Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe
-
Size
472KB
-
MD5
b99a3c504fb3494c81eca16099aec5ab
-
SHA1
5695103a074dc622f1e7bd06e9b132c1e27550a2
-
SHA256
41d17aeec282d38dd6c92978b25081f7c05996ed5c27b83dcc43b8dc51a66ea4
-
SHA512
433cd7a44f055c3f1f9eb1498dd17d04b749dc587ddbde7c3d506c5a99b98db415c1d02fa0662f2d22934067feaa92c768c02c42be6c094cc5869ec3b23de705
-
SSDEEP
6144:uFeLlS5FZCAv2wFR24biJjWti/9q7R/ck6pSDy4N5q39dVdnNn1u9/TPr5P6uzPx:8D6AvTFgJVWt49y5YeE8RhpQetCe
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2152 mdbmdw.exe 5112 mdbmdw.exe 5728 mhxcfv.exe 5064 mhxcfv.exe 4964 rfeizq.exe 4972 rfeizq.exe 5436 wojinl.exe 3676 wojinl.exe 2752 rcbetd.exe 2620 rcbetd.exe 5704 etfehx.exe 1808 etfehx.exe 5772 teexeg.exe 5908 teexeg.exe 2096 ohssih.exe 4376 ohssih.exe 5212 bvmfbx.exe 3268 bvmfbx.exe 4552 tuyimk.exe 1656 tuyimk.exe 3260 gldjam.exe 2320 gldjam.exe 2324 bkurpk.exe 4560 bkurpk.exe 3164 oxnfai.exe 5628 oxnfai.exe 436 ecyxsh.exe 4364 ecyxsh.exe 1868 gumtib.exe 4144 gumtib.exe 1668 vchqce.exe 5848 vchqce.exe 3724 ipbmnv.exe 1288 ipbmnv.exe 100 bpnpyi.exe 3088 bpnpyi.exe 2052 tscflz.exe 5568 tscflz.exe 4840 ggwsxy.exe 3032 ggwsxy.exe 3508 txbtts.exe 1640 txbtts.exe 2672 lxneef.exe 2708 lxneef.exe 4688 dxzhot.exe 3144 dxzhot.exe 5508 tfunbw.exe 2816 tfunbw.exe 2268 dqkdoo.exe 5544 dqkdoo.exe 5412 sguagb.exe 5960 sguagb.exe 5804 niivsu.exe 3552 niivsu.exe 4884 gxjtac.exe 4892 gxjtac.exe 5100 yiyjnu.exe 2464 yiyjnu.exe 4328 nufucc.exe 4964 nufucc.exe 5464 fujxnp.exe 3096 fujxnp.exe 4792 yfgvah.exe 3444 yfgvah.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\pkyner.exe rcmafl.exe File created C:\Windows\SysWOW64\askolz.exe qpuyyi.exe File opened for modification C:\Windows\SysWOW64\bexfkf.exe jbhpxo.exe File opened for modification C:\Windows\SysWOW64\sguagb.exe dqkdoo.exe File created C:\Windows\SysWOW64\kxmyoc.exe tildxo.exe File created C:\Windows\SysWOW64\xnwgqr.exe fywdav.exe File created C:\Windows\SysWOW64\bexfkf.exe jbhpxo.exe File opened for modification C:\Windows\SysWOW64\yluaiu.exe gixcvc.exe File opened for modification C:\Windows\SysWOW64\gldjam.exe tuyimk.exe File created C:\Windows\SysWOW64\kefgio.exe ssique.exe File created C:\Windows\SysWOW64\bpnpyi.exe ipbmnv.exe File created C:\Windows\SysWOW64\tfunbw.exe dxzhot.exe File opened for modification C:\Windows\SysWOW64\yiyjnu.exe gxjtac.exe File opened for modification C:\Windows\SysWOW64\xvlodm.exe fswyqc.exe File created C:\Windows\SysWOW64\wrcbks.exe gjhexo.exe File opened for modification C:\Windows\SysWOW64\olxkdx.exe zonmdl.exe File created C:\Windows\SysWOW64\mktztj.exe rqfdhq.exe File opened for modification C:\Windows\SysWOW64\aufupz.exe fnombc.exe File opened for modification C:\Windows\SysWOW64\ohssih.exe teexeg.exe File created C:\Windows\SysWOW64\gxjtac.exe niivsu.exe File opened for modification C:\Windows\SysWOW64\zombnh.exe hlplzq.exe File created C:\Windows\SysWOW64\lhpemx.exe sezozf.exe File opened for modification C:\Windows\SysWOW64\hbsxgh.exe xmsuql.exe File created C:\Windows\SysWOW64\qlhoop.exe bwxrwd.exe File opened for modification C:\Windows\SysWOW64\irizxm.exe kxmyoc.exe File opened for modification C:\Windows\SysWOW64\kkehck.exe qenzof.exe File opened for modification C:\Windows\SysWOW64\rqfdhq.exe zbfaru.exe File created C:\Windows\SysWOW64\rcmafl.exe znlxpx.exe File opened for modification C:\Windows\SysWOW64\wcggha.exe yluaiu.exe File created C:\Windows\SysWOW64\xvlodm.exe fswyqc.exe File opened for modification C:\Windows\SysWOW64\phjeqd.exe xvlodm.exe File opened for modification C:\Windows\SysWOW64\roqexu.exe zombnh.exe File created C:\Windows\SysWOW64\wnlyvj.exe bwipmm.exe File created C:\Windows\SysWOW64\dxahmj.exe irizxm.exe File created C:\Windows\SysWOW64\sgerfc.exe acpbsl.exe File created C:\Windows\SysWOW64\hsjrdw.exe pmioni.exe File opened for modification C:\Windows\SysWOW64\bhjzgk.exe jwmbtt.exe File created C:\Windows\SysWOW64\fixpcj.exe nxhzor.exe File opened for modification C:\Windows\SysWOW64\agzsme.exe ihnhbr.exe File created C:\Windows\SysWOW64\dxzhot.exe lxneef.exe File created C:\Windows\SysWOW64\xyddqh.exe fvoncp.exe File created C:\Windows\SysWOW64\ihnhbr.exe phjeqd.exe File created C:\Windows\SysWOW64\gjhexo.exe pugbhs.exe File created C:\Windows\SysWOW64\qrsdet.exe xocnrc.exe File opened for modification C:\Windows\SysWOW64\znlxpx.exe hcohbg.exe File opened for modification C:\Windows\SysWOW64\lfrhjj.exe tyqmto.exe File opened for modification C:\Windows\SysWOW64\jwmbtt.exe wcggha.exe File opened for modification C:\Windows\SysWOW64\hcohbg.exe mktztj.exe File created C:\Windows\SysWOW64\wuuxvs.exe ejxhia.exe File created C:\Windows\SysWOW64\weantu.exe bexfkf.exe File opened for modification C:\Windows\SysWOW64\ldjuza.exe wrcbks.exe File created C:\Windows\SysWOW64\ewkecw.exe lxgtrj.exe File opened for modification C:\Windows\SysWOW64\sipmkp.exe ixswxx.exe File created C:\Windows\SysWOW64\icypxf.exe ndvhoi.exe File opened for modification C:\Windows\SysWOW64\rmpfeg.exe wuuxvs.exe File opened for modification C:\Windows\SysWOW64\tyqmto.exe yznwkz.exe File opened for modification C:\Windows\SysWOW64\gumtib.exe ecyxsh.exe File opened for modification C:\Windows\SysWOW64\zsdfkr.exe hpgpwz.exe File created C:\Windows\SysWOW64\irizxm.exe kxmyoc.exe File opened for modification C:\Windows\SysWOW64\omxgka.exe tjjlyz.exe File opened for modification C:\Windows\SysWOW64\jbhpxo.exe zykzjw.exe File created C:\Windows\SysWOW64\fujxnp.exe nufucc.exe File opened for modification C:\Windows\SysWOW64\ihnhbr.exe phjeqd.exe File opened for modification C:\Windows\SysWOW64\rjnass.exe zjjxhe.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1800 set thread context of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 2152 set thread context of 5112 2152 mdbmdw.exe 92 PID 5728 set thread context of 5064 5728 mhxcfv.exe 94 PID 4964 set thread context of 4972 4964 rfeizq.exe 96 PID 5436 set thread context of 3676 5436 wojinl.exe 98 PID 2752 set thread context of 2620 2752 rcbetd.exe 100 PID 5704 set thread context of 1808 5704 etfehx.exe 102 PID 5772 set thread context of 5908 5772 teexeg.exe 104 PID 2096 set thread context of 4376 2096 ohssih.exe 106 PID 5212 set thread context of 3268 5212 bvmfbx.exe 108 PID 4552 set thread context of 1656 4552 tuyimk.exe 110 PID 3260 set thread context of 2320 3260 gldjam.exe 112 PID 2324 set thread context of 4560 2324 bkurpk.exe 114 PID 3164 set thread context of 5628 3164 oxnfai.exe 116 PID 436 set thread context of 4364 436 ecyxsh.exe 118 PID 1868 set thread context of 4144 1868 gumtib.exe 120 PID 1668 set thread context of 5848 1668 vchqce.exe 122 PID 3724 set thread context of 1288 3724 ipbmnv.exe 124 PID 100 set thread context of 3088 100 bpnpyi.exe 126 PID 2052 set thread context of 5568 2052 tscflz.exe 128 PID 4840 set thread context of 3032 4840 ggwsxy.exe 130 PID 3508 set thread context of 1640 3508 txbtts.exe 132 PID 2672 set thread context of 2708 2672 lxneef.exe 134 PID 4688 set thread context of 3144 4688 dxzhot.exe 136 PID 5508 set thread context of 2816 5508 tfunbw.exe 138 PID 2268 set thread context of 5544 2268 dqkdoo.exe 140 PID 5412 set thread context of 5960 5412 sguagb.exe 142 PID 5804 set thread context of 3552 5804 niivsu.exe 144 PID 4884 set thread context of 4892 4884 gxjtac.exe 146 PID 5100 set thread context of 2464 5100 yiyjnu.exe 151 PID 4328 set thread context of 4964 4328 nufucc.exe 153 PID 5464 set thread context of 3096 5464 fujxnp.exe 155 PID 4792 set thread context of 3444 4792 yfgvah.exe 157 PID 5360 set thread context of 5704 5360 nrfgxp.exe 159 PID 2364 set thread context of 3272 2364 frrjic.exe 161 PID 4700 set thread context of 776 4700 nznpug.exe 163 PID 1692 set thread context of 6028 1692 fvoncp.exe 165 PID 2632 set thread context of 5888 2632 xyddqh.exe 167 PID 3612 set thread context of 3592 3612 nwvait.exe 169 PID 1540 set thread context of 5620 1540 fswyqc.exe 171 PID 5440 set thread context of 2384 5440 xvlodm.exe 173 PID 2576 set thread context of 6088 2576 phjeqd.exe 176 PID 4672 set thread context of 840 4672 ihnhbr.exe 178 PID 412 set thread context of 1552 412 agzsme.exe 180 PID 1340 set thread context of 5256 1340 qpuyyi.exe 182 PID 2728 set thread context of 6100 2728 askolz.exe 184 PID 6052 set thread context of 3392 6052 ppcmlm.exe 186 PID 2952 set thread context of 3428 2952 hpgpwz.exe 188 PID 6136 set thread context of 6104 6136 zsdfkr.exe 190 PID 1752 set thread context of 2212 1752 ssique.exe 192 PID 3696 set thread context of 2252 3696 kefgio.exe 194 PID 4688 set thread context of 1464 4688 cdrjsb.exe 196 PID 5584 set thread context of 2196 5584 uhhhgs.exe 198 PID 1208 set thread context of 5896 1208 kpcfsw.exe 200 PID 3292 set thread context of 3604 3292 zjjxhe.exe 202 PID 4728 set thread context of 4616 4728 rjnass.exe 204 PID 5032 set thread context of 4868 5032 edbwdt.exe 206 PID 1608 set thread context of 4200 1608 uxagtb.exe 208 PID 5076 set thread context of 4996 5076 mmbeak.exe 210 PID 3544 set thread context of 3276 3544 ftnhlx.exe 212 PID 2304 set thread context of 3432 2304 ujxndj.exe 214 PID 1032 set thread context of 2752 1032 ollapc.exe 216 PID 4756 set thread context of 4012 4756 hlplzq.exe 218 PID 2172 set thread context of 2024 2172 zombnh.exe 220 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdzhoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qenzof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weantu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhjzgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ollapc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdbmdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxnfai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxifdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxahmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raqjgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfgvah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eizshp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxneef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujxnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuuywf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xatqaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmsuql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxzhot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gxjtac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nufucc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pugbhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omxgka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkyner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzuape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yluaiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrcbks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tljder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnlyvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuuxvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gumtib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwvait.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language askolz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kefgio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hsjrdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gixcvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxzhot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdrjsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxgtrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zonmdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tildxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hcohbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yznwkz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecyxsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfunbw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qpuyyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mhxcfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language etfehx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nznpug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xyddqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcwere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddxixi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkurpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ihnhbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vchqce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrinpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzuape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gwqgwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwmbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niivsu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpgpwz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujxndj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuuywf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrhjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sguagb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 1800 wrote to memory of 4504 1800 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 88 PID 4504 wrote to memory of 2152 4504 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 89 PID 4504 wrote to memory of 2152 4504 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 89 PID 4504 wrote to memory of 2152 4504 JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe 89 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 2152 wrote to memory of 5112 2152 mdbmdw.exe 92 PID 5112 wrote to memory of 5728 5112 mdbmdw.exe 93 PID 5112 wrote to memory of 5728 5112 mdbmdw.exe 93 PID 5112 wrote to memory of 5728 5112 mdbmdw.exe 93 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5728 wrote to memory of 5064 5728 mhxcfv.exe 94 PID 5064 wrote to memory of 4964 5064 mhxcfv.exe 95 PID 5064 wrote to memory of 4964 5064 mhxcfv.exe 95 PID 5064 wrote to memory of 4964 5064 mhxcfv.exe 95 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4964 wrote to memory of 4972 4964 rfeizq.exe 96 PID 4972 wrote to memory of 5436 4972 rfeizq.exe 97 PID 4972 wrote to memory of 5436 4972 rfeizq.exe 97 PID 4972 wrote to memory of 5436 4972 rfeizq.exe 97 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 5436 wrote to memory of 3676 5436 wojinl.exe 98 PID 3676 wrote to memory of 2752 3676 wojinl.exe 99 PID 3676 wrote to memory of 2752 3676 wojinl.exe 99 PID 3676 wrote to memory of 2752 3676 wojinl.exe 99 PID 2752 wrote to memory of 2620 2752 rcbetd.exe 100 PID 2752 wrote to memory of 2620 2752 rcbetd.exe 100 PID 2752 wrote to memory of 2620 2752 rcbetd.exe 100 PID 2752 wrote to memory of 2620 2752 rcbetd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\mdbmdw.exeC:\Windows\system32\mdbmdw.exe 1112 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\mdbmdw.exeC:\Windows\system32\mdbmdw.exe 1112 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a3c504fb3494c81eca16099aec5ab.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\mhxcfv.exeC:\Windows\system32\mhxcfv.exe 1012 "C:\Windows\SysWOW64\mdbmdw.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Windows\SysWOW64\mhxcfv.exeC:\Windows\system32\mhxcfv.exe 1012 "C:\Windows\SysWOW64\mdbmdw.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\rfeizq.exeC:\Windows\system32\rfeizq.exe 992 "C:\Windows\SysWOW64\mhxcfv.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\rfeizq.exeC:\Windows\system32\rfeizq.exe 992 "C:\Windows\SysWOW64\mhxcfv.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\wojinl.exeC:\Windows\system32\wojinl.exe 988 "C:\Windows\SysWOW64\rfeizq.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5436 -
C:\Windows\SysWOW64\wojinl.exeC:\Windows\system32\wojinl.exe 988 "C:\Windows\SysWOW64\rfeizq.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\rcbetd.exeC:\Windows\system32\rcbetd.exe 1120 "C:\Windows\SysWOW64\wojinl.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\rcbetd.exeC:\Windows\system32\rcbetd.exe 1120 "C:\Windows\SysWOW64\wojinl.exe"12⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\etfehx.exeC:\Windows\system32\etfehx.exe 988 "C:\Windows\SysWOW64\rcbetd.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5704 -
C:\Windows\SysWOW64\etfehx.exeC:\Windows\system32\etfehx.exe 988 "C:\Windows\SysWOW64\rcbetd.exe"14⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\teexeg.exeC:\Windows\system32\teexeg.exe 1012 "C:\Windows\SysWOW64\etfehx.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5772 -
C:\Windows\SysWOW64\teexeg.exeC:\Windows\system32\teexeg.exe 1012 "C:\Windows\SysWOW64\etfehx.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5908 -
C:\Windows\SysWOW64\ohssih.exeC:\Windows\system32\ohssih.exe 1136 "C:\Windows\SysWOW64\teexeg.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2096 -
C:\Windows\SysWOW64\ohssih.exeC:\Windows\system32\ohssih.exe 1136 "C:\Windows\SysWOW64\teexeg.exe"18⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\bvmfbx.exeC:\Windows\system32\bvmfbx.exe 1000 "C:\Windows\SysWOW64\ohssih.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5212 -
C:\Windows\SysWOW64\bvmfbx.exeC:\Windows\system32\bvmfbx.exe 1000 "C:\Windows\SysWOW64\ohssih.exe"20⤵
- Executes dropped EXE
PID:3268 -
C:\Windows\SysWOW64\tuyimk.exeC:\Windows\system32\tuyimk.exe 1012 "C:\Windows\SysWOW64\bvmfbx.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4552 -
C:\Windows\SysWOW64\tuyimk.exeC:\Windows\system32\tuyimk.exe 1012 "C:\Windows\SysWOW64\bvmfbx.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\gldjam.exeC:\Windows\system32\gldjam.exe 1012 "C:\Windows\SysWOW64\tuyimk.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3260 -
C:\Windows\SysWOW64\gldjam.exeC:\Windows\system32\gldjam.exe 1012 "C:\Windows\SysWOW64\tuyimk.exe"24⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\bkurpk.exeC:\Windows\system32\bkurpk.exe 1124 "C:\Windows\SysWOW64\gldjam.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2324 -
C:\Windows\SysWOW64\bkurpk.exeC:\Windows\system32\bkurpk.exe 1124 "C:\Windows\SysWOW64\gldjam.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Windows\SysWOW64\oxnfai.exeC:\Windows\system32\oxnfai.exe 988 "C:\Windows\SysWOW64\bkurpk.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3164 -
C:\Windows\SysWOW64\oxnfai.exeC:\Windows\system32\oxnfai.exe 988 "C:\Windows\SysWOW64\bkurpk.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Windows\SysWOW64\ecyxsh.exeC:\Windows\system32\ecyxsh.exe 1012 "C:\Windows\SysWOW64\oxnfai.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:436 -
C:\Windows\SysWOW64\ecyxsh.exeC:\Windows\system32\ecyxsh.exe 1012 "C:\Windows\SysWOW64\oxnfai.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4364 -
C:\Windows\SysWOW64\gumtib.exeC:\Windows\system32\gumtib.exe 1000 "C:\Windows\SysWOW64\ecyxsh.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\gumtib.exeC:\Windows\system32\gumtib.exe 1000 "C:\Windows\SysWOW64\ecyxsh.exe"32⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\vchqce.exeC:\Windows\system32\vchqce.exe 1052 "C:\Windows\SysWOW64\gumtib.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1668 -
C:\Windows\SysWOW64\vchqce.exeC:\Windows\system32\vchqce.exe 1052 "C:\Windows\SysWOW64\gumtib.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5848 -
C:\Windows\SysWOW64\ipbmnv.exeC:\Windows\system32\ipbmnv.exe 1012 "C:\Windows\SysWOW64\vchqce.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3724 -
C:\Windows\SysWOW64\ipbmnv.exeC:\Windows\system32\ipbmnv.exe 1012 "C:\Windows\SysWOW64\vchqce.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1288 -
C:\Windows\SysWOW64\bpnpyi.exeC:\Windows\system32\bpnpyi.exe 1012 "C:\Windows\SysWOW64\ipbmnv.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:100 -
C:\Windows\SysWOW64\bpnpyi.exeC:\Windows\system32\bpnpyi.exe 1012 "C:\Windows\SysWOW64\ipbmnv.exe"38⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\tscflz.exeC:\Windows\system32\tscflz.exe 1120 "C:\Windows\SysWOW64\bpnpyi.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2052 -
C:\Windows\SysWOW64\tscflz.exeC:\Windows\system32\tscflz.exe 1120 "C:\Windows\SysWOW64\bpnpyi.exe"40⤵
- Executes dropped EXE
PID:5568 -
C:\Windows\SysWOW64\ggwsxy.exeC:\Windows\system32\ggwsxy.exe 1120 "C:\Windows\SysWOW64\tscflz.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4840 -
C:\Windows\SysWOW64\ggwsxy.exeC:\Windows\system32\ggwsxy.exe 1120 "C:\Windows\SysWOW64\tscflz.exe"42⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\txbtts.exeC:\Windows\system32\txbtts.exe 988 "C:\Windows\SysWOW64\ggwsxy.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3508 -
C:\Windows\SysWOW64\txbtts.exeC:\Windows\system32\txbtts.exe 988 "C:\Windows\SysWOW64\ggwsxy.exe"44⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\lxneef.exeC:\Windows\system32\lxneef.exe 1012 "C:\Windows\SysWOW64\txbtts.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\lxneef.exeC:\Windows\system32\lxneef.exe 1012 "C:\Windows\SysWOW64\txbtts.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\dxzhot.exeC:\Windows\system32\dxzhot.exe 996 "C:\Windows\SysWOW64\lxneef.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Windows\SysWOW64\dxzhot.exeC:\Windows\system32\dxzhot.exe 996 "C:\Windows\SysWOW64\lxneef.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3144 -
C:\Windows\SysWOW64\tfunbw.exeC:\Windows\system32\tfunbw.exe 988 "C:\Windows\SysWOW64\dxzhot.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5508 -
C:\Windows\SysWOW64\tfunbw.exeC:\Windows\system32\tfunbw.exe 988 "C:\Windows\SysWOW64\dxzhot.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\dqkdoo.exeC:\Windows\system32\dqkdoo.exe 1068 "C:\Windows\SysWOW64\tfunbw.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2268 -
C:\Windows\SysWOW64\dqkdoo.exeC:\Windows\system32\dqkdoo.exe 1068 "C:\Windows\SysWOW64\tfunbw.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5544 -
C:\Windows\SysWOW64\sguagb.exeC:\Windows\system32\sguagb.exe 1000 "C:\Windows\SysWOW64\dqkdoo.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5412 -
C:\Windows\SysWOW64\sguagb.exeC:\Windows\system32\sguagb.exe 1000 "C:\Windows\SysWOW64\dqkdoo.exe"54⤵
- Executes dropped EXE
PID:5960 -
C:\Windows\SysWOW64\niivsu.exeC:\Windows\system32\niivsu.exe 1120 "C:\Windows\SysWOW64\sguagb.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5804 -
C:\Windows\SysWOW64\niivsu.exeC:\Windows\system32\niivsu.exe 1120 "C:\Windows\SysWOW64\sguagb.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\gxjtac.exeC:\Windows\system32\gxjtac.exe 1008 "C:\Windows\SysWOW64\niivsu.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\gxjtac.exeC:\Windows\system32\gxjtac.exe 1008 "C:\Windows\SysWOW64\niivsu.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4892 -
C:\Windows\SysWOW64\yiyjnu.exeC:\Windows\system32\yiyjnu.exe 1124 "C:\Windows\SysWOW64\gxjtac.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5100 -
C:\Windows\SysWOW64\yiyjnu.exeC:\Windows\system32\yiyjnu.exe 1124 "C:\Windows\SysWOW64\gxjtac.exe"60⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\nufucc.exeC:\Windows\system32\nufucc.exe 988 "C:\Windows\SysWOW64\yiyjnu.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4328 -
C:\Windows\SysWOW64\nufucc.exeC:\Windows\system32\nufucc.exe 988 "C:\Windows\SysWOW64\yiyjnu.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\fujxnp.exeC:\Windows\system32\fujxnp.exe 1000 "C:\Windows\SysWOW64\nufucc.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5464 -
C:\Windows\SysWOW64\fujxnp.exeC:\Windows\system32\fujxnp.exe 1000 "C:\Windows\SysWOW64\nufucc.exe"64⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\yfgvah.exeC:\Windows\system32\yfgvah.exe 1120 "C:\Windows\SysWOW64\fujxnp.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Windows\SysWOW64\yfgvah.exeC:\Windows\system32\yfgvah.exe 1120 "C:\Windows\SysWOW64\fujxnp.exe"66⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\nrfgxp.exeC:\Windows\system32\nrfgxp.exe 1060 "C:\Windows\SysWOW64\yfgvah.exe"67⤵
- Suspicious use of SetThreadContext
PID:5360 -
C:\Windows\SysWOW64\nrfgxp.exeC:\Windows\system32\nrfgxp.exe 1060 "C:\Windows\SysWOW64\yfgvah.exe"68⤵PID:5704
-
C:\Windows\SysWOW64\frrjic.exeC:\Windows\system32\frrjic.exe 1008 "C:\Windows\SysWOW64\nrfgxp.exe"69⤵
- Suspicious use of SetThreadContext
PID:2364 -
C:\Windows\SysWOW64\frrjic.exeC:\Windows\system32\frrjic.exe 1008 "C:\Windows\SysWOW64\nrfgxp.exe"70⤵PID:3272
-
C:\Windows\SysWOW64\nznpug.exeC:\Windows\system32\nznpug.exe 1120 "C:\Windows\SysWOW64\frrjic.exe"71⤵
- Suspicious use of SetThreadContext
PID:4700 -
C:\Windows\SysWOW64\nznpug.exeC:\Windows\system32\nznpug.exe 1120 "C:\Windows\SysWOW64\frrjic.exe"72⤵
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\fvoncp.exeC:\Windows\system32\fvoncp.exe 1000 "C:\Windows\SysWOW64\nznpug.exe"73⤵
- Suspicious use of SetThreadContext
PID:1692 -
C:\Windows\SysWOW64\fvoncp.exeC:\Windows\system32\fvoncp.exe 1000 "C:\Windows\SysWOW64\nznpug.exe"74⤵
- Drops file in System32 directory
PID:6028 -
C:\Windows\SysWOW64\xyddqh.exeC:\Windows\system32\xyddqh.exe 1000 "C:\Windows\SysWOW64\fvoncp.exe"75⤵
- Suspicious use of SetThreadContext
PID:2632 -
C:\Windows\SysWOW64\xyddqh.exeC:\Windows\system32\xyddqh.exe 1000 "C:\Windows\SysWOW64\fvoncp.exe"76⤵
- System Location Discovery: System Language Discovery
PID:5888 -
C:\Windows\SysWOW64\nwvait.exeC:\Windows\system32\nwvait.exe 1120 "C:\Windows\SysWOW64\xyddqh.exe"77⤵
- Suspicious use of SetThreadContext
PID:3612 -
C:\Windows\SysWOW64\nwvait.exeC:\Windows\system32\nwvait.exe 1120 "C:\Windows\SysWOW64\xyddqh.exe"78⤵
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\fswyqc.exeC:\Windows\system32\fswyqc.exe 988 "C:\Windows\SysWOW64\nwvait.exe"79⤵
- Suspicious use of SetThreadContext
PID:1540 -
C:\Windows\SysWOW64\fswyqc.exeC:\Windows\system32\fswyqc.exe 988 "C:\Windows\SysWOW64\nwvait.exe"80⤵
- Drops file in System32 directory
PID:5620 -
C:\Windows\SysWOW64\xvlodm.exeC:\Windows\system32\xvlodm.exe 1120 "C:\Windows\SysWOW64\fswyqc.exe"81⤵
- Suspicious use of SetThreadContext
PID:5440 -
C:\Windows\SysWOW64\xvlodm.exeC:\Windows\system32\xvlodm.exe 1120 "C:\Windows\SysWOW64\fswyqc.exe"82⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\phjeqd.exeC:\Windows\system32\phjeqd.exe 1128 "C:\Windows\SysWOW64\xvlodm.exe"83⤵
- Suspicious use of SetThreadContext
PID:2576 -
C:\Windows\SysWOW64\phjeqd.exeC:\Windows\system32\phjeqd.exe 1128 "C:\Windows\SysWOW64\xvlodm.exe"84⤵
- Drops file in System32 directory
PID:6088 -
C:\Windows\SysWOW64\ihnhbr.exeC:\Windows\system32\ihnhbr.exe 992 "C:\Windows\SysWOW64\phjeqd.exe"85⤵
- Suspicious use of SetThreadContext
PID:4672 -
C:\Windows\SysWOW64\ihnhbr.exeC:\Windows\system32\ihnhbr.exe 992 "C:\Windows\SysWOW64\phjeqd.exe"86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\agzsme.exeC:\Windows\system32\agzsme.exe 1012 "C:\Windows\SysWOW64\ihnhbr.exe"87⤵
- Suspicious use of SetThreadContext
PID:412 -
C:\Windows\SysWOW64\agzsme.exeC:\Windows\system32\agzsme.exe 1012 "C:\Windows\SysWOW64\ihnhbr.exe"88⤵PID:1552
-
C:\Windows\SysWOW64\qpuyyi.exeC:\Windows\system32\qpuyyi.exe 1120 "C:\Windows\SysWOW64\agzsme.exe"89⤵
- Suspicious use of SetThreadContext
PID:1340 -
C:\Windows\SysWOW64\qpuyyi.exeC:\Windows\system32\qpuyyi.exe 1120 "C:\Windows\SysWOW64\agzsme.exe"90⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5256 -
C:\Windows\SysWOW64\askolz.exeC:\Windows\system32\askolz.exe 1008 "C:\Windows\SysWOW64\qpuyyi.exe"91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\askolz.exeC:\Windows\system32\askolz.exe 1008 "C:\Windows\SysWOW64\qpuyyi.exe"92⤵PID:6100
-
C:\Windows\SysWOW64\ppcmlm.exeC:\Windows\system32\ppcmlm.exe 1008 "C:\Windows\SysWOW64\askolz.exe"93⤵
- Suspicious use of SetThreadContext
PID:6052 -
C:\Windows\SysWOW64\ppcmlm.exeC:\Windows\system32\ppcmlm.exe 1008 "C:\Windows\SysWOW64\askolz.exe"94⤵PID:3392
-
C:\Windows\SysWOW64\hpgpwz.exeC:\Windows\system32\hpgpwz.exe 1000 "C:\Windows\SysWOW64\ppcmlm.exe"95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\hpgpwz.exeC:\Windows\system32\hpgpwz.exe 1000 "C:\Windows\SysWOW64\ppcmlm.exe"96⤵
- Drops file in System32 directory
PID:3428 -
C:\Windows\SysWOW64\zsdfkr.exeC:\Windows\system32\zsdfkr.exe 1052 "C:\Windows\SysWOW64\hpgpwz.exe"97⤵
- Suspicious use of SetThreadContext
PID:6136 -
C:\Windows\SysWOW64\zsdfkr.exeC:\Windows\system32\zsdfkr.exe 1052 "C:\Windows\SysWOW64\hpgpwz.exe"98⤵PID:6104
-
C:\Windows\SysWOW64\ssique.exeC:\Windows\system32\ssique.exe 1000 "C:\Windows\SysWOW64\zsdfkr.exe"99⤵
- Suspicious use of SetThreadContext
PID:1752 -
C:\Windows\SysWOW64\ssique.exeC:\Windows\system32\ssique.exe 1000 "C:\Windows\SysWOW64\zsdfkr.exe"100⤵
- Drops file in System32 directory
PID:2212 -
C:\Windows\SysWOW64\kefgio.exeC:\Windows\system32\kefgio.exe 988 "C:\Windows\SysWOW64\ssique.exe"101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Windows\SysWOW64\kefgio.exeC:\Windows\system32\kefgio.exe 988 "C:\Windows\SysWOW64\ssique.exe"102⤵PID:2252
-
C:\Windows\SysWOW64\cdrjsb.exeC:\Windows\system32\cdrjsb.exe 988 "C:\Windows\SysWOW64\kefgio.exe"103⤵
- Suspicious use of SetThreadContext
PID:4688 -
C:\Windows\SysWOW64\cdrjsb.exeC:\Windows\system32\cdrjsb.exe 988 "C:\Windows\SysWOW64\kefgio.exe"104⤵
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\uhhhgs.exeC:\Windows\system32\uhhhgs.exe 1000 "C:\Windows\SysWOW64\cdrjsb.exe"105⤵
- Suspicious use of SetThreadContext
PID:5584 -
C:\Windows\SysWOW64\uhhhgs.exeC:\Windows\system32\uhhhgs.exe 1000 "C:\Windows\SysWOW64\cdrjsb.exe"106⤵PID:2196
-
C:\Windows\SysWOW64\kpcfsw.exeC:\Windows\system32\kpcfsw.exe 996 "C:\Windows\SysWOW64\uhhhgs.exe"107⤵
- Suspicious use of SetThreadContext
PID:1208 -
C:\Windows\SysWOW64\kpcfsw.exeC:\Windows\system32\kpcfsw.exe 996 "C:\Windows\SysWOW64\uhhhgs.exe"108⤵PID:5896
-
C:\Windows\SysWOW64\zjjxhe.exeC:\Windows\system32\zjjxhe.exe 1000 "C:\Windows\SysWOW64\kpcfsw.exe"109⤵
- Suspicious use of SetThreadContext
PID:3292 -
C:\Windows\SysWOW64\zjjxhe.exeC:\Windows\system32\zjjxhe.exe 1000 "C:\Windows\SysWOW64\kpcfsw.exe"110⤵
- Drops file in System32 directory
PID:3604 -
C:\Windows\SysWOW64\rjnass.exeC:\Windows\system32\rjnass.exe 988 "C:\Windows\SysWOW64\zjjxhe.exe"111⤵
- Suspicious use of SetThreadContext
PID:4728 -
C:\Windows\SysWOW64\rjnass.exeC:\Windows\system32\rjnass.exe 988 "C:\Windows\SysWOW64\zjjxhe.exe"112⤵PID:4616
-
C:\Windows\SysWOW64\edbwdt.exeC:\Windows\system32\edbwdt.exe 1016 "C:\Windows\SysWOW64\rjnass.exe"113⤵
- Suspicious use of SetThreadContext
PID:5032 -
C:\Windows\SysWOW64\edbwdt.exeC:\Windows\system32\edbwdt.exe 1016 "C:\Windows\SysWOW64\rjnass.exe"114⤵PID:4868
-
C:\Windows\SysWOW64\uxagtb.exeC:\Windows\system32\uxagtb.exe 988 "C:\Windows\SysWOW64\edbwdt.exe"115⤵
- Suspicious use of SetThreadContext
PID:1608 -
C:\Windows\SysWOW64\uxagtb.exeC:\Windows\system32\uxagtb.exe 988 "C:\Windows\SysWOW64\edbwdt.exe"116⤵PID:4200
-
C:\Windows\SysWOW64\mmbeak.exeC:\Windows\system32\mmbeak.exe 1008 "C:\Windows\SysWOW64\uxagtb.exe"117⤵
- Suspicious use of SetThreadContext
PID:5076 -
C:\Windows\SysWOW64\mmbeak.exeC:\Windows\system32\mmbeak.exe 1008 "C:\Windows\SysWOW64\uxagtb.exe"118⤵PID:4996
-
C:\Windows\SysWOW64\ftnhlx.exeC:\Windows\system32\ftnhlx.exe 992 "C:\Windows\SysWOW64\mmbeak.exe"119⤵
- Suspicious use of SetThreadContext
PID:3544 -
C:\Windows\SysWOW64\ftnhlx.exeC:\Windows\system32\ftnhlx.exe 992 "C:\Windows\SysWOW64\mmbeak.exe"120⤵PID:3276
-
C:\Windows\SysWOW64\ujxndj.exeC:\Windows\system32\ujxndj.exe 1012 "C:\Windows\SysWOW64\ftnhlx.exe"121⤵
- Suspicious use of SetThreadContext
PID:2304 -
C:\Windows\SysWOW64\ujxndj.exeC:\Windows\system32\ujxndj.exe 1012 "C:\Windows\SysWOW64\ftnhlx.exe"122⤵
- System Location Discovery: System Language Discovery
PID:3432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-