\gsvjabui.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1668 -
C:\Windows\SysWOW64\tipmibsq.exeC:\Windows\SysWOW64\tipmibsq.exe 540 C:\Windows\SysWOW64\gsvjabui.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Windows\SysWOW64\dtfwdegs.exeC:\Windows\system32\dtfwdegs.exe 544 "C:\Windows\SysWOW64\tipmibsq.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2664 -
C:\Windows\SysWOW64\dtfwdegs.exeC:\Windows\SysWOW64\dtfwdegs.exe 544 C:\Windows\SysWOW64\tipmibsq.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\qjizmmez.exeC:\Windows\system32\qjizmmez.exe 536 "C:\Windows\SysWOW64\dtfwdegs.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:352 -
C:\Windows\SysWOW64\qjizmmez.exeC:\Windows\SysWOW64\qjizmmez.exe 536 C:\Windows\SysWOW64\dtfwdegs.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:552 -
C:\Windows\SysWOW64\dicbvmjg.exeC:\Windows\system32\dicbvmjg.exe 528 "C:\Windows\SysWOW64\qjizmmez.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2608 -
C:\Windows\SysWOW64\dicbvmjg.exeC:\Windows\SysWOW64\dicbvmjg.exe 528 C:\Windows\SysWOW64\qjizmmez.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1536 -
C:\Windows\SysWOW64\nksmippa.exeC:\Windows\system32\nksmippa.exe 540 "C:\Windows\SysWOW64\dicbvmjg.exe"47⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1516 -
C:\Windows\SysWOW64\nksmippa.exeC:\Windows\SysWOW64\nksmippa.exe 540 C:\Windows\SysWOW64\dicbvmjg.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820 -
C:\Windows\SysWOW64\ajnoryvh.exeC:\Windows\system32\ajnoryvh.exe 536 "C:\Windows\SysWOW64\nksmippa.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2876 -
C:\Windows\SysWOW64\ajnoryvh.exeC:\Windows\SysWOW64\ajnoryvh.exe 536 C:\Windows\SysWOW64\nksmippa.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Windows\SysWOW64\nweewbuu.exeC:\Windows\system32\nweewbuu.exe 540 "C:\Windows\SysWOW64\ajnoryvh.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2688 -
C:\Windows\SysWOW64\nweewbuu.exeC:\Windows\SysWOW64\nweewbuu.exe 540 C:\Windows\SysWOW64\ajnoryvh.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2368 -
C:\Windows\SysWOW64\xvicpabu.exeC:\Windows\system32\xvicpabu.exe 532 "C:\Windows\SysWOW64\nweewbuu.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1092 -
C:\Windows\SysWOW64\xvicpabu.exeC:\Windows\SysWOW64\xvicpabu.exe 532 C:\Windows\SysWOW64\nweewbuu.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2720 -
C:\Windows\SysWOW64\hjjzfaoq.exeC:\Windows\system32\hjjzfaoq.exe 532 "C:\Windows\SysWOW64\xvicpabu.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2020 -
C:\Windows\SysWOW64\hjjzfaoq.exeC:\Windows\SysWOW64\hjjzfaoq.exe 532 C:\Windows\SysWOW64\xvicpabu.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2140 -
C:\Windows\SysWOW64\uwapldnd.exeC:\Windows\system32\uwapldnd.exe 528 "C:\Windows\SysWOW64\hjjzfaoq.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1860 -
C:\Windows\SysWOW64\uwapldnd.exeC:\Windows\SysWOW64\uwapldnd.exe 528 C:\Windows\SysWOW64\hjjzfaoq.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Windows\SysWOW64\hnvrtmtk.exeC:\Windows\system32\hnvrtmtk.exe 528 "C:\Windows\SysWOW64\uwapldnd.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1700 -
C:\Windows\SysWOW64\hnvrtmtk.exeC:\Windows\SysWOW64\hnvrtmtk.exe 528 C:\Windows\SysWOW64\uwapldnd.exe60⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\qbwprtgh.exeC:\Windows\system32\qbwprtgh.exe 528 "C:\Windows\SysWOW64\hnvrtmtk.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3024 -
C:\Windows\SysWOW64\qbwprtgh.exeC:\Windows\SysWOW64\qbwprtgh.exe 528 C:\Windows\SysWOW64\hnvrtmtk.exe62⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\dzrjatdo.exeC:\Windows\system32\dzrjatdo.exe 528 "C:\Windows\SysWOW64\qbwprtgh.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2508 -
C:\Windows\SysWOW64\dzrjatdo.exeC:\Windows\SysWOW64\dzrjatdo.exe 528 C:\Windows\SysWOW64\qbwprtgh.exe64⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\qmihgxkt.exeC:\Windows\system32\qmihgxkt.exe 528 "C:\Windows\SysWOW64\dzrjatdo.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1444 -
C:\Windows\SysWOW64\qmihgxkt.exeC:\Windows\SysWOW64\qmihgxkt.exe 528 C:\Windows\SysWOW64\dzrjatdo.exe66⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\dgoprkoc.exeC:\Windows\system32\dgoprkoc.exe 528 "C:\Windows\SysWOW64\qmihgxkt.exe"67⤵
- Suspicious use of SetThreadContext
PID:880 -
C:\Windows\SysWOW64\dgoprkoc.exeC:\Windows\SysWOW64\dgoprkoc.exe 528 C:\Windows\SysWOW64\qmihgxkt.exe68⤵PID:2444
-
C:\Windows\SysWOW64\qfjsakuk.exeC:\Windows\system32\qfjsakuk.exe 532 "C:\Windows\SysWOW64\dgoprkoc.exe"69⤵
- Suspicious use of SetThreadContext
PID:2612 -
C:\Windows\SysWOW64\qfjsakuk.exeC:\Windows\SysWOW64\qfjsakuk.exe 532 C:\Windows\SysWOW64\dgoprkoc.exe70⤵PID:2496
-
C:\Windows\SysWOW64\ahhcnnam.exeC:\Windows\system32\ahhcnnam.exe 528 "C:\Windows\SysWOW64\qfjsakuk.exe"71⤵
- Suspicious use of SetThreadContext
PID:552 -
C:\Windows\SysWOW64\ahhcnnam.exeC:\Windows\SysWOW64\ahhcnnam.exe 528 C:\Windows\SysWOW64\qfjsakuk.exe72⤵PID:2560
-
C:\Windows\SysWOW64\ngbfdvgt.exeC:\Windows\system32\ngbfdvgt.exe 528 "C:\Windows\SysWOW64\ahhcnnam.exe"73⤵
- Suspicious use of SetThreadContext
PID:1536 -
C:\Windows\SysWOW64\ngbfdvgt.exeC:\Windows\SysWOW64\ngbfdvgt.exe 528 C:\Windows\SysWOW64\ahhcnnam.exe74⤵PID:2892
-
C:\Windows\SysWOW64\awwhmdda.exeC:\Windows\system32\awwhmdda.exe 528 "C:\Windows\SysWOW64\ngbfdvgt.exe"75⤵
- Suspicious use of SetThreadContext
PID:2820 -
C:\Windows\SysWOW64\awwhmdda.exeC:\Windows\SysWOW64\awwhmdda.exe 528 C:\Windows\SysWOW64\ngbfdvgt.exe76⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\khmszgsu.exeC:\Windows\system32\khmszgsu.exe 528 "C:\Windows\SysWOW64\awwhmdda.exe"77⤵
- Suspicious use of SetThreadContext
PID:2716 -
C:\Windows\SysWOW64\khmszgsu.exeC:\Windows\SysWOW64\khmszgsu.exe 528 C:\Windows\SysWOW64\awwhmdda.exe78⤵PID:2956
-
C:\Windows\SysWOW64\tkjcnbyw.exeC:\Windows\system32\tkjcnbyw.exe 528 "C:\Windows\SysWOW64\khmszgsu.exe"79⤵
- Suspicious use of SetThreadContext
PID:1120 -
C:\Windows\SysWOW64\tkjcnbyw.exeC:\Windows\SysWOW64\tkjcnbyw.exe 528 C:\Windows\SysWOW64\khmszgsu.exe80⤵PID:1524
-
C:\Windows\SysWOW64\hxsssfxj.exeC:\Windows\system32\hxsssfxj.exe 524 "C:\Windows\SysWOW64\tkjcnbyw.exe"81⤵
- Suspicious use of SetThreadContext
PID:1280 -
C:\Windows\SysWOW64\hxsssfxj.exeC:\Windows\SysWOW64\hxsssfxj.exe 524 C:\Windows\SysWOW64\tkjcnbyw.exe82⤵PID:1540
-
C:\Windows\SysWOW64\uvnujncq.exeC:\Windows\system32\uvnujncq.exe 528 "C:\Windows\SysWOW64\hxsssfxj.exe"83⤵
- Suspicious use of SetThreadContext
PID:2140 -
C:\Windows\SysWOW64\uvnujncq.exeC:\Windows\SysWOW64\uvnujncq.exe 528 C:\Windows\SysWOW64\hxsssfxj.exe84⤵PID:2176
-
C:\Windows\SysWOW64\dboszvqn.exeC:\Windows\system32\dboszvqn.exe 528 "C:\Windows\SysWOW64\uvnujncq.exe"85⤵
- Suspicious use of SetThreadContext
PID:2676 -
C:\Windows\SysWOW64\dboszvqn.exeC:\Windows\SysWOW64\dboszvqn.exe 528 C:\Windows\SysWOW64\uvnujncq.exe86⤵PID:2000
-
C:\Windows\SysWOW64\qwfifror.exeC:\Windows\system32\qwfifror.exe 528 "C:\Windows\SysWOW64\dboszvqn.exe"87⤵
- Suspicious use of SetThreadContext
PID:2064 -
C:\Windows\SysWOW64\qwfifror.exeC:\Windows\SysWOW64\qwfifror.exe 528 C:\Windows\SysWOW64\dboszvqn.exe88⤵PID:1552
-
C:\Windows\SysWOW64\dnaknzmz.exeC:\Windows\system32\dnaknzmz.exe 528 "C:\Windows\SysWOW64\qwfifror.exe"89⤵
- Suspicious use of SetThreadContext
PID:1564 -
C:\Windows\SysWOW64\dnaknzmz.exeC:\Windows\SysWOW64\dnaknzmz.exe 528 C:\Windows\SysWOW64\qwfifror.exe90⤵PID:1380
-
C:\Windows\SysWOW64\npqvjcab.exeC:\Windows\system32\npqvjcab.exe 528 "C:\Windows\SysWOW64\dnaknzmz.exe"91⤵
- Suspicious use of SetThreadContext
PID:1340 -
C:\Windows\SysWOW64\npqvjcab.exeC:\Windows\SysWOW64\npqvjcab.exe 528 C:\Windows\SysWOW64\dnaknzmz.exe92⤵PID:2104
-
C:\Windows\SysWOW64\aosxrkyi.exeC:\Windows\system32\aosxrkyi.exe 528 "C:\Windows\SysWOW64\npqvjcab.exe"93⤵
- Suspicious use of SetThreadContext
PID:1584 -
C:\Windows\SysWOW64\aosxrkyi.exeC:\Windows\SysWOW64\aosxrkyi.exe 528 C:\Windows\SysWOW64\npqvjcab.exe94⤵
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\nensakdp.exeC:\Windows\system32\nensakdp.exe 528 "C:\Windows\SysWOW64\aosxrkyi.exe"95⤵
- Suspicious use of SetThreadContext
PID:1728 -
C:\Windows\SysWOW64\nensakdp.exeC:\Windows\SysWOW64\nensakdp.exe 528 C:\Windows\SysWOW64\aosxrkyi.exe96⤵PID:2300
-
C:\Windows\SysWOW64\xsopqsqm.exeC:\Windows\system32\xsopqsqm.exe 528 "C:\Windows\SysWOW64\nensakdp.exe"97⤵
- Suspicious use of SetThreadContext
PID:2228 -
C:\Windows\SysWOW64\xsopqsqm.exeC:\Windows\SysWOW64\xsopqsqm.exe 528 C:\Windows\SysWOW64\nensakdp.exe98⤵PID:1996
-
C:\Windows\SysWOW64\kjjsyawt.exeC:\Windows\system32\kjjsyawt.exe 528 "C:\Windows\SysWOW64\xsopqsqm.exe"99⤵
- Suspicious use of SetThreadContext
PID:2936 -
C:\Windows\SysWOW64\kjjsyawt.exeC:\Windows\SysWOW64\kjjsyawt.exe 528 C:\Windows\SysWOW64\xsopqsqm.exe100⤵PID:2732
-
C:\Windows\SysWOW64\whmvhata.exeC:\Windows\system32\whmvhata.exe 528 "C:\Windows\SysWOW64\kjjsyawt.exe"101⤵
- Suspicious use of SetThreadContext
PID:2952 -
C:\Windows\SysWOW64\whmvhata.exeC:\Windows\SysWOW64\whmvhata.exe 528 C:\Windows\SysWOW64\kjjsyawt.exe102⤵PID:2712
-
C:\Windows\SysWOW64\jygxqizp.exeC:\Windows\system32\jygxqizp.exe 528 "C:\Windows\SysWOW64\whmvhata.exe"103⤵
- Suspicious use of SetThreadContext
PID:2868 -
C:\Windows\SysWOW64\jygxqizp.exeC:\Windows\SysWOW64\jygxqizp.exe 528 C:\Windows\SysWOW64\whmvhata.exe104⤵PID:1320
-
C:\Windows\SysWOW64\tiwillfj.exeC:\Windows\system32\tiwillfj.exe 528 "C:\Windows\SysWOW64\jygxqizp.exe"105⤵
- Suspicious use of SetThreadContext
PID:2956 -
C:\Windows\SysWOW64\tiwillfj.exeC:\Windows\SysWOW64\tiwillfj.exe 528 C:\Windows\SysWOW64\jygxqizp.exe106⤵PID:1588
-
C:\Windows\SysWOW64\bnedprke.exeC:\Windows\system32\bnedprke.exe 528 "C:\Windows\SysWOW64\tiwillfj.exe"107⤵
- Suspicious use of SetThreadContext
PID:2016 -
C:\Windows\SysWOW64\bnedprke.exeC:\Windows\SysWOW64\bnedprke.exe 528 C:\Windows\SysWOW64\tiwillfj.exe108⤵PID:1324
-
C:\Windows\SysWOW64\lbxsfypa.exeC:\Windows\system32\lbxsfypa.exe 528 "C:\Windows\SysWOW64\bnedprke.exe"109⤵
- Suspicious use of SetThreadContext
PID:2908 -
C:\Windows\SysWOW64\lbxsfypa.exeC:\Windows\SysWOW64\lbxsfypa.exe 528 C:\Windows\SysWOW64\bnedprke.exe110⤵PID:1988
-
C:\Windows\SysWOW64\yrzvogvh.exeC:\Windows\system32\yrzvogvh.exe 528 "C:\Windows\SysWOW64\lbxsfypa.exe"111⤵
- Suspicious use of SetThreadContext
PID:548 -
C:\Windows\SysWOW64\yrzvogvh.exeC:\Windows\SysWOW64\yrzvogvh.exe 528 C:\Windows\SysWOW64\lbxsfypa.exe112⤵PID:2176
-
C:\Windows\SysWOW64\lejttkuu.exeC:\Windows\system32\lejttkuu.exe 528 "C:\Windows\SysWOW64\yrzvogvh.exe"113⤵
- Suspicious use of SetThreadContext
PID:2000 -
C:\Windows\SysWOW64\lejttkuu.exeC:\Windows\SysWOW64\lejttkuu.exe 528 C:\Windows\SysWOW64\yrzvogvh.exe114⤵PID:840
-
C:\Windows\SysWOW64\ygpafogw.exeC:\Windows\system32\ygpafogw.exe 528 "C:\Windows\SysWOW64\lejttkuu.exe"115⤵
- Suspicious use of SetThreadContext
PID:296 -
C:\Windows\SysWOW64\ygpafogw.exeC:\Windows\SysWOW64\ygpafogw.exe 528 C:\Windows\SysWOW64\lejttkuu.exe116⤵PID:1944
-
C:\Windows\SysWOW64\hrmlasmy.exeC:\Windows\system32\hrmlasmy.exe 528 "C:\Windows\SysWOW64\ygpafogw.exe"117⤵
- Suspicious use of SetThreadContext
PID:1380 -
C:\Windows\SysWOW64\hrmlasmy.exeC:\Windows\SysWOW64\hrmlasmy.exe 528 C:\Windows\SysWOW64\ygpafogw.exe118⤵PID:3056
-
C:\Windows\SysWOW64\uhhnjasf.exeC:\Windows\system32\uhhnjasf.exe 528 "C:\Windows\SysWOW64\hrmlasmy.exe"119⤵
- Suspicious use of SetThreadContext
PID:2104 -
C:\Windows\SysWOW64\uhhnjasf.exeC:\Windows\SysWOW64\uhhnjasf.exe 528 C:\Windows\SysWOW64\hrmlasmy.exe120⤵PID:1828
-
C:\Windows\SysWOW64\hycqrapm.exeC:\Windows\system32\hycqrapm.exe 528 "C:\Windows\SysWOW64\uhhnjasf.exe"121⤵
- Suspicious use of SetThreadContext
PID:1064 -
C:\Windows\SysWOW64\hycqrapm.exeC:\Windows\SysWOW64\hycqrapm.exe 528 C:\Windows\SysWOW64\uhhnjasf.exe122⤵PID:2744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-