Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe
-
Size
476KB
-
MD5
f3a6663b8cb810e905ff5c7bed9ef67e
-
SHA1
8e832fbcd04fad6c103bc8753ad87863454830ac
-
SHA256
58fa7103a6da18ad8039c901c10af971627efdfb77a27f55a950aa37f4d04dc8
-
SHA512
986064204320e6b1100e9c83e4691ee1d3aad06cdda575a723e6f49de9ed0ea0c5862b0d87e665167f9e74896dd0cdeaa12de6e1bb6753e68c56387154f98095
-
SSDEEP
6144:jFeLlS5FZCAv2wFR24biJjWti/9q7R/ck6pSDy4N5q39dVdnNn1u9/TPr5P6uzPh:JD6AvTFgJVWt49y5YeE8RhpQetCO
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2736 bljiez.exe 2688 bljiez.exe 2616 hufayr.exe 580 hufayr.exe 2164 tkggih.exe 1748 tkggih.exe 2872 mtydze.exe 1756 mtydze.exe 2676 ifstrx.exe 2324 ifstrx.exe 1472 woiegd.exe 2092 woiegd.exe 1464 yfyrju.exe 1640 yfyrju.exe 2516 wyfefw.exe 2292 wyfefw.exe 2060 nmdsdo.exe 2844 nmdsdo.exe 2740 krjihq.exe 2604 krjihq.exe 3004 qnrxar.exe 988 qnrxar.exe 1608 fomivh.exe 2212 fomivh.exe 2004 jmitcq.exe 2040 jmitcq.exe 1744 khjlqm.exe 2456 khjlqm.exe 2408 jlrbcn.exe 2276 jlrbcn.exe 552 vjttvq.exe 1200 vjttvq.exe 2500 tbsgrt.exe 2972 tbsgrt.exe 2168 derosq.exe 1652 derosq.exe 1632 hggmcd.exe 2804 hggmcd.exe 2692 qqumib.exe 2700 qqumib.exe 2640 zlthse.exe 772 zlthse.exe 984 lnxnot.exe 1560 lnxnot.exe 2888 xanfwf.exe 1148 xanfwf.exe 2072 hgqszz.exe 1696 hgqszz.exe 1048 qcnvvd.exe 2676 qcnvvd.exe 1472 ekxywd.exe 1492 ekxywd.exe 1668 wciopv.exe 828 wciopv.exe 2304 khpduq.exe 2536 khpduq.exe 2384 ckegqv.exe 2784 ckegqv.exe 2828 qwhwur.exe 2704 qwhwur.exe 2636 flruud.exe 2640 flruud.exe 1792 ryhmtp.exe 2436 ryhmtp.exe -
Loads dropped DLL 64 IoCs
pid Process 2720 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 2720 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 2736 bljiez.exe 2736 bljiez.exe 2688 bljiez.exe 2688 bljiez.exe 2616 hufayr.exe 2616 hufayr.exe 580 hufayr.exe 580 hufayr.exe 2164 tkggih.exe 2164 tkggih.exe 1748 tkggih.exe 1748 tkggih.exe 2872 mtydze.exe 2872 mtydze.exe 1756 mtydze.exe 1756 mtydze.exe 2676 ifstrx.exe 2676 ifstrx.exe 2324 ifstrx.exe 2324 ifstrx.exe 1472 woiegd.exe 1472 woiegd.exe 2092 woiegd.exe 2092 woiegd.exe 1464 yfyrju.exe 1464 yfyrju.exe 1640 yfyrju.exe 1640 yfyrju.exe 2516 wyfefw.exe 2516 wyfefw.exe 2292 wyfefw.exe 2292 wyfefw.exe 2060 nmdsdo.exe 2060 nmdsdo.exe 2844 nmdsdo.exe 2844 nmdsdo.exe 2740 krjihq.exe 2740 krjihq.exe 2604 krjihq.exe 2604 krjihq.exe 3004 qnrxar.exe 3004 qnrxar.exe 988 qnrxar.exe 988 qnrxar.exe 1608 fomivh.exe 1608 fomivh.exe 2212 fomivh.exe 2212 fomivh.exe 2004 jmitcq.exe 2004 jmitcq.exe 2040 jmitcq.exe 2040 jmitcq.exe 1744 khjlqm.exe 1744 khjlqm.exe 2456 khjlqm.exe 2456 khjlqm.exe 2408 jlrbcn.exe 2408 jlrbcn.exe 2276 jlrbcn.exe 2276 jlrbcn.exe 552 vjttvq.exe 552 vjttvq.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dqqexs.exe pxvomo.exe File created C:\Windows\SysWOW64\tcyguc.exe kvpyvt.exe File created C:\Windows\SysWOW64\xsmgwk.exe dfhyce.exe File opened for modification C:\Windows\SysWOW64\prnhib.exe gjfzja.exe File opened for modification C:\Windows\SysWOW64\fzdwvz.exe orcowy.exe File created C:\Windows\SysWOW64\hvqcwt.exe nikccn.exe File opened for modification C:\Windows\SysWOW64\yfyrju.exe woiegd.exe File opened for modification C:\Windows\SysWOW64\naycvr.exe bqtwqk.exe File created C:\Windows\SysWOW64\aknfkn.exe lghqes.exe File opened for modification C:\Windows\SysWOW64\tqhyhh.exe ygflyy.exe File created C:\Windows\SysWOW64\uxfuci.exe emtzbc.exe File created C:\Windows\SysWOW64\oipysh.exe xmrvwd.exe File opened for modification C:\Windows\SysWOW64\fomivh.exe qnrxar.exe File created C:\Windows\SysWOW64\qwhwur.exe ckegqv.exe File created C:\Windows\SysWOW64\sttftb.exe lsyuys.exe File created C:\Windows\SysWOW64\sifpbm.exe epkzxr.exe File opened for modification C:\Windows\SysWOW64\knojso.exe qaijyi.exe File opened for modification C:\Windows\SysWOW64\ufwpae.exe dgvhbv.exe File created C:\Windows\SysWOW64\rdmfev.exe xhyfkp.exe File opened for modification C:\Windows\SysWOW64\nmdsdo.exe wyfefw.exe File created C:\Windows\SysWOW64\flruud.exe qwhwur.exe File created C:\Windows\SysWOW64\yasrou.exe dqqexs.exe File opened for modification C:\Windows\SysWOW64\emtzbc.exe jzgzhw.exe File opened for modification C:\Windows\SysWOW64\xsmgwk.exe dfhyce.exe File created C:\Windows\SysWOW64\sgabbr.exe yoxojq.exe File opened for modification C:\Windows\SysWOW64\flruud.exe qwhwur.exe File opened for modification C:\Windows\SysWOW64\poudhi.exe aknfkn.exe File opened for modification C:\Windows\SysWOW64\tboixg.exe fptstc.exe File created C:\Windows\SysWOW64\tkggih.exe hufayr.exe File created C:\Windows\SysWOW64\khpduq.exe wciopv.exe File created C:\Windows\SysWOW64\qxujeq.exe zqubgp.exe File created C:\Windows\SysWOW64\ofuclx.exe uhdpon.exe File opened for modification C:\Windows\SysWOW64\fptstc.exe lunszw.exe File opened for modification C:\Windows\SysWOW64\nsxvqv.exe vzlnxv.exe File opened for modification C:\Windows\SysWOW64\emfwpg.exe knojso.exe File opened for modification C:\Windows\SysWOW64\vjttvq.exe jlrbcn.exe File created C:\Windows\SysWOW64\tboixg.exe fptstc.exe File opened for modification C:\Windows\SysWOW64\aupguz.exe gdybxp.exe File created C:\Windows\SysWOW64\prnhib.exe gjfzja.exe File opened for modification C:\Windows\SysWOW64\khmofn.exe tmptjj.exe File created C:\Windows\SysWOW64\fzdwvz.exe orcowy.exe File created C:\Windows\SysWOW64\eozswi.exe kblscc.exe File created C:\Windows\SysWOW64\qaijyi.exe wnujec.exe File created C:\Windows\SysWOW64\tmptjj.exe zqjlpd.exe File created C:\Windows\SysWOW64\ygbxxy.exe hvqcwt.exe File created C:\Windows\SysWOW64\ifxafa.exe rdmfev.exe File opened for modification C:\Windows\SysWOW64\zpujsj.exe fzdwvz.exe File opened for modification C:\Windows\SysWOW64\pkerkr.exe ydejmq.exe File opened for modification C:\Windows\SysWOW64\gjfzja.exe pkerkr.exe File opened for modification C:\Windows\SysWOW64\ekxywd.exe qcnvvd.exe File opened for modification C:\Windows\SysWOW64\khpduq.exe wciopv.exe File opened for modification C:\Windows\SysWOW64\scpnyi.exe gxzdyw.exe File created C:\Windows\SysWOW64\naycvr.exe bqtwqk.exe File created C:\Windows\SysWOW64\prusux.exe yktcvw.exe File opened for modification C:\Windows\SysWOW64\lxjoed.exe ubutig.exe File created C:\Windows\SysWOW64\drhsnx.exe msgkow.exe File opened for modification C:\Windows\SysWOW64\lsyuys.exe xydfvp.exe File opened for modification C:\Windows\SysWOW64\yejyso.exe gjudxs.exe File opened for modification C:\Windows\SysWOW64\nyytox.exe duiqsa.exe File opened for modification C:\Windows\SysWOW64\qcnvvd.exe hgqszz.exe File opened for modification C:\Windows\SysWOW64\duiqsa.exe nsxvqv.exe File created C:\Windows\SysWOW64\fakftt.exe oevdxo.exe File opened for modification C:\Windows\SysWOW64\jzgzhw.exe ssfrio.exe File created C:\Windows\SysWOW64\jljpdl.exe puscgb.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2400 set thread context of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2736 set thread context of 2688 2736 bljiez.exe 32 PID 2616 set thread context of 580 2616 hufayr.exe 34 PID 2164 set thread context of 1748 2164 tkggih.exe 36 PID 2872 set thread context of 1756 2872 mtydze.exe 38 PID 2676 set thread context of 2324 2676 ifstrx.exe 40 PID 1472 set thread context of 2092 1472 woiegd.exe 42 PID 1464 set thread context of 1640 1464 yfyrju.exe 44 PID 2516 set thread context of 2292 2516 wyfefw.exe 46 PID 2060 set thread context of 2844 2060 nmdsdo.exe 48 PID 2740 set thread context of 2604 2740 krjihq.exe 50 PID 3004 set thread context of 988 3004 qnrxar.exe 52 PID 1608 set thread context of 2212 1608 fomivh.exe 54 PID 2004 set thread context of 2040 2004 jmitcq.exe 56 PID 1744 set thread context of 2456 1744 khjlqm.exe 58 PID 2408 set thread context of 2276 2408 jlrbcn.exe 60 PID 552 set thread context of 1200 552 vjttvq.exe 62 PID 2500 set thread context of 2972 2500 tbsgrt.exe 64 PID 2168 set thread context of 1652 2168 derosq.exe 66 PID 1632 set thread context of 2804 1632 hggmcd.exe 68 PID 2692 set thread context of 2700 2692 qqumib.exe 70 PID 2640 set thread context of 772 2640 zlthse.exe 72 PID 984 set thread context of 1560 984 lnxnot.exe 74 PID 2888 set thread context of 1148 2888 xanfwf.exe 77 PID 2072 set thread context of 1696 2072 hgqszz.exe 79 PID 1048 set thread context of 2676 1048 qcnvvd.exe 81 PID 1472 set thread context of 1492 1472 ekxywd.exe 83 PID 1668 set thread context of 828 1668 wciopv.exe 85 PID 2304 set thread context of 2536 2304 khpduq.exe 87 PID 2384 set thread context of 2784 2384 ckegqv.exe 89 PID 2828 set thread context of 2704 2828 qwhwur.exe 91 PID 2636 set thread context of 2640 2636 flruud.exe 93 PID 1792 set thread context of 2436 1792 ryhmtp.exe 95 PID 1732 set thread context of 1980 1732 ifhusy.exe 97 PID 1940 set thread context of 1720 1940 xydfvp.exe 99 PID 1628 set thread context of 964 1628 lsyuys.exe 101 PID 1504 set thread context of 1284 1504 sttftb.exe 103 PID 1876 set thread context of 960 1876 gxzdyw.exe 105 PID 1888 set thread context of 2508 1888 scpnyi.exe 107 PID 868 set thread context of 2056 868 jgeqcn.exe 109 PID 2944 set thread context of 2608 2944 yowscm.exe 111 PID 2692 set thread context of 2744 2692 pjlvyj.exe 113 PID 2068 set thread context of 2012 2068 gjudxs.exe 115 PID 2540 set thread context of 2216 2540 yejyso.exe 117 PID 2228 set thread context of 2144 2228 pxvomo.exe 119 PID 2768 set thread context of 2136 2768 dqqexs.exe 121 PID 1472 set thread context of 2964 1472 yasrou.exe 123 PID 1804 set thread context of 1876 1804 bqtwqk.exe 125 PID 832 set thread context of 1928 832 naycvr.exe 127 PID 572 set thread context of 2968 572 cttmqi.exe 129 PID 2580 set thread context of 2596 2580 ogjfxu.exe 131 PID 2628 set thread context of 1688 2628 zwckik.exe 133 PID 2820 set thread context of 1308 2820 lghqes.exe 135 PID 1852 set thread context of 492 1852 aknfkn.exe 137 PID 1376 set thread context of 1036 1376 poudhi.exe 139 PID 2960 set thread context of 1868 2960 dtsbfd.exe 141 PID 2424 set thread context of 916 2424 sxzqly.exe 143 PID 1500 set thread context of 1276 1500 zqubgp.exe 145 PID 2492 set thread context of 376 2492 qxujeq.exe 147 PID 872 set thread context of 1624 872 hxdzdz.exe 149 PID 2812 set thread context of 868 2812 ypphwr.exe 151 PID 2788 set thread context of 1908 2788 qlekav.exe 153 PID 1216 set thread context of 568 1216 epkzxr.exe 155 PID 1768 set thread context of 1608 1768 sifpbm.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxujeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlekav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jljpdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydejmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ygbxxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhyfkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hggmcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxvomo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcyguc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lunszw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nyytox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ygflyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bahvik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zaikem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prnhib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qwhwur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvkvnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yktcvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tboixg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stpxsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qcnvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktgsln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkerkr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xanfwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yktcvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exgbug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtdprf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jheuel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufwpae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yejyso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zwckik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnxnot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifhusy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxzqly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sifpbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language czvjfq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bljiez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krjihq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lghqes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjcosd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfrroi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtdprf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfrroi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emtzbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgttft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language naycvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogjfxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language poudhi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kecsxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgabbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sryrfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvkvnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language czvjfq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvectn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eozswi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emfwpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjfzja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jmitcq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryhmtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orcowy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wciopv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scpnyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okluxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfajza.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2720 2400 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2736 2720 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2736 2720 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2736 2720 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2736 2720 f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2736 wrote to memory of 2688 2736 bljiez.exe 32 PID 2688 wrote to memory of 2616 2688 bljiez.exe 33 PID 2688 wrote to memory of 2616 2688 bljiez.exe 33 PID 2688 wrote to memory of 2616 2688 bljiez.exe 33 PID 2688 wrote to memory of 2616 2688 bljiez.exe 33 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 2616 wrote to memory of 580 2616 hufayr.exe 34 PID 580 wrote to memory of 2164 580 hufayr.exe 35 PID 580 wrote to memory of 2164 580 hufayr.exe 35 PID 580 wrote to memory of 2164 580 hufayr.exe 35 PID 580 wrote to memory of 2164 580 hufayr.exe 35 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 2164 wrote to memory of 1748 2164 tkggih.exe 36 PID 1748 wrote to memory of 2872 1748 tkggih.exe 37 PID 1748 wrote to memory of 2872 1748 tkggih.exe 37 PID 1748 wrote to memory of 2872 1748 tkggih.exe 37 PID 1748 wrote to memory of 2872 1748 tkggih.exe 37 PID 2872 wrote to memory of 1756 2872 mtydze.exe 38 PID 2872 wrote to memory of 1756 2872 mtydze.exe 38 PID 2872 wrote to memory of 1756 2872 mtydze.exe 38 PID 2872 wrote to memory of 1756 2872 mtydze.exe 38 PID 2872 wrote to memory of 1756 2872 mtydze.exe 38 PID 2872 wrote to memory of 1756 2872 mtydze.exe 38 PID 2872 wrote to memory of 1756 2872 mtydze.exe 38 PID 2872 wrote to memory of 1756 2872 mtydze.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\bljiez.exeC:\Windows\system32\bljiez.exe 476 "C:\Users\Admin\AppData\Local\Temp\f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\bljiez.exeC:\Windows\system32\bljiez.exe 476 "C:\Users\Admin\AppData\Local\Temp\f3a6663b8cb810e905ff5c7bed9ef67e_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\hufayr.exeC:\Windows\system32\hufayr.exe 452 "C:\Windows\SysWOW64\bljiez.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\hufayr.exeC:\Windows\system32\hufayr.exe 452 "C:\Windows\SysWOW64\bljiez.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\tkggih.exeC:\Windows\system32\tkggih.exe 452 "C:\Windows\SysWOW64\hufayr.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\tkggih.exeC:\Windows\system32\tkggih.exe 452 "C:\Windows\SysWOW64\hufayr.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\mtydze.exeC:\Windows\system32\mtydze.exe 452 "C:\Windows\SysWOW64\tkggih.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\mtydze.exeC:\Windows\system32\mtydze.exe 452 "C:\Windows\SysWOW64\tkggih.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Windows\SysWOW64\ifstrx.exeC:\Windows\system32\ifstrx.exe 452 "C:\Windows\SysWOW64\mtydze.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2676 -
C:\Windows\SysWOW64\ifstrx.exeC:\Windows\system32\ifstrx.exe 452 "C:\Windows\SysWOW64\mtydze.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2324 -
C:\Windows\SysWOW64\woiegd.exeC:\Windows\system32\woiegd.exe 452 "C:\Windows\SysWOW64\ifstrx.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1472 -
C:\Windows\SysWOW64\woiegd.exeC:\Windows\system32\woiegd.exe 452 "C:\Windows\SysWOW64\ifstrx.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\yfyrju.exeC:\Windows\system32\yfyrju.exe 452 "C:\Windows\SysWOW64\woiegd.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1464 -
C:\Windows\SysWOW64\yfyrju.exeC:\Windows\system32\yfyrju.exe 452 "C:\Windows\SysWOW64\woiegd.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Windows\SysWOW64\wyfefw.exeC:\Windows\system32\wyfefw.exe 452 "C:\Windows\SysWOW64\yfyrju.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2516 -
C:\Windows\SysWOW64\wyfefw.exeC:\Windows\system32\wyfefw.exe 452 "C:\Windows\SysWOW64\yfyrju.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2292 -
C:\Windows\SysWOW64\nmdsdo.exeC:\Windows\system32\nmdsdo.exe 452 "C:\Windows\SysWOW64\wyfefw.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2060 -
C:\Windows\SysWOW64\nmdsdo.exeC:\Windows\system32\nmdsdo.exe 452 "C:\Windows\SysWOW64\wyfefw.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2844 -
C:\Windows\SysWOW64\krjihq.exeC:\Windows\system32\krjihq.exe 452 "C:\Windows\SysWOW64\nmdsdo.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\krjihq.exeC:\Windows\system32\krjihq.exe 452 "C:\Windows\SysWOW64\nmdsdo.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Windows\SysWOW64\qnrxar.exeC:\Windows\system32\qnrxar.exe 452 "C:\Windows\SysWOW64\krjihq.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:3004 -
C:\Windows\SysWOW64\qnrxar.exeC:\Windows\system32\qnrxar.exe 452 "C:\Windows\SysWOW64\krjihq.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\fomivh.exeC:\Windows\system32\fomivh.exe 452 "C:\Windows\SysWOW64\qnrxar.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1608 -
C:\Windows\SysWOW64\fomivh.exeC:\Windows\system32\fomivh.exe 452 "C:\Windows\SysWOW64\qnrxar.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212 -
C:\Windows\SysWOW64\jmitcq.exeC:\Windows\system32\jmitcq.exe 452 "C:\Windows\SysWOW64\fomivh.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2004 -
C:\Windows\SysWOW64\jmitcq.exeC:\Windows\system32\jmitcq.exe 452 "C:\Windows\SysWOW64\fomivh.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\khjlqm.exeC:\Windows\system32\khjlqm.exe 452 "C:\Windows\SysWOW64\jmitcq.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1744 -
C:\Windows\SysWOW64\khjlqm.exeC:\Windows\system32\khjlqm.exe 452 "C:\Windows\SysWOW64\jmitcq.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2456 -
C:\Windows\SysWOW64\jlrbcn.exeC:\Windows\system32\jlrbcn.exe 452 "C:\Windows\SysWOW64\khjlqm.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2408 -
C:\Windows\SysWOW64\jlrbcn.exeC:\Windows\system32\jlrbcn.exe 452 "C:\Windows\SysWOW64\khjlqm.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\vjttvq.exeC:\Windows\system32\vjttvq.exe 452 "C:\Windows\SysWOW64\jlrbcn.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:552 -
C:\Windows\SysWOW64\vjttvq.exeC:\Windows\system32\vjttvq.exe 452 "C:\Windows\SysWOW64\jlrbcn.exe"34⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\SysWOW64\tbsgrt.exeC:\Windows\system32\tbsgrt.exe 452 "C:\Windows\SysWOW64\vjttvq.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2500 -
C:\Windows\SysWOW64\tbsgrt.exeC:\Windows\system32\tbsgrt.exe 452 "C:\Windows\SysWOW64\vjttvq.exe"36⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\derosq.exeC:\Windows\system32\derosq.exe 452 "C:\Windows\SysWOW64\tbsgrt.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2168 -
C:\Windows\SysWOW64\derosq.exeC:\Windows\system32\derosq.exe 452 "C:\Windows\SysWOW64\tbsgrt.exe"38⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\hggmcd.exeC:\Windows\system32\hggmcd.exe 452 "C:\Windows\SysWOW64\derosq.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1632 -
C:\Windows\SysWOW64\hggmcd.exeC:\Windows\system32\hggmcd.exe 452 "C:\Windows\SysWOW64\derosq.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\qqumib.exeC:\Windows\system32\qqumib.exe 452 "C:\Windows\SysWOW64\hggmcd.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2692 -
C:\Windows\SysWOW64\qqumib.exeC:\Windows\system32\qqumib.exe 452 "C:\Windows\SysWOW64\hggmcd.exe"42⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\zlthse.exeC:\Windows\system32\zlthse.exe 452 "C:\Windows\SysWOW64\qqumib.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2640 -
C:\Windows\SysWOW64\zlthse.exeC:\Windows\system32\zlthse.exe 452 "C:\Windows\SysWOW64\qqumib.exe"44⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\lnxnot.exeC:\Windows\system32\lnxnot.exe 452 "C:\Windows\SysWOW64\zlthse.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\SysWOW64\lnxnot.exeC:\Windows\system32\lnxnot.exe 452 "C:\Windows\SysWOW64\zlthse.exe"46⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\xanfwf.exeC:\Windows\system32\xanfwf.exe 452 "C:\Windows\SysWOW64\lnxnot.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\xanfwf.exeC:\Windows\system32\xanfwf.exe 452 "C:\Windows\SysWOW64\lnxnot.exe"48⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\hgqszz.exeC:\Windows\system32\hgqszz.exe 452 "C:\Windows\SysWOW64\xanfwf.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2072 -
C:\Windows\SysWOW64\hgqszz.exeC:\Windows\system32\hgqszz.exe 452 "C:\Windows\SysWOW64\xanfwf.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\qcnvvd.exeC:\Windows\system32\qcnvvd.exe 452 "C:\Windows\SysWOW64\hgqszz.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1048 -
C:\Windows\SysWOW64\qcnvvd.exeC:\Windows\system32\qcnvvd.exe 452 "C:\Windows\SysWOW64\hgqszz.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\ekxywd.exeC:\Windows\system32\ekxywd.exe 452 "C:\Windows\SysWOW64\qcnvvd.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1472 -
C:\Windows\SysWOW64\ekxywd.exeC:\Windows\system32\ekxywd.exe 452 "C:\Windows\SysWOW64\qcnvvd.exe"54⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\wciopv.exeC:\Windows\system32\wciopv.exe 452 "C:\Windows\SysWOW64\ekxywd.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\wciopv.exeC:\Windows\system32\wciopv.exe 452 "C:\Windows\SysWOW64\ekxywd.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:828 -
C:\Windows\SysWOW64\khpduq.exeC:\Windows\system32\khpduq.exe 452 "C:\Windows\SysWOW64\wciopv.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2304 -
C:\Windows\SysWOW64\khpduq.exeC:\Windows\system32\khpduq.exe 452 "C:\Windows\SysWOW64\wciopv.exe"58⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\ckegqv.exeC:\Windows\system32\ckegqv.exe 452 "C:\Windows\SysWOW64\khpduq.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2384 -
C:\Windows\SysWOW64\ckegqv.exeC:\Windows\system32\ckegqv.exe 452 "C:\Windows\SysWOW64\khpduq.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2784 -
C:\Windows\SysWOW64\qwhwur.exeC:\Windows\system32\qwhwur.exe 452 "C:\Windows\SysWOW64\ckegqv.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\qwhwur.exeC:\Windows\system32\qwhwur.exe 452 "C:\Windows\SysWOW64\ckegqv.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\flruud.exeC:\Windows\system32\flruud.exe 480 "C:\Windows\SysWOW64\qwhwur.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2636 -
C:\Windows\SysWOW64\flruud.exeC:\Windows\system32\flruud.exe 480 "C:\Windows\SysWOW64\qwhwur.exe"64⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\ryhmtp.exeC:\Windows\system32\ryhmtp.exe 452 "C:\Windows\SysWOW64\flruud.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\ryhmtp.exeC:\Windows\system32\ryhmtp.exe 452 "C:\Windows\SysWOW64\flruud.exe"66⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\ifhusy.exeC:\Windows\system32\ifhusy.exe 452 "C:\Windows\SysWOW64\ryhmtp.exe"67⤵
- Suspicious use of SetThreadContext
PID:1732 -
C:\Windows\SysWOW64\ifhusy.exeC:\Windows\system32\ifhusy.exe 452 "C:\Windows\SysWOW64\ryhmtp.exe"68⤵
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\xydfvp.exeC:\Windows\system32\xydfvp.exe 452 "C:\Windows\SysWOW64\ifhusy.exe"69⤵
- Suspicious use of SetThreadContext
PID:1940 -
C:\Windows\SysWOW64\xydfvp.exeC:\Windows\system32\xydfvp.exe 452 "C:\Windows\SysWOW64\ifhusy.exe"70⤵
- Drops file in System32 directory
PID:1720 -
C:\Windows\SysWOW64\lsyuys.exeC:\Windows\system32\lsyuys.exe 496 "C:\Windows\SysWOW64\xydfvp.exe"71⤵
- Suspicious use of SetThreadContext
PID:1628 -
C:\Windows\SysWOW64\lsyuys.exeC:\Windows\system32\lsyuys.exe 496 "C:\Windows\SysWOW64\xydfvp.exe"72⤵
- Drops file in System32 directory
PID:964 -
C:\Windows\SysWOW64\sttftb.exeC:\Windows\system32\sttftb.exe 452 "C:\Windows\SysWOW64\lsyuys.exe"73⤵
- Suspicious use of SetThreadContext
PID:1504 -
C:\Windows\SysWOW64\sttftb.exeC:\Windows\system32\sttftb.exe 452 "C:\Windows\SysWOW64\lsyuys.exe"74⤵PID:1284
-
C:\Windows\SysWOW64\gxzdyw.exeC:\Windows\system32\gxzdyw.exe 452 "C:\Windows\SysWOW64\sttftb.exe"75⤵
- Suspicious use of SetThreadContext
PID:1876 -
C:\Windows\SysWOW64\gxzdyw.exeC:\Windows\system32\gxzdyw.exe 452 "C:\Windows\SysWOW64\sttftb.exe"76⤵
- Drops file in System32 directory
PID:960 -
C:\Windows\SysWOW64\scpnyi.exeC:\Windows\system32\scpnyi.exe 452 "C:\Windows\SysWOW64\gxzdyw.exe"77⤵
- Suspicious use of SetThreadContext
PID:1888 -
C:\Windows\SysWOW64\scpnyi.exeC:\Windows\system32\scpnyi.exe 452 "C:\Windows\SysWOW64\gxzdyw.exe"78⤵
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Windows\SysWOW64\jgeqcn.exeC:\Windows\system32\jgeqcn.exe 452 "C:\Windows\SysWOW64\scpnyi.exe"79⤵
- Suspicious use of SetThreadContext
PID:868 -
C:\Windows\SysWOW64\jgeqcn.exeC:\Windows\system32\jgeqcn.exe 452 "C:\Windows\SysWOW64\scpnyi.exe"80⤵PID:2056
-
C:\Windows\SysWOW64\yowscm.exeC:\Windows\system32\yowscm.exe 452 "C:\Windows\SysWOW64\jgeqcn.exe"81⤵
- Suspicious use of SetThreadContext
PID:2944 -
C:\Windows\SysWOW64\yowscm.exeC:\Windows\system32\yowscm.exe 452 "C:\Windows\SysWOW64\jgeqcn.exe"82⤵PID:2608
-
C:\Windows\SysWOW64\pjlvyj.exeC:\Windows\system32\pjlvyj.exe 452 "C:\Windows\SysWOW64\yowscm.exe"83⤵
- Suspicious use of SetThreadContext
PID:2692 -
C:\Windows\SysWOW64\pjlvyj.exeC:\Windows\system32\pjlvyj.exe 452 "C:\Windows\SysWOW64\yowscm.exe"84⤵PID:2744
-
C:\Windows\SysWOW64\gjudxs.exeC:\Windows\system32\gjudxs.exe 452 "C:\Windows\SysWOW64\pjlvyj.exe"85⤵
- Suspicious use of SetThreadContext
PID:2068 -
C:\Windows\SysWOW64\gjudxs.exeC:\Windows\system32\gjudxs.exe 452 "C:\Windows\SysWOW64\pjlvyj.exe"86⤵
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\yejyso.exeC:\Windows\system32\yejyso.exe 452 "C:\Windows\SysWOW64\gjudxs.exe"87⤵
- Suspicious use of SetThreadContext
PID:2540 -
C:\Windows\SysWOW64\yejyso.exeC:\Windows\system32\yejyso.exe 452 "C:\Windows\SysWOW64\gjudxs.exe"88⤵
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\pxvomo.exeC:\Windows\system32\pxvomo.exe 452 "C:\Windows\SysWOW64\yejyso.exe"89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\pxvomo.exeC:\Windows\system32\pxvomo.exe 452 "C:\Windows\SysWOW64\yejyso.exe"90⤵
- Drops file in System32 directory
PID:2144 -
C:\Windows\SysWOW64\dqqexs.exeC:\Windows\system32\dqqexs.exe 452 "C:\Windows\SysWOW64\pxvomo.exe"91⤵
- Suspicious use of SetThreadContext
PID:2768 -
C:\Windows\SysWOW64\dqqexs.exeC:\Windows\system32\dqqexs.exe 452 "C:\Windows\SysWOW64\pxvomo.exe"92⤵
- Drops file in System32 directory
PID:2136 -
C:\Windows\SysWOW64\yasrou.exeC:\Windows\system32\yasrou.exe 452 "C:\Windows\SysWOW64\dqqexs.exe"93⤵
- Suspicious use of SetThreadContext
PID:1472 -
C:\Windows\SysWOW64\yasrou.exeC:\Windows\system32\yasrou.exe 452 "C:\Windows\SysWOW64\dqqexs.exe"94⤵PID:2964
-
C:\Windows\SysWOW64\bqtwqk.exeC:\Windows\system32\bqtwqk.exe 452 "C:\Windows\SysWOW64\yasrou.exe"95⤵
- Suspicious use of SetThreadContext
PID:1804 -
C:\Windows\SysWOW64\bqtwqk.exeC:\Windows\system32\bqtwqk.exe 452 "C:\Windows\SysWOW64\yasrou.exe"96⤵
- Drops file in System32 directory
PID:1876 -
C:\Windows\SysWOW64\naycvr.exeC:\Windows\system32\naycvr.exe 452 "C:\Windows\SysWOW64\bqtwqk.exe"97⤵
- Suspicious use of SetThreadContext
PID:832 -
C:\Windows\SysWOW64\naycvr.exeC:\Windows\system32\naycvr.exe 452 "C:\Windows\SysWOW64\bqtwqk.exe"98⤵
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\cttmqi.exeC:\Windows\system32\cttmqi.exe 476 "C:\Windows\SysWOW64\naycvr.exe"99⤵
- Suspicious use of SetThreadContext
PID:572 -
C:\Windows\SysWOW64\cttmqi.exeC:\Windows\system32\cttmqi.exe 476 "C:\Windows\SysWOW64\naycvr.exe"100⤵PID:2968
-
C:\Windows\SysWOW64\ogjfxu.exeC:\Windows\system32\ogjfxu.exe 452 "C:\Windows\SysWOW64\cttmqi.exe"101⤵
- Suspicious use of SetThreadContext
PID:2580 -
C:\Windows\SysWOW64\ogjfxu.exeC:\Windows\system32\ogjfxu.exe 452 "C:\Windows\SysWOW64\cttmqi.exe"102⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\zwckik.exeC:\Windows\system32\zwckik.exe 452 "C:\Windows\SysWOW64\ogjfxu.exe"103⤵
- Suspicious use of SetThreadContext
PID:2628 -
C:\Windows\SysWOW64\zwckik.exeC:\Windows\system32\zwckik.exe 452 "C:\Windows\SysWOW64\ogjfxu.exe"104⤵
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\lghqes.exeC:\Windows\system32\lghqes.exe 452 "C:\Windows\SysWOW64\zwckik.exe"105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\lghqes.exeC:\Windows\system32\lghqes.exe 452 "C:\Windows\SysWOW64\zwckik.exe"106⤵
- Drops file in System32 directory
PID:1308 -
C:\Windows\SysWOW64\aknfkn.exeC:\Windows\system32\aknfkn.exe 452 "C:\Windows\SysWOW64\lghqes.exe"107⤵
- Suspicious use of SetThreadContext
PID:1852 -
C:\Windows\SysWOW64\aknfkn.exeC:\Windows\system32\aknfkn.exe 452 "C:\Windows\SysWOW64\lghqes.exe"108⤵
- Drops file in System32 directory
PID:492 -
C:\Windows\SysWOW64\poudhi.exeC:\Windows\system32\poudhi.exe 452 "C:\Windows\SysWOW64\aknfkn.exe"109⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\poudhi.exeC:\Windows\system32\poudhi.exe 452 "C:\Windows\SysWOW64\aknfkn.exe"110⤵PID:1036
-
C:\Windows\SysWOW64\dtsbfd.exeC:\Windows\system32\dtsbfd.exe 452 "C:\Windows\SysWOW64\poudhi.exe"111⤵
- Suspicious use of SetThreadContext
PID:2960 -
C:\Windows\SysWOW64\dtsbfd.exeC:\Windows\system32\dtsbfd.exe 452 "C:\Windows\SysWOW64\poudhi.exe"112⤵PID:1868
-
C:\Windows\SysWOW64\sxzqly.exeC:\Windows\system32\sxzqly.exe 452 "C:\Windows\SysWOW64\dtsbfd.exe"113⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\sxzqly.exeC:\Windows\system32\sxzqly.exe 452 "C:\Windows\SysWOW64\dtsbfd.exe"114⤵PID:916
-
C:\Windows\SysWOW64\zqubgp.exeC:\Windows\system32\zqubgp.exe 452 "C:\Windows\SysWOW64\sxzqly.exe"115⤵
- Suspicious use of SetThreadContext
PID:1500 -
C:\Windows\SysWOW64\zqubgp.exeC:\Windows\system32\zqubgp.exe 452 "C:\Windows\SysWOW64\sxzqly.exe"116⤵
- Drops file in System32 directory
PID:1276 -
C:\Windows\SysWOW64\qxujeq.exeC:\Windows\system32\qxujeq.exe 452 "C:\Windows\SysWOW64\zqubgp.exe"117⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\qxujeq.exeC:\Windows\system32\qxujeq.exe 452 "C:\Windows\SysWOW64\zqubgp.exe"118⤵PID:376
-
C:\Windows\SysWOW64\hxdzdz.exeC:\Windows\system32\hxdzdz.exe 452 "C:\Windows\SysWOW64\qxujeq.exe"119⤵
- Suspicious use of SetThreadContext
PID:872 -
C:\Windows\SysWOW64\hxdzdz.exeC:\Windows\system32\hxdzdz.exe 452 "C:\Windows\SysWOW64\qxujeq.exe"120⤵PID:1624
-
C:\Windows\SysWOW64\ypphwr.exeC:\Windows\system32\ypphwr.exe 452 "C:\Windows\SysWOW64\hxdzdz.exe"121⤵
- Suspicious use of SetThreadContext
PID:2812 -
C:\Windows\SysWOW64\ypphwr.exeC:\Windows\system32\ypphwr.exe 452 "C:\Windows\SysWOW64\hxdzdz.exe"122⤵PID:868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-