Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 09:15
Behavioral task
behavioral1
Sample
f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe
-
Size
237KB
-
MD5
f3501af5dc8b0b319e544e6a10e1906a
-
SHA1
75197310bd9e7ef576bbf4166fc1044c374d8aa4
-
SHA256
e0ae1fd7a171e754d040c4a1e6a7ea5e130b354498e1d8ebfb7592e3edb10e8d
-
SHA512
23f1c6ec841377fed2744ac71303c84cc82e68a00744d19e67fba7d15734b190c1127db64798ee88a28084836b8631255f2d2ce40699b62cd065185427161a99
-
SSDEEP
6144:c8uZgVdFVTjOYkli66UpQrASF2nOewP/wnwR3:cXZi8pY66UpQ/F6O9t
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 21 IoCs
resource yara_rule behavioral2/memory/3972-5-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/files/0x000c000000023b2b-11.dat modiloader_stage2 behavioral2/memory/2180-21-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/4344-36-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/4892-47-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/2980-57-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/2752-66-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/3552-75-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/4896-83-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/1884-92-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/1480-101-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/3216-110-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/2584-119-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/1696-128-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/3352-138-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/4764-146-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/4880-155-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/2824-165-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/2768-174-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/4236-182-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 behavioral2/memory/576-191-0x0000000020000000-0x0000000020041000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2180 ggvnlqub.exe 2904 ggvnlqub.exe 4344 gjhfauzv.exe 3664 gjhfauzv.exe 4892 ohvsleeo.exe 4992 ohvsleeo.exe 2980 dedsyxfa.exe 3172 dedsyxfa.exe 2752 oosydnhc.exe 3936 oosydnhc.exe 3552 gvvdigjh.exe 2260 gvvdigjh.exe 4896 ndqdudkr.exe 3292 ndqdudkr.exe 1884 ablgcdqg.exe 4588 ablgcdqg.exe 1480 gzqoqexj.exe 5064 gzqoqexj.exe 3216 oodbcpuc.exe 2860 oodbcpuc.exe 2584 vwrboeev.exe 1692 vwrboeev.exe 1696 jfxerewf.exe 2808 jfxerewf.exe 3352 weahaebm.exe 344 weahaebm.exe 4764 gdeesdjm.exe 684 gdeesdjm.exe 4880 lemzbips.exe 4740 lemzbips.exe 2824 yotklihc.exe 3760 yotklihc.exe 2768 lmnmuqmj.exe 4460 lmnmuqmj.exe 4236 ydqpdqsz.exe 3620 ydqpdqsz.exe 576 yhaumjuo.exe 3600 yhaumjuo.exe 1408 dijpdgau.exe 1968 dijpdgau.exe 2204 nekikbbr.exe 2748 nekikbbr.exe 4176 vfiizqfn.exe 3512 vfiizqfn.exe 2396 issxfles.exe 2608 issxfles.exe 3172 srevpklr.exe 4808 srevpklr.exe 4184 djuauinu.exe 4132 djuauinu.exe 2568 scrndwql.exe 444 scrndwql.exe 3112 vmilwsyk.exe 736 vmilwsyk.exe 4596 kculccty.exe 2764 kculccty.exe 2248 agcggpyt.exe 4124 agcggpyt.exe 1448 nxxippva.exe 3740 nxxippva.exe 2932 xebghodz.exe 1584 xebghodz.exe 5096 kuejqwjh.exe 3596 kuejqwjh.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cpyxbqkl.exe puphvumy.exe File created C:\Windows\SysWOW64\sfwqorwd.exe fsmaivxy.exe File created C:\Windows\SysWOW64\fcoswilb.exe shxcqeew.exe File opened for modification C:\Windows\SysWOW64\rgvfnbzh.exe Process not Found File opened for modification C:\Windows\SysWOW64\jyosjxhy.exe Process not Found File opened for modification C:\Windows\SysWOW64\xnbihpkc.exe kajsbldp.exe File created C:\Windows\SysWOW64\edsdilay.exe rqbnchbt.exe File created C:\Windows\SysWOW64\pwkgsvjj.exe zvvyzulr.exe File created C:\Windows\SysWOW64\utpjfmki.exe krazsieg.exe File opened for modification C:\Windows\SysWOW64\daaokebe.exe Process not Found File created C:\Windows\SysWOW64\agcggpyt.exe kculccty.exe File created C:\Windows\SysWOW64\cclcrqxp.exe perzjisi.exe File opened for modification C:\Windows\SysWOW64\cclcrqxp.exe perzjisi.exe File opened for modification C:\Windows\SysWOW64\klkpdvxz.exe amyrkxqh.exe File opened for modification C:\Windows\SysWOW64\nasmrvfs.exe znbwlzhn.exe File created C:\Windows\SysWOW64\awijysek.exe kvlbwjgs.exe File opened for modification C:\Windows\SysWOW64\aoejcqxf.exe Process not Found File created C:\Windows\SysWOW64\gjhfauzv.exe ggvnlqub.exe File opened for modification C:\Windows\SysWOW64\nzysmauw.exe dexhegtr.exe File opened for modification C:\Windows\SysWOW64\ocacnnnx.exe bsuzkonn.exe File opened for modification C:\Windows\SysWOW64\ixqdieht.exe Process not Found File created C:\Windows\SysWOW64\spgbxmhp.exe fuxlrqik.exe File created C:\Windows\SysWOW64\zuabwjov.exe mhimqfpi.exe File opened for modification C:\Windows\SysWOW64\ubunbiom.exe hgkxvepz.exe File opened for modification C:\Windows\SysWOW64\jnqrgqyi.exe Process not Found File created C:\Windows\SysWOW64\vqstmzyj.exe Process not Found File created C:\Windows\SysWOW64\nocjqpnb.exe dpqegqfb.exe File created C:\Windows\SysWOW64\ypzqadoe.exe Process not Found File opened for modification C:\Windows\SysWOW64\kajsbldp.exe abfnrnep.exe File created C:\Windows\SysWOW64\yqdsicdl.exe ldmccyey.exe File created C:\Windows\SysWOW64\jqvwicfx.exe Process not Found File created C:\Windows\SysWOW64\fltafouf.exe vmodupmf.exe File created C:\Windows\SysWOW64\xcfrledo.exe klkpdvxz.exe File opened for modification C:\Windows\SysWOW64\vhokckle.exe iueuwoms.exe File opened for modification C:\Windows\SysWOW64\ljdhempm.exe aocoxrop.exe File opened for modification C:\Windows\SysWOW64\xydaulqe.exe khixldtx.exe File created C:\Windows\SysWOW64\mxnxpovd.exe zhsuggqw.exe File opened for modification C:\Windows\SysWOW64\goawhyds.exe wdkltvxq.exe File opened for modification C:\Windows\SysWOW64\iylafdzi.exe yzhdvesi.exe File opened for modification C:\Windows\SysWOW64\osqsdvfl.exe Process not Found File opened for modification C:\Windows\SysWOW64\ablgcdqg.exe ndqdudkr.exe File created C:\Windows\SysWOW64\grmovcim.exe tbrlmukf.exe File created C:\Windows\SysWOW64\ubunbiom.exe hgkxvepz.exe File created C:\Windows\SysWOW64\upcebrow.exe Process not Found File opened for modification C:\Windows\SysWOW64\txazmiko.exe Process not Found File created C:\Windows\SysWOW64\tvvdndfs.exe gimnhhgf.exe File created C:\Windows\SysWOW64\oosydnhc.exe dedsyxfa.exe File created C:\Windows\SysWOW64\rfzkytfr.exe hjyaizwl.exe File opened for modification C:\Windows\SysWOW64\brydokyr.exe oehnjgrm.exe File created C:\Windows\SysWOW64\aapxhhra.exe nqjmeirq.exe File created C:\Windows\SysWOW64\vzjuhmyg.exe Process not Found File created C:\Windows\SysWOW64\gvyrulsr.exe Process not Found File created C:\Windows\SysWOW64\scrndwql.exe djuauinu.exe File created C:\Windows\SysWOW64\vmilwsyk.exe scrndwql.exe File created C:\Windows\SysWOW64\fgjdgunw.exe spgbxmhp.exe File opened for modification C:\Windows\SysWOW64\uepytuxi.exe houvcmsb.exe File opened for modification C:\Windows\SysWOW64\dpecsvbx.exe ndvhoied.exe File created C:\Windows\SysWOW64\ujpxdyup.exe htuuvywi.exe File created C:\Windows\SysWOW64\wepmxwut.exe rryprsvh.exe File created C:\Windows\SysWOW64\qgkeynoa.exe dqpbimql.exe File opened for modification C:\Windows\SysWOW64\xuqxkzpi.exe khyhevqe.exe File created C:\Windows\SysWOW64\mtstfcui.exe zyjwzgvd.exe File opened for modification C:\Windows\SysWOW64\oeiattcl.exe Process not Found File opened for modification C:\Windows\SysWOW64\vstgnmhc.exe Process not Found -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3972 set thread context of 2244 3972 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 82 PID 2180 set thread context of 2904 2180 ggvnlqub.exe 84 PID 4344 set thread context of 3664 4344 gjhfauzv.exe 86 PID 4892 set thread context of 4992 4892 ohvsleeo.exe 88 PID 2980 set thread context of 3172 2980 dedsyxfa.exe 90 PID 2752 set thread context of 3936 2752 oosydnhc.exe 92 PID 3552 set thread context of 2260 3552 gvvdigjh.exe 94 PID 4896 set thread context of 3292 4896 ndqdudkr.exe 96 PID 1884 set thread context of 4588 1884 ablgcdqg.exe 98 PID 1480 set thread context of 5064 1480 gzqoqexj.exe 100 PID 3216 set thread context of 2860 3216 oodbcpuc.exe 102 PID 2584 set thread context of 1692 2584 vwrboeev.exe 104 PID 1696 set thread context of 2808 1696 jfxerewf.exe 108 PID 3352 set thread context of 344 3352 weahaebm.exe 110 PID 4764 set thread context of 684 4764 gdeesdjm.exe 112 PID 4880 set thread context of 4740 4880 lemzbips.exe 114 PID 2824 set thread context of 3760 2824 yotklihc.exe 117 PID 2768 set thread context of 4460 2768 lmnmuqmj.exe 119 PID 4236 set thread context of 3620 4236 ydqpdqsz.exe 122 PID 576 set thread context of 3600 576 yhaumjuo.exe 124 PID 1408 set thread context of 1968 1408 dijpdgau.exe 126 PID 2204 set thread context of 2748 2204 nekikbbr.exe 128 PID 4176 set thread context of 3512 4176 vfiizqfn.exe 130 PID 2396 set thread context of 2608 2396 issxfles.exe 132 PID 3172 set thread context of 4808 3172 srevpklr.exe 134 PID 4184 set thread context of 4132 4184 djuauinu.exe 136 PID 2568 set thread context of 444 2568 scrndwql.exe 138 PID 3112 set thread context of 736 3112 vmilwsyk.exe 140 PID 4596 set thread context of 2764 4596 kculccty.exe 142 PID 2248 set thread context of 4124 2248 agcggpyt.exe 145 PID 1448 set thread context of 3740 1448 nxxippva.exe 147 PID 2932 set thread context of 1584 2932 xebghodz.exe 149 PID 5096 set thread context of 3596 5096 kuejqwjh.exe 151 PID 2280 set thread context of 3068 2280 tkrwuzga.exe 153 PID 4136 set thread context of 2104 4136 akqwinkv.exe 155 PID 1328 set thread context of 3896 1328 aocoxrop.exe 157 PID 3328 set thread context of 3632 3328 ljdhempm.exe 159 PID 2216 set thread context of 3824 2216 nbvwxixl.exe 161 PID 4496 set thread context of 1952 4496 asqzfqcs.exe 163 PID 2092 set thread context of 1360 2092 nqtcoyaz.exe 165 PID 1144 set thread context of 3160 1144 adcsuuhm.exe 167 PID 3656 set thread context of 4304 3656 nquhzyfr.exe 171 PID 3448 set thread context of 3208 3448 ahokigdg.exe 173 PID 2396 set thread context of 4992 2396 nfrnzoin.exe 175 PID 3172 set thread context of 4296 3172 xevkjnqn.exe 177 PID 4184 set thread context of 4976 4184 locvmfqx.exe 179 PID 2568 set thread context of 2108 2568 yewxvnne.exe 181 PID 3112 set thread context of 4584 3112 lronaruj.exe 183 PID 4596 set thread context of 4712 4596 vysllpuj.exe 185 PID 804 set thread context of 4484 804 ldagpvrd.exe 187 PID 4972 set thread context of 3076 4972 vytqepza.exe 189 PID 2684 set thread context of 1132 2684 ipwtnxxh.exe 191 PID 5032 set thread context of 2528 5032 swaqxweh.exe 193 PID 4116 set thread context of 2220 4116 fjsodadu.exe 195 PID 2148 set thread context of 1808 2148 twbdjwkz.exe 197 PID 64 set thread context of 2164 64 fyptuioi.exe 199 PID 2152 set thread context of 1896 2152 pxtrnhwi.exe 201 PID 1848 set thread context of 4740 1848 dhatqgos.exe 203 PID 5040 set thread context of 1148 5040 qxvwyhta.exe 205 PID 2916 set thread context of 3064 2916 atvggbuf.exe 207 PID 1340 set thread context of 2244 1340 ksamqacx.exe 209 PID 3728 set thread context of 1968 3728 seihunyr.exe 211 PID 2980 set thread context of 4636 2980 fvdcdvey.exe 213 PID 2548 set thread context of 4312 2548 puphvumy.exe 215 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbdzqqsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjhticxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language famjfmra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpsrhhor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xskclfjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vldqtzym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjifnzdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpylgahw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxelnvyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzqoqexj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctbslinw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhzxrhob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btgffejw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zsovjsbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyryoson.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpqegqfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iueuwoms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmzrjoty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pojahvds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dexhegtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnksxdbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsfrpfsr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language doswfxnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tltlapyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpdgbwbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language locvmfqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbsjcfop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pqatmxzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmsubfee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language czaetetl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgcneaun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zfxqmizu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fwiregel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucinxblt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qsxrivbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tildxojt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzgfaepw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htuuvywi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wepmxwut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fqcahehh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvmyzkje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsnfuuuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xuqxkzpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggvnlqub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sokzibnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evskrmyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilzfvvmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojegybmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chpyuiij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omxuuxqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xyhcjota.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 2244 3972 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 82 PID 3972 wrote to memory of 2244 3972 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 82 PID 3972 wrote to memory of 2244 3972 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 82 PID 3972 wrote to memory of 2244 3972 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 82 PID 3972 wrote to memory of 2244 3972 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2180 2244 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 83 PID 2244 wrote to memory of 2180 2244 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 83 PID 2244 wrote to memory of 2180 2244 f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe 83 PID 2180 wrote to memory of 2904 2180 ggvnlqub.exe 84 PID 2180 wrote to memory of 2904 2180 ggvnlqub.exe 84 PID 2180 wrote to memory of 2904 2180 ggvnlqub.exe 84 PID 2180 wrote to memory of 2904 2180 ggvnlqub.exe 84 PID 2180 wrote to memory of 2904 2180 ggvnlqub.exe 84 PID 2904 wrote to memory of 4344 2904 ggvnlqub.exe 85 PID 2904 wrote to memory of 4344 2904 ggvnlqub.exe 85 PID 2904 wrote to memory of 4344 2904 ggvnlqub.exe 85 PID 4344 wrote to memory of 3664 4344 gjhfauzv.exe 86 PID 4344 wrote to memory of 3664 4344 gjhfauzv.exe 86 PID 4344 wrote to memory of 3664 4344 gjhfauzv.exe 86 PID 4344 wrote to memory of 3664 4344 gjhfauzv.exe 86 PID 4344 wrote to memory of 3664 4344 gjhfauzv.exe 86 PID 3664 wrote to memory of 4892 3664 gjhfauzv.exe 87 PID 3664 wrote to memory of 4892 3664 gjhfauzv.exe 87 PID 3664 wrote to memory of 4892 3664 gjhfauzv.exe 87 PID 4892 wrote to memory of 4992 4892 ohvsleeo.exe 88 PID 4892 wrote to memory of 4992 4892 ohvsleeo.exe 88 PID 4892 wrote to memory of 4992 4892 ohvsleeo.exe 88 PID 4892 wrote to memory of 4992 4892 ohvsleeo.exe 88 PID 4892 wrote to memory of 4992 4892 ohvsleeo.exe 88 PID 4992 wrote to memory of 2980 4992 ohvsleeo.exe 89 PID 4992 wrote to memory of 2980 4992 ohvsleeo.exe 89 PID 4992 wrote to memory of 2980 4992 ohvsleeo.exe 89 PID 2980 wrote to memory of 3172 2980 dedsyxfa.exe 90 PID 2980 wrote to memory of 3172 2980 dedsyxfa.exe 90 PID 2980 wrote to memory of 3172 2980 dedsyxfa.exe 90 PID 2980 wrote to memory of 3172 2980 dedsyxfa.exe 90 PID 2980 wrote to memory of 3172 2980 dedsyxfa.exe 90 PID 3172 wrote to memory of 2752 3172 dedsyxfa.exe 91 PID 3172 wrote to memory of 2752 3172 dedsyxfa.exe 91 PID 3172 wrote to memory of 2752 3172 dedsyxfa.exe 91 PID 2752 wrote to memory of 3936 2752 oosydnhc.exe 92 PID 2752 wrote to memory of 3936 2752 oosydnhc.exe 92 PID 2752 wrote to memory of 3936 2752 oosydnhc.exe 92 PID 2752 wrote to memory of 3936 2752 oosydnhc.exe 92 PID 2752 wrote to memory of 3936 2752 oosydnhc.exe 92 PID 3936 wrote to memory of 3552 3936 oosydnhc.exe 93 PID 3936 wrote to memory of 3552 3936 oosydnhc.exe 93 PID 3936 wrote to memory of 3552 3936 oosydnhc.exe 93 PID 3552 wrote to memory of 2260 3552 gvvdigjh.exe 94 PID 3552 wrote to memory of 2260 3552 gvvdigjh.exe 94 PID 3552 wrote to memory of 2260 3552 gvvdigjh.exe 94 PID 3552 wrote to memory of 2260 3552 gvvdigjh.exe 94 PID 3552 wrote to memory of 2260 3552 gvvdigjh.exe 94 PID 2260 wrote to memory of 4896 2260 gvvdigjh.exe 95 PID 2260 wrote to memory of 4896 2260 gvvdigjh.exe 95 PID 2260 wrote to memory of 4896 2260 gvvdigjh.exe 95 PID 4896 wrote to memory of 3292 4896 ndqdudkr.exe 96 PID 4896 wrote to memory of 3292 4896 ndqdudkr.exe 96 PID 4896 wrote to memory of 3292 4896 ndqdudkr.exe 96 PID 4896 wrote to memory of 3292 4896 ndqdudkr.exe 96 PID 4896 wrote to memory of 3292 4896 ndqdudkr.exe 96 PID 3292 wrote to memory of 1884 3292 ndqdudkr.exe 97 PID 3292 wrote to memory of 1884 3292 ndqdudkr.exe 97 PID 3292 wrote to memory of 1884 3292 ndqdudkr.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\ggvnlqub.exeC:\Windows\system32\ggvnlqub.exe 1000 "C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\ggvnlqub.exeC:\Windows\SysWOW64\ggvnlqub.exe 1000 C:\Users\Admin\AppData\Local\Temp\f3501af5dc8b0b319e544e6a10e1906a_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\gjhfauzv.exeC:\Windows\system32\gjhfauzv.exe 1148 "C:\Windows\SysWOW64\ggvnlqub.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\gjhfauzv.exeC:\Windows\SysWOW64\gjhfauzv.exe 1148 C:\Windows\SysWOW64\ggvnlqub.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\ohvsleeo.exeC:\Windows\system32\ohvsleeo.exe 1148 "C:\Windows\SysWOW64\gjhfauzv.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\ohvsleeo.exeC:\Windows\SysWOW64\ohvsleeo.exe 1148 C:\Windows\SysWOW64\gjhfauzv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\dedsyxfa.exeC:\Windows\system32\dedsyxfa.exe 1148 "C:\Windows\SysWOW64\ohvsleeo.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\dedsyxfa.exeC:\Windows\SysWOW64\dedsyxfa.exe 1148 C:\Windows\SysWOW64\ohvsleeo.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\oosydnhc.exeC:\Windows\system32\oosydnhc.exe 1148 "C:\Windows\SysWOW64\dedsyxfa.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\oosydnhc.exeC:\Windows\SysWOW64\oosydnhc.exe 1148 C:\Windows\SysWOW64\dedsyxfa.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\gvvdigjh.exeC:\Windows\system32\gvvdigjh.exe 1148 "C:\Windows\SysWOW64\oosydnhc.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\gvvdigjh.exeC:\Windows\SysWOW64\gvvdigjh.exe 1148 C:\Windows\SysWOW64\oosydnhc.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\ndqdudkr.exeC:\Windows\system32\ndqdudkr.exe 1148 "C:\Windows\SysWOW64\gvvdigjh.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\ndqdudkr.exeC:\Windows\SysWOW64\ndqdudkr.exe 1148 C:\Windows\SysWOW64\gvvdigjh.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\ablgcdqg.exeC:\Windows\system32\ablgcdqg.exe 1044 "C:\Windows\SysWOW64\ndqdudkr.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1884 -
C:\Windows\SysWOW64\ablgcdqg.exeC:\Windows\SysWOW64\ablgcdqg.exe 1044 C:\Windows\SysWOW64\ndqdudkr.exe18⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\gzqoqexj.exeC:\Windows\system32\gzqoqexj.exe 1148 "C:\Windows\SysWOW64\ablgcdqg.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1480 -
C:\Windows\SysWOW64\gzqoqexj.exeC:\Windows\SysWOW64\gzqoqexj.exe 1148 C:\Windows\SysWOW64\ablgcdqg.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Windows\SysWOW64\oodbcpuc.exeC:\Windows\system32\oodbcpuc.exe 1148 "C:\Windows\SysWOW64\gzqoqexj.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3216 -
C:\Windows\SysWOW64\oodbcpuc.exeC:\Windows\SysWOW64\oodbcpuc.exe 1148 C:\Windows\SysWOW64\gzqoqexj.exe22⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\vwrboeev.exeC:\Windows\system32\vwrboeev.exe 1032 "C:\Windows\SysWOW64\oodbcpuc.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2584 -
C:\Windows\SysWOW64\vwrboeev.exeC:\Windows\SysWOW64\vwrboeev.exe 1032 C:\Windows\SysWOW64\oodbcpuc.exe24⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\jfxerewf.exeC:\Windows\system32\jfxerewf.exe 1148 "C:\Windows\SysWOW64\vwrboeev.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1696 -
C:\Windows\SysWOW64\jfxerewf.exeC:\Windows\SysWOW64\jfxerewf.exe 1148 C:\Windows\SysWOW64\vwrboeev.exe26⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\weahaebm.exeC:\Windows\system32\weahaebm.exe 1016 "C:\Windows\SysWOW64\jfxerewf.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3352 -
C:\Windows\SysWOW64\weahaebm.exeC:\Windows\SysWOW64\weahaebm.exe 1016 C:\Windows\SysWOW64\jfxerewf.exe28⤵
- Executes dropped EXE
PID:344 -
C:\Windows\SysWOW64\gdeesdjm.exeC:\Windows\system32\gdeesdjm.exe 1036 "C:\Windows\SysWOW64\weahaebm.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4764 -
C:\Windows\SysWOW64\gdeesdjm.exeC:\Windows\SysWOW64\gdeesdjm.exe 1036 C:\Windows\SysWOW64\weahaebm.exe30⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\lemzbips.exeC:\Windows\system32\lemzbips.exe 1148 "C:\Windows\SysWOW64\gdeesdjm.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4880 -
C:\Windows\SysWOW64\lemzbips.exeC:\Windows\SysWOW64\lemzbips.exe 1148 C:\Windows\SysWOW64\gdeesdjm.exe32⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\yotklihc.exeC:\Windows\system32\yotklihc.exe 1016 "C:\Windows\SysWOW64\lemzbips.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2824 -
C:\Windows\SysWOW64\yotklihc.exeC:\Windows\SysWOW64\yotklihc.exe 1016 C:\Windows\SysWOW64\lemzbips.exe34⤵
- Executes dropped EXE
PID:3760 -
C:\Windows\SysWOW64\lmnmuqmj.exeC:\Windows\system32\lmnmuqmj.exe 1148 "C:\Windows\SysWOW64\yotklihc.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2768 -
C:\Windows\SysWOW64\lmnmuqmj.exeC:\Windows\SysWOW64\lmnmuqmj.exe 1148 C:\Windows\SysWOW64\yotklihc.exe36⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\ydqpdqsz.exeC:\Windows\system32\ydqpdqsz.exe 1148 "C:\Windows\SysWOW64\lmnmuqmj.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4236 -
C:\Windows\SysWOW64\ydqpdqsz.exeC:\Windows\SysWOW64\ydqpdqsz.exe 1148 C:\Windows\SysWOW64\lmnmuqmj.exe38⤵
- Executes dropped EXE
PID:3620 -
C:\Windows\SysWOW64\yhaumjuo.exeC:\Windows\system32\yhaumjuo.exe 1032 "C:\Windows\SysWOW64\ydqpdqsz.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:576 -
C:\Windows\SysWOW64\yhaumjuo.exeC:\Windows\SysWOW64\yhaumjuo.exe 1032 C:\Windows\SysWOW64\ydqpdqsz.exe40⤵
- Executes dropped EXE
PID:3600 -
C:\Windows\SysWOW64\dijpdgau.exeC:\Windows\system32\dijpdgau.exe 1044 "C:\Windows\SysWOW64\yhaumjuo.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1408 -
C:\Windows\SysWOW64\dijpdgau.exeC:\Windows\SysWOW64\dijpdgau.exe 1044 C:\Windows\SysWOW64\yhaumjuo.exe42⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\nekikbbr.exeC:\Windows\system32\nekikbbr.exe 1032 "C:\Windows\SysWOW64\dijpdgau.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2204 -
C:\Windows\SysWOW64\nekikbbr.exeC:\Windows\SysWOW64\nekikbbr.exe 1032 C:\Windows\SysWOW64\dijpdgau.exe44⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\vfiizqfn.exeC:\Windows\system32\vfiizqfn.exe 1032 "C:\Windows\SysWOW64\nekikbbr.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4176 -
C:\Windows\SysWOW64\vfiizqfn.exeC:\Windows\SysWOW64\vfiizqfn.exe 1032 C:\Windows\SysWOW64\nekikbbr.exe46⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\issxfles.exeC:\Windows\system32\issxfles.exe 1152 "C:\Windows\SysWOW64\vfiizqfn.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2396 -
C:\Windows\SysWOW64\issxfles.exeC:\Windows\SysWOW64\issxfles.exe 1152 C:\Windows\SysWOW64\vfiizqfn.exe48⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\srevpklr.exeC:\Windows\system32\srevpklr.exe 1148 "C:\Windows\SysWOW64\issxfles.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3172 -
C:\Windows\SysWOW64\srevpklr.exeC:\Windows\SysWOW64\srevpklr.exe 1148 C:\Windows\SysWOW64\issxfles.exe50⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\djuauinu.exeC:\Windows\system32\djuauinu.exe 1000 "C:\Windows\SysWOW64\srevpklr.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4184 -
C:\Windows\SysWOW64\djuauinu.exeC:\Windows\SysWOW64\djuauinu.exe 1000 C:\Windows\SysWOW64\srevpklr.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4132 -
C:\Windows\SysWOW64\scrndwql.exeC:\Windows\system32\scrndwql.exe 1020 "C:\Windows\SysWOW64\djuauinu.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2568 -
C:\Windows\SysWOW64\scrndwql.exeC:\Windows\SysWOW64\scrndwql.exe 1020 C:\Windows\SysWOW64\djuauinu.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:444 -
C:\Windows\SysWOW64\vmilwsyk.exeC:\Windows\system32\vmilwsyk.exe 1048 "C:\Windows\SysWOW64\scrndwql.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3112 -
C:\Windows\SysWOW64\vmilwsyk.exeC:\Windows\SysWOW64\vmilwsyk.exe 1048 C:\Windows\SysWOW64\scrndwql.exe56⤵
- Executes dropped EXE
PID:736 -
C:\Windows\SysWOW64\kculccty.exeC:\Windows\system32\kculccty.exe 1032 "C:\Windows\SysWOW64\vmilwsyk.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4596 -
C:\Windows\SysWOW64\kculccty.exeC:\Windows\SysWOW64\kculccty.exe 1032 C:\Windows\SysWOW64\vmilwsyk.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\agcggpyt.exeC:\Windows\system32\agcggpyt.exe 1148 "C:\Windows\SysWOW64\kculccty.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2248 -
C:\Windows\SysWOW64\agcggpyt.exeC:\Windows\SysWOW64\agcggpyt.exe 1148 C:\Windows\SysWOW64\kculccty.exe60⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\nxxippva.exeC:\Windows\system32\nxxippva.exe 1044 "C:\Windows\SysWOW64\agcggpyt.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1448 -
C:\Windows\SysWOW64\nxxippva.exeC:\Windows\SysWOW64\nxxippva.exe 1044 C:\Windows\SysWOW64\agcggpyt.exe62⤵
- Executes dropped EXE
PID:3740 -
C:\Windows\SysWOW64\xebghodz.exeC:\Windows\system32\xebghodz.exe 1020 "C:\Windows\SysWOW64\nxxippva.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2932 -
C:\Windows\SysWOW64\xebghodz.exeC:\Windows\SysWOW64\xebghodz.exe 1020 C:\Windows\SysWOW64\nxxippva.exe64⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\kuejqwjh.exeC:\Windows\system32\kuejqwjh.exe 1152 "C:\Windows\SysWOW64\xebghodz.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5096 -
C:\Windows\SysWOW64\kuejqwjh.exeC:\Windows\SysWOW64\kuejqwjh.exe 1152 C:\Windows\SysWOW64\xebghodz.exe66⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\tkrwuzga.exeC:\Windows\system32\tkrwuzga.exe 1148 "C:\Windows\SysWOW64\kuejqwjh.exe"67⤵
- Suspicious use of SetThreadContext
PID:2280 -
C:\Windows\SysWOW64\tkrwuzga.exeC:\Windows\SysWOW64\tkrwuzga.exe 1148 C:\Windows\SysWOW64\kuejqwjh.exe68⤵PID:3068
-
C:\Windows\SysWOW64\akqwinkv.exeC:\Windows\system32\akqwinkv.exe 1032 "C:\Windows\SysWOW64\tkrwuzga.exe"69⤵
- Suspicious use of SetThreadContext
PID:4136 -
C:\Windows\SysWOW64\akqwinkv.exeC:\Windows\SysWOW64\akqwinkv.exe 1032 C:\Windows\SysWOW64\tkrwuzga.exe70⤵PID:2104
-
C:\Windows\SysWOW64\aocoxrop.exeC:\Windows\system32\aocoxrop.exe 1032 "C:\Windows\SysWOW64\akqwinkv.exe"71⤵
- Suspicious use of SetThreadContext
PID:1328 -
C:\Windows\SysWOW64\aocoxrop.exeC:\Windows\SysWOW64\aocoxrop.exe 1032 C:\Windows\SysWOW64\akqwinkv.exe72⤵
- Drops file in System32 directory
PID:3896 -
C:\Windows\SysWOW64\ljdhempm.exeC:\Windows\system32\ljdhempm.exe 1040 "C:\Windows\SysWOW64\aocoxrop.exe"73⤵
- Suspicious use of SetThreadContext
PID:3328 -
C:\Windows\SysWOW64\ljdhempm.exeC:\Windows\SysWOW64\ljdhempm.exe 1040 C:\Windows\SysWOW64\aocoxrop.exe74⤵PID:3632
-
C:\Windows\SysWOW64\nbvwxixl.exeC:\Windows\system32\nbvwxixl.exe 1032 "C:\Windows\SysWOW64\ljdhempm.exe"75⤵
- Suspicious use of SetThreadContext
PID:2216 -
C:\Windows\SysWOW64\nbvwxixl.exeC:\Windows\SysWOW64\nbvwxixl.exe 1032 C:\Windows\SysWOW64\ljdhempm.exe76⤵PID:3824
-
C:\Windows\SysWOW64\asqzfqcs.exeC:\Windows\system32\asqzfqcs.exe 1148 "C:\Windows\SysWOW64\nbvwxixl.exe"77⤵
- Suspicious use of SetThreadContext
PID:4496 -
C:\Windows\SysWOW64\asqzfqcs.exeC:\Windows\SysWOW64\asqzfqcs.exe 1148 C:\Windows\SysWOW64\nbvwxixl.exe78⤵PID:1952
-
C:\Windows\SysWOW64\nqtcoyaz.exeC:\Windows\system32\nqtcoyaz.exe 1148 "C:\Windows\SysWOW64\asqzfqcs.exe"79⤵
- Suspicious use of SetThreadContext
PID:2092 -
C:\Windows\SysWOW64\nqtcoyaz.exeC:\Windows\SysWOW64\nqtcoyaz.exe 1148 C:\Windows\SysWOW64\asqzfqcs.exe80⤵PID:1360
-
C:\Windows\SysWOW64\adcsuuhm.exeC:\Windows\system32\adcsuuhm.exe 1148 "C:\Windows\SysWOW64\nqtcoyaz.exe"81⤵
- Suspicious use of SetThreadContext
PID:1144 -
C:\Windows\SysWOW64\adcsuuhm.exeC:\Windows\SysWOW64\adcsuuhm.exe 1148 C:\Windows\SysWOW64\nqtcoyaz.exe82⤵PID:3160
-
C:\Windows\SysWOW64\nquhzyfr.exeC:\Windows\system32\nquhzyfr.exe 1148 "C:\Windows\SysWOW64\adcsuuhm.exe"83⤵
- Suspicious use of SetThreadContext
PID:3656 -
C:\Windows\SysWOW64\nquhzyfr.exeC:\Windows\SysWOW64\nquhzyfr.exe 1148 C:\Windows\SysWOW64\adcsuuhm.exe84⤵PID:4304
-
C:\Windows\SysWOW64\ahokigdg.exeC:\Windows\system32\ahokigdg.exe 1152 "C:\Windows\SysWOW64\nquhzyfr.exe"85⤵
- Suspicious use of SetThreadContext
PID:3448 -
C:\Windows\SysWOW64\ahokigdg.exeC:\Windows\SysWOW64\ahokigdg.exe 1152 C:\Windows\SysWOW64\nquhzyfr.exe86⤵PID:3208
-
C:\Windows\SysWOW64\nfrnzoin.exeC:\Windows\system32\nfrnzoin.exe 1148 "C:\Windows\SysWOW64\ahokigdg.exe"87⤵
- Suspicious use of SetThreadContext
PID:2396 -
C:\Windows\SysWOW64\nfrnzoin.exeC:\Windows\SysWOW64\nfrnzoin.exe 1148 C:\Windows\SysWOW64\ahokigdg.exe88⤵PID:4992
-
C:\Windows\SysWOW64\xevkjnqn.exeC:\Windows\system32\xevkjnqn.exe 1148 "C:\Windows\SysWOW64\nfrnzoin.exe"89⤵
- Suspicious use of SetThreadContext
PID:3172 -
C:\Windows\SysWOW64\xevkjnqn.exeC:\Windows\SysWOW64\xevkjnqn.exe 1148 C:\Windows\SysWOW64\nfrnzoin.exe90⤵PID:4296
-
C:\Windows\SysWOW64\locvmfqx.exeC:\Windows\system32\locvmfqx.exe 1152 "C:\Windows\SysWOW64\xevkjnqn.exe"91⤵
- Suspicious use of SetThreadContext
PID:4184 -
C:\Windows\SysWOW64\locvmfqx.exeC:\Windows\SysWOW64\locvmfqx.exe 1152 C:\Windows\SysWOW64\xevkjnqn.exe92⤵
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Windows\SysWOW64\yewxvnne.exeC:\Windows\system32\yewxvnne.exe 1148 "C:\Windows\SysWOW64\locvmfqx.exe"93⤵
- Suspicious use of SetThreadContext
PID:2568 -
C:\Windows\SysWOW64\yewxvnne.exeC:\Windows\SysWOW64\yewxvnne.exe 1148 C:\Windows\SysWOW64\locvmfqx.exe94⤵PID:2108
-
C:\Windows\SysWOW64\lronaruj.exeC:\Windows\system32\lronaruj.exe 1152 "C:\Windows\SysWOW64\yewxvnne.exe"95⤵
- Suspicious use of SetThreadContext
PID:3112 -
C:\Windows\SysWOW64\lronaruj.exeC:\Windows\SysWOW64\lronaruj.exe 1152 C:\Windows\SysWOW64\yewxvnne.exe96⤵PID:4584
-
C:\Windows\SysWOW64\vysllpuj.exeC:\Windows\system32\vysllpuj.exe 1152 "C:\Windows\SysWOW64\lronaruj.exe"97⤵
- Suspicious use of SetThreadContext
PID:4596 -
C:\Windows\SysWOW64\vysllpuj.exeC:\Windows\SysWOW64\vysllpuj.exe 1152 C:\Windows\SysWOW64\lronaruj.exe98⤵PID:4712
-
C:\Windows\SysWOW64\ldagpvrd.exeC:\Windows\system32\ldagpvrd.exe 1148 "C:\Windows\SysWOW64\vysllpuj.exe"99⤵
- Suspicious use of SetThreadContext
PID:804 -
C:\Windows\SysWOW64\ldagpvrd.exeC:\Windows\SysWOW64\ldagpvrd.exe 1148 C:\Windows\SysWOW64\vysllpuj.exe100⤵PID:4484
-
C:\Windows\SysWOW64\vytqepza.exeC:\Windows\system32\vytqepza.exe 1148 "C:\Windows\SysWOW64\ldagpvrd.exe"101⤵
- Suspicious use of SetThreadContext
PID:4972 -
C:\Windows\SysWOW64\vytqepza.exeC:\Windows\SysWOW64\vytqepza.exe 1148 C:\Windows\SysWOW64\ldagpvrd.exe102⤵PID:3076
-
C:\Windows\SysWOW64\ipwtnxxh.exeC:\Windows\system32\ipwtnxxh.exe 1148 "C:\Windows\SysWOW64\vytqepza.exe"103⤵
- Suspicious use of SetThreadContext
PID:2684 -
C:\Windows\SysWOW64\ipwtnxxh.exeC:\Windows\SysWOW64\ipwtnxxh.exe 1148 C:\Windows\SysWOW64\vytqepza.exe104⤵PID:1132
-
C:\Windows\SysWOW64\swaqxweh.exeC:\Windows\system32\swaqxweh.exe 1148 "C:\Windows\SysWOW64\ipwtnxxh.exe"105⤵
- Suspicious use of SetThreadContext
PID:5032 -
C:\Windows\SysWOW64\swaqxweh.exeC:\Windows\SysWOW64\swaqxweh.exe 1148 C:\Windows\SysWOW64\ipwtnxxh.exe106⤵PID:2528
-
C:\Windows\SysWOW64\fjsodadu.exeC:\Windows\system32\fjsodadu.exe 1164 "C:\Windows\SysWOW64\swaqxweh.exe"107⤵
- Suspicious use of SetThreadContext
PID:4116 -
C:\Windows\SysWOW64\fjsodadu.exeC:\Windows\SysWOW64\fjsodadu.exe 1164 C:\Windows\SysWOW64\swaqxweh.exe108⤵PID:2220
-
C:\Windows\SysWOW64\twbdjwkz.exeC:\Windows\system32\twbdjwkz.exe 1148 "C:\Windows\SysWOW64\fjsodadu.exe"109⤵
- Suspicious use of SetThreadContext
PID:2148 -
C:\Windows\SysWOW64\twbdjwkz.exeC:\Windows\SysWOW64\twbdjwkz.exe 1148 C:\Windows\SysWOW64\fjsodadu.exe110⤵PID:1808
-
C:\Windows\SysWOW64\fyptuioi.exeC:\Windows\system32\fyptuioi.exe 1148 "C:\Windows\SysWOW64\twbdjwkz.exe"111⤵
- Suspicious use of SetThreadContext
PID:64 -
C:\Windows\SysWOW64\fyptuioi.exeC:\Windows\SysWOW64\fyptuioi.exe 1148 C:\Windows\SysWOW64\twbdjwkz.exe112⤵PID:2164
-
C:\Windows\SysWOW64\pxtrnhwi.exeC:\Windows\system32\pxtrnhwi.exe 1148 "C:\Windows\SysWOW64\fyptuioi.exe"113⤵
- Suspicious use of SetThreadContext
PID:2152 -
C:\Windows\SysWOW64\pxtrnhwi.exeC:\Windows\SysWOW64\pxtrnhwi.exe 1148 C:\Windows\SysWOW64\fyptuioi.exe114⤵PID:1896
-
C:\Windows\SysWOW64\dhatqgos.exeC:\Windows\system32\dhatqgos.exe 1148 "C:\Windows\SysWOW64\pxtrnhwi.exe"115⤵
- Suspicious use of SetThreadContext
PID:1848 -
C:\Windows\SysWOW64\dhatqgos.exeC:\Windows\SysWOW64\dhatqgos.exe 1148 C:\Windows\SysWOW64\pxtrnhwi.exe116⤵PID:4740
-
C:\Windows\SysWOW64\qxvwyhta.exeC:\Windows\system32\qxvwyhta.exe 1148 "C:\Windows\SysWOW64\dhatqgos.exe"117⤵
- Suspicious use of SetThreadContext
PID:5040 -
C:\Windows\SysWOW64\qxvwyhta.exeC:\Windows\SysWOW64\qxvwyhta.exe 1148 C:\Windows\SysWOW64\dhatqgos.exe118⤵PID:1148
-
C:\Windows\SysWOW64\atvggbuf.exeC:\Windows\system32\atvggbuf.exe 1148 "C:\Windows\SysWOW64\qxvwyhta.exe"119⤵
- Suspicious use of SetThreadContext
PID:2916 -
C:\Windows\SysWOW64\atvggbuf.exeC:\Windows\SysWOW64\atvggbuf.exe 1148 C:\Windows\SysWOW64\qxvwyhta.exe120⤵PID:3064
-
C:\Windows\SysWOW64\ksamqacx.exeC:\Windows\system32\ksamqacx.exe 1148 "C:\Windows\SysWOW64\atvggbuf.exe"121⤵
- Suspicious use of SetThreadContext
PID:1340 -
C:\Windows\SysWOW64\ksamqacx.exeC:\Windows\SysWOW64\ksamqacx.exe 1148 C:\Windows\SysWOW64\atvggbuf.exe122⤵PID:2244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-