Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
81s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
0311b7364b1b1eed21aed5042f20d59c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0311b7364b1b1eed21aed5042f20d59c_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0311b7364b1b1eed21aed5042f20d59c_JaffaCakes118.exe
-
Size
530KB
-
MD5
0311b7364b1b1eed21aed5042f20d59c
-
SHA1
a37ffd639e8fd795d4e93747b628b1acb712f651
-
SHA256
94be3d2e1797585f39128ad9bce05b8d708a8fe66589cc4b3e81bbf2c15ceaad
-
SHA512
5fe882d00f83556255a5781d2213eecff826393ccfcfe03a56dd43454b9e80c1685339429f6d9053b7213b9096422bd55700b1039960d451c004ca7945aa76b3
-
SSDEEP
3072:5CaoAs101bol0xPTM7mRCAdJSSxPUkl3V4Vh19MQTCk/dN92sdNhavtrVdewnAxv:5qDAMl0xPTMiR9JSSxPUKundodH74
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemdajrk.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemopzyr.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemeozpg.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemtthqm.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqembnbzf.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemdvioo.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemsnifv.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemevomj.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqembwxts.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemtixqb.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemguitu.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemodxhy.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemwnbhw.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemhshqb.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemvgdrp.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemkhchs.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemdtblb.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemkclmo.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemevoun.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemwcozc.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemnhorc.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemencif.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemrffdg.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqembgdfg.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemihnkx.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlsirr.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemdqeec.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemxuvul.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqembzrak.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemteiun.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemygsbv.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemsgjtw.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqempgjpg.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemetlfe.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemmjjtj.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemylerp.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemjdjgv.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemrubwn.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemomdkz.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemuglpk.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemsunux.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemjbxyx.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqembziez.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlgcde.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemvrihk.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemgpadj.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemptxal.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlvqod.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemravrs.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqempnmgg.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqembjrur.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemxwptx.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemzgcvr.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemhzdwb.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemmoylo.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemssmad.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemyqjqj.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemxdwvz.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemscxbt.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemsqmiy.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemnrtej.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlrtjz.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemgmjcq.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemxjdet.exe -
Executes dropped EXE 64 IoCs
pid Process 4612 Sysqemjdjgv.exe 3104 Sysqemkdklo.exe 4652 Sysqemmznwj.exe 3276 Sysqemravrs.exe 3148 Sysqemzxjed.exe 1676 Sysqemevomj.exe 4052 Sysqemjihuc.exe 1836 Sysqemhfgpv.exe 1212 Sysqemwnbhw.exe 2712 Sysqemjttpw.exe 1316 Sysqembmhvp.exe 3404 Sysqemmoylo.exe 2456 Sysqemtthqm.exe 212 Sysqemhgatl.exe 3732 Sysqemrubwn.exe 460 Sysqembnbzf.exe 1748 Sysqembfdxl.exe 3292 Sysqemgouxn.exe 4692 Sysqemhshqb.exe 4952 Sysqemzskna.exe 1240 Sysqemefeaf.exe 2760 Sysqemuykba.exe 3000 Sysqembrktj.exe 4168 Sysqemotrog.exe 868 Sysqemrzfrv.exe 5052 Sysqembvhpp.exe 3308 Sysqemomdkz.exe 3212 Sysqemrpgim.exe 4612 Sysqemqaosm.exe 3184 Sysqemyboyn.exe 2740 Sysqemgfzqq.exe 872 Sysqemlhqea.exe 4400 Sysqemdvioo.exe 2300 Sysqemvrihk.exe 3692 Sysqemnrtej.exe 1448 Sysqemgftpg.exe 2352 Sysqemjuafh.exe 4820 Sysqembmldg.exe 2384 Sysqemqnjdb.exe 3972 Sysqemdtblb.exe 2316 Sysqemygsbv.exe 1924 Sysqemdabgf.exe 2792 Sysqemnhorc.exe 1840 Sysqemdbmsx.exe 664 Sysqemsnifv.exe 1280 Sysqemlfwkg.exe 1580 Sysqemvuynq.exe 4076 Sysqemgpadj.exe 2044 Sysqemqdcgt.exe 1748 Sysqemtvuyd.exe 1832 Sysqemlrtjz.exe 2484 Sysqemadzoc.exe 3276 Sysqemvfwrm.exe 4516 Sysqemgmjcq.exe 4308 Sysqemihnkx.exe 4232 Sysqemssmad.exe 3712 Sysqemyqjqj.exe 3760 Sysqemptxal.exe 1580 Sysqemlvcdc.exe 4604 Sysqemspkod.exe 1008 Sysqemgyqzg.exe 3960 Sysqemngera.exe 400 Sysqemvgdrp.exe 2684 Sysqemddney.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmoylo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvgdrp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdajrk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzgcvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmhvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzota.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemunahd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfunkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrijax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrffdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsftyt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemencif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmpwsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjjtj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodxhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsgjtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmuinm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjttpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgftpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemirsvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdqeec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotrog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfwrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembzrak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhperi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzdwb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembgdfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvuynq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxdwvz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhwtor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfguhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmznwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemravrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhshqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlfwkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemopzyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlgcde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembrktj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmldg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemspkod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdffx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrzfrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlhqea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvcdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembwxts.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeozpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemevomj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyqzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcgfer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemworwh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnojmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrviuf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvqod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlhdgz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzyrmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwcozc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjdjgv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefeaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnrtej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemutcgx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtthqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlrtjz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlsirr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeaguw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4612 4444 0311b7364b1b1eed21aed5042f20d59c_JaffaCakes118.exe 83 PID 4444 wrote to memory of 4612 4444 0311b7364b1b1eed21aed5042f20d59c_JaffaCakes118.exe 83 PID 4444 wrote to memory of 4612 4444 0311b7364b1b1eed21aed5042f20d59c_JaffaCakes118.exe 83 PID 4612 wrote to memory of 3104 4612 Sysqemjdjgv.exe 85 PID 4612 wrote to memory of 3104 4612 Sysqemjdjgv.exe 85 PID 4612 wrote to memory of 3104 4612 Sysqemjdjgv.exe 85 PID 3104 wrote to memory of 4652 3104 Sysqemkdklo.exe 88 PID 3104 wrote to memory of 4652 3104 Sysqemkdklo.exe 88 PID 3104 wrote to memory of 4652 3104 Sysqemkdklo.exe 88 PID 4652 wrote to memory of 3276 4652 Sysqemmznwj.exe 89 PID 4652 wrote to memory of 3276 4652 Sysqemmznwj.exe 89 PID 4652 wrote to memory of 3276 4652 Sysqemmznwj.exe 89 PID 3276 wrote to memory of 3148 3276 Sysqemravrs.exe 90 PID 3276 wrote to memory of 3148 3276 Sysqemravrs.exe 90 PID 3276 wrote to memory of 3148 3276 Sysqemravrs.exe 90 PID 3148 wrote to memory of 1676 3148 Sysqemzxjed.exe 91 PID 3148 wrote to memory of 1676 3148 Sysqemzxjed.exe 91 PID 3148 wrote to memory of 1676 3148 Sysqemzxjed.exe 91 PID 1676 wrote to memory of 4052 1676 Sysqemevomj.exe 92 PID 1676 wrote to memory of 4052 1676 Sysqemevomj.exe 92 PID 1676 wrote to memory of 4052 1676 Sysqemevomj.exe 92 PID 4052 wrote to memory of 1836 4052 Sysqemjihuc.exe 93 PID 4052 wrote to memory of 1836 4052 Sysqemjihuc.exe 93 PID 4052 wrote to memory of 1836 4052 Sysqemjihuc.exe 93 PID 1836 wrote to memory of 1212 1836 Sysqemhfgpv.exe 94 PID 1836 wrote to memory of 1212 1836 Sysqemhfgpv.exe 94 PID 1836 wrote to memory of 1212 1836 Sysqemhfgpv.exe 94 PID 1212 wrote to memory of 2712 1212 Sysqemwnbhw.exe 95 PID 1212 wrote to memory of 2712 1212 Sysqemwnbhw.exe 95 PID 1212 wrote to memory of 2712 1212 Sysqemwnbhw.exe 95 PID 2712 wrote to memory of 1316 2712 Sysqemjttpw.exe 96 PID 2712 wrote to memory of 1316 2712 Sysqemjttpw.exe 96 PID 2712 wrote to memory of 1316 2712 Sysqemjttpw.exe 96 PID 1316 wrote to memory of 3404 1316 Sysqembmhvp.exe 97 PID 1316 wrote to memory of 3404 1316 Sysqembmhvp.exe 97 PID 1316 wrote to memory of 3404 1316 Sysqembmhvp.exe 97 PID 3404 wrote to memory of 2456 3404 Sysqemmoylo.exe 98 PID 3404 wrote to memory of 2456 3404 Sysqemmoylo.exe 98 PID 3404 wrote to memory of 2456 3404 Sysqemmoylo.exe 98 PID 2456 wrote to memory of 212 2456 Sysqemtthqm.exe 99 PID 2456 wrote to memory of 212 2456 Sysqemtthqm.exe 99 PID 2456 wrote to memory of 212 2456 Sysqemtthqm.exe 99 PID 212 wrote to memory of 3732 212 Sysqemhgatl.exe 100 PID 212 wrote to memory of 3732 212 Sysqemhgatl.exe 100 PID 212 wrote to memory of 3732 212 Sysqemhgatl.exe 100 PID 3732 wrote to memory of 460 3732 Sysqemrubwn.exe 101 PID 3732 wrote to memory of 460 3732 Sysqemrubwn.exe 101 PID 3732 wrote to memory of 460 3732 Sysqemrubwn.exe 101 PID 460 wrote to memory of 1748 460 Sysqembnbzf.exe 102 PID 460 wrote to memory of 1748 460 Sysqembnbzf.exe 102 PID 460 wrote to memory of 1748 460 Sysqembnbzf.exe 102 PID 1748 wrote to memory of 3292 1748 Sysqembfdxl.exe 103 PID 1748 wrote to memory of 3292 1748 Sysqembfdxl.exe 103 PID 1748 wrote to memory of 3292 1748 Sysqembfdxl.exe 103 PID 3292 wrote to memory of 4692 3292 Sysqemgouxn.exe 104 PID 3292 wrote to memory of 4692 3292 Sysqemgouxn.exe 104 PID 3292 wrote to memory of 4692 3292 Sysqemgouxn.exe 104 PID 4692 wrote to memory of 4952 4692 Sysqemhshqb.exe 105 PID 4692 wrote to memory of 4952 4692 Sysqemhshqb.exe 105 PID 4692 wrote to memory of 4952 4692 Sysqemhshqb.exe 105 PID 4952 wrote to memory of 1240 4952 Sysqemzskna.exe 106 PID 4952 wrote to memory of 1240 4952 Sysqemzskna.exe 106 PID 4952 wrote to memory of 1240 4952 Sysqemzskna.exe 106 PID 1240 wrote to memory of 2760 1240 Sysqemefeaf.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\0311b7364b1b1eed21aed5042f20d59c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0311b7364b1b1eed21aed5042f20d59c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjdjgv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdjgv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdklo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdklo.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmznwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmznwj.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemravrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemravrs.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzxjed.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxjed.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevomj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevomj.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjihuc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjihuc.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfgpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfgpv.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwnbhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwnbhw.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjttpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjttpw.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmhvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmhvp.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmoylo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmoylo.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtthqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtthqm.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhgatl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhgatl.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrubwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrubwn.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnbzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnbzf.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfdxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfdxl.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgouxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgouxn.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhshqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhshqb.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzskna.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzskna.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefeaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefeaf.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuykba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuykba.exe"23⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrktj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrktj.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotrog.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotrog.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzfrv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzfrv.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:868 -
C:\Users\Admin\AppData\Local\Temp\Sysqembvhpp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvhpp.exe"27⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemomdkz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemomdkz.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrpgim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrpgim.exe"29⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqaosm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqaosm.exe"30⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyboyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyboyn.exe"31⤵
- Executes dropped EXE
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfzqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfzqq.exe"32⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhqea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhqea.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvrihk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrihk.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrtej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrtej.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgftpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgftpg.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjuafh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjuafh.exe"38⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmldg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmldg.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqnjdb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqnjdb.exe"40⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygsbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygsbv.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdabgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdabgf.exe"43⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhorc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhorc.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbmsx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbmsx.exe"45⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsnifv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnifv.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlfwkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlfwkg.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuynq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuynq.exe"48⤵
- Executes dropped EXE
- Modifies registry class
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgpadj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpadj.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdcgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdcgt.exe"50⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvuyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvuyd.exe"51⤵
- Executes dropped EXE
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrtjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrtjz.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemadzoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemadzoc.exe"53⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfwrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfwrm.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgmjcq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgmjcq.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihnkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihnkx.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemssmad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssmad.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyqjqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyqjqj.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptxal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptxal.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvcdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvcdc.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemspkod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspkod.exe"61⤵
- Executes dropped EXE
- Modifies registry class
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyqzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyqzg.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngera.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngera.exe"63⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgdrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgdrp.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddney.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddney.exe"65⤵
- Executes dropped EXE
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdajrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdajrk.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsirr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsirr.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjdet.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjdet.exe"68⤵
- Checks computer location settings
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Sysqempydxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempydxq.exe"69⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemirsvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemirsvj.exe"70⤵
- Modifies registry class
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsftyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsftyt.exe"71⤵
- Modifies registry class
PID:376 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnmgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnmgg.exe"72⤵
- Checks computer location settings
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkbuws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbuws.exe"73⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsmcgb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsmcgb.exe"74⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdqeec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqeec.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhgcek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhgcek.exe"76⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfpumx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpumx.exe"77⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsunux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsunux.exe"78⤵
- Checks computer location settings
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxdwvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdwvz.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfltaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfltaf.exe"80⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\Sysqemccdas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccdas.exe"81⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\Sysqemscxbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscxbt.exe"82⤵
- Checks computer location settings
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhwtor.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwtor.exe"83⤵
- Modifies registry class
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsgjtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgjtw.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhlszu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhlszu.exe"85⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"86⤵
- Modifies registry class
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunahd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunahd.exe"87⤵
- Modifies registry class
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfunkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfunkh.exe"88⤵
- Modifies registry class
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuglpk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuglpk.exe"89⤵
- Checks computer location settings
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchtvl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchtvl.exe"90⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmjjtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjjtj.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbdoh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbdoh.exe"92⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsefla.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsefla.exe"93⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"94⤵
- Modifies registry class
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnojmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnojmd.exe"95⤵
- Modifies registry class
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"96⤵
- Checks computer location settings
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjyai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjyai.exe"97⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxzknb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxzknb.exe"98⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsqmiy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqmiy.exe"99⤵
- Checks computer location settings
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutcgx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutcgx.exe"100⤵
- Modifies registry class
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbxyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbxyx.exe"101⤵
- Checks computer location settings
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxwptx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwptx.exe"102⤵
- Checks computer location settings
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzgrw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzgrw.exe"103⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrviuf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrviuf.exe"104⤵
- Modifies registry class
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkclmo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkclmo.exe"105⤵
- Checks computer location settings
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdffx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdffx.exe"106⤵
- Modifies registry class
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemetlfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemetlfe.exe"107⤵
- Checks computer location settings
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgcvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgcvr.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvjls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvjls.exe"109⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwtzgv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtzgv.exe"110⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\Sysqemopzyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopzyr.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptlrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptlrf.exe"112⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkhchs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhchs.exe"113⤵
- Checks computer location settings
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcgfer.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcgfer.exe"114⤵
- Modifies registry class
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuvul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuvul.exe"115⤵
- Checks computer location settings
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmuinm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmuinm.exe"116⤵
- Modifies registry class
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzrak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzrak.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrijax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrijax.exe"118⤵
- Modifies registry class
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemencif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemencif.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"120⤵
- Checks computer location settings
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvqod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvqod.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhdgz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhdgz.exe"122⤵
- Modifies registry class
PID:1788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-