Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 18:39
Behavioral task
behavioral1
Sample
2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe
-
Size
93KB
-
MD5
2609f9bf3e0525e0872dfcf760c45e20
-
SHA1
b606d00a57f94042751b4971b18afdabf6459790
-
SHA256
69e66c6a08cc6ff9a4d6bd507998549d956b6797156ed4ad0a88c1253bcee6b3
-
SHA512
12af51cdda705a8f45aef9a65074618185fb56162ae06f414cf0b93e5cdedfad0f7f8184944f0333d159f03425c4065779be5d95c4401b6b74d75315d15f7486
-
SSDEEP
1536:mYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nB:jdEUfKj8BYbDiC1ZTK7sxtLUIGi
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2840 Sysqemqfydm.exe 2584 Sysqemfrwiq.exe 1184 Sysqemhqkxv.exe 2136 Sysqemzinvm.exe 2412 Sysqemrsanu.exe 2820 Sysqemdqsad.exe 556 Sysqemvnrfn.exe 2292 Sysqemplhaq.exe 588 Sysqemknlyo.exe 1984 Sysqemjvzyi.exe 2656 Sysqemccbdf.exe 1164 Sysqemexega.exe 2896 Sysqemrrkvu.exe 1760 Sysqemigjly.exe 888 Sysqemkqjjq.exe 2664 Sysqemeadqo.exe 2624 Sysqemulzdy.exe 1080 Sysqemooety.exe 2152 Sysqembikjj.exe 1784 Sysqembxiga.exe 2316 Sysqemtxkyo.exe 488 Sysqemsptri.exe 820 Sysqemkagjq.exe 332 Sysqemnkyzi.exe 2852 Sysqemchgzu.exe 2504 Sysqemztbuk.exe 1532 Sysqemjagrv.exe 2296 Sysqemoqkmr.exe 952 Sysqemjwsoa.exe 2564 Sysqemtvemk.exe 2888 Sysqemduirv.exe 2496 Sysqemaoeet.exe 896 Sysqemqiarc.exe 1772 Sysqemnjkey.exe 1528 Sysqemcuhzi.exe 3036 Sysqemjnoff.exe 2876 Sysqemcnqkc.exe 984 Sysqemeitmx.exe 2740 Sysqemyoaxg.exe 2924 Sysqemydycx.exe 2820 Sysqemqcauk.exe 1088 Sysqemfofao.exe 1424 Sysqemarcxm.exe 2108 Sysqemkqove.exe 2760 Sysqemupssp.exe 2744 Sysqemrqkfl.exe 2544 Sysqemjebkv.exe 2912 Sysqemgnjfm.exe 1944 Sysqemycikw.exe 1768 Sysqemaxknr.exe 2720 Sysqemvzpkp.exe 2064 Sysqempbisv.exe 2796 Sysqemhmwlv.exe 2320 Sysqemmzpso.exe 896 Sysqemhbtqu.exe 2404 Sysqemlvbql.exe 2860 Sysqemecddq.exe 2000 Sysqemtrmvw.exe 1756 Sysqemlolah.exe 1100 Sysqemvjmlo.exe 1532 Sysqemnuzdw.exe 2668 Sysqemvcndi.exe 2956 Sysqemnqlit.exe 1724 Sysqemexlyy.exe -
Loads dropped DLL 64 IoCs
pid Process 1660 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 1660 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 2840 Sysqemqfydm.exe 2840 Sysqemqfydm.exe 2584 Sysqemfrwiq.exe 2584 Sysqemfrwiq.exe 1184 Sysqemhqkxv.exe 1184 Sysqemhqkxv.exe 2136 Sysqemzinvm.exe 2136 Sysqemzinvm.exe 2412 Sysqemrsanu.exe 2412 Sysqemrsanu.exe 2820 Sysqemdqsad.exe 2820 Sysqemdqsad.exe 556 Sysqemvnrfn.exe 556 Sysqemvnrfn.exe 2292 Sysqemplhaq.exe 2292 Sysqemplhaq.exe 588 Sysqemknlyo.exe 588 Sysqemknlyo.exe 1984 Sysqemjvzyi.exe 1984 Sysqemjvzyi.exe 2656 Sysqemccbdf.exe 2656 Sysqemccbdf.exe 1164 Sysqemexega.exe 1164 Sysqemexega.exe 2896 Sysqemrrkvu.exe 2896 Sysqemrrkvu.exe 1760 Sysqemigjly.exe 1760 Sysqemigjly.exe 888 Sysqemkqjjq.exe 888 Sysqemkqjjq.exe 2664 Sysqemeadqo.exe 2664 Sysqemeadqo.exe 2624 Sysqemulzdy.exe 2624 Sysqemulzdy.exe 1080 Sysqemooety.exe 1080 Sysqemooety.exe 2152 Sysqembikjj.exe 2152 Sysqembikjj.exe 1784 Sysqembxiga.exe 1784 Sysqembxiga.exe 2316 Sysqemtxkyo.exe 2316 Sysqemtxkyo.exe 488 Sysqemsptri.exe 488 Sysqemsptri.exe 820 Sysqemkagjq.exe 820 Sysqemkagjq.exe 332 Sysqemnkyzi.exe 332 Sysqemnkyzi.exe 2852 Sysqemchgzu.exe 2852 Sysqemchgzu.exe 2504 Sysqemztbuk.exe 2504 Sysqemztbuk.exe 1532 Sysqemjagrv.exe 1532 Sysqemjagrv.exe 2296 Sysqemoqkmr.exe 2296 Sysqemoqkmr.exe 952 Sysqemjwsoa.exe 952 Sysqemjwsoa.exe 2564 Sysqemtvemk.exe 2564 Sysqemtvemk.exe 2888 Sysqemduirv.exe 2888 Sysqemduirv.exe -
resource yara_rule behavioral1/memory/1660-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0008000000015c52-6.dat upx behavioral1/memory/1660-13-0x00000000035D0000-0x0000000003662000-memory.dmp upx behavioral1/memory/2840-16-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0009000000015616-22.dat upx behavioral1/files/0x0007000000015c6b-26.dat upx behavioral1/files/0x0007000000015c78-37.dat upx behavioral1/memory/1184-49-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0009000000015626-51.dat upx behavioral1/memory/2136-64-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1660-58-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0007000000015c83-66.dat upx behavioral1/memory/2412-75-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2840-73-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x000a000000015c9f-82.dat upx behavioral1/files/0x000b000000015cee-97.dat upx behavioral1/memory/556-106-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2584-104-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0007000000015cf6-115.dat upx behavioral1/files/0x0007000000015cfe-128.dat upx behavioral1/memory/1184-136-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2136-143-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/588-142-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0007000000015d07-147.dat upx behavioral1/memory/1984-158-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0006000000015d0f-161.dat upx behavioral1/memory/2656-173-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0006000000015d1a-176.dat upx behavioral1/files/0x0006000000015d27-193.dat upx behavioral1/memory/2820-201-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2896-208-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/556-207-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2412-198-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1760-219-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2292-218-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/888-228-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2664-242-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/588-238-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2664-249-0x00000000048A0000-0x0000000004932000-memory.dmp upx behavioral1/memory/2624-251-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2656-253-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1080-263-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1164-267-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1784-284-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/888-290-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1784-291-0x00000000036C0000-0x0000000003752000-memory.dmp upx behavioral1/memory/2316-298-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/488-308-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/820-321-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2624-320-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/332-333-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1080-329-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2852-345-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2152-344-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2504-359-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1784-357-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/488-370-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/952-394-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2852-416-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2564-417-0x00000000034E0000-0x0000000003572000-memory.dmp upx behavioral1/memory/2496-431-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2504-430-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1532-451-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1772-454-0x0000000000400000-0x0000000000492000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2840 1660 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2840 1660 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2840 1660 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 28 PID 1660 wrote to memory of 2840 1660 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 28 PID 2840 wrote to memory of 2584 2840 Sysqemqfydm.exe 29 PID 2840 wrote to memory of 2584 2840 Sysqemqfydm.exe 29 PID 2840 wrote to memory of 2584 2840 Sysqemqfydm.exe 29 PID 2840 wrote to memory of 2584 2840 Sysqemqfydm.exe 29 PID 2584 wrote to memory of 1184 2584 Sysqemfrwiq.exe 30 PID 2584 wrote to memory of 1184 2584 Sysqemfrwiq.exe 30 PID 2584 wrote to memory of 1184 2584 Sysqemfrwiq.exe 30 PID 2584 wrote to memory of 1184 2584 Sysqemfrwiq.exe 30 PID 1184 wrote to memory of 2136 1184 Sysqemhqkxv.exe 31 PID 1184 wrote to memory of 2136 1184 Sysqemhqkxv.exe 31 PID 1184 wrote to memory of 2136 1184 Sysqemhqkxv.exe 31 PID 1184 wrote to memory of 2136 1184 Sysqemhqkxv.exe 31 PID 2136 wrote to memory of 2412 2136 Sysqemzinvm.exe 32 PID 2136 wrote to memory of 2412 2136 Sysqemzinvm.exe 32 PID 2136 wrote to memory of 2412 2136 Sysqemzinvm.exe 32 PID 2136 wrote to memory of 2412 2136 Sysqemzinvm.exe 32 PID 2412 wrote to memory of 2820 2412 Sysqemrsanu.exe 33 PID 2412 wrote to memory of 2820 2412 Sysqemrsanu.exe 33 PID 2412 wrote to memory of 2820 2412 Sysqemrsanu.exe 33 PID 2412 wrote to memory of 2820 2412 Sysqemrsanu.exe 33 PID 2820 wrote to memory of 556 2820 Sysqemdqsad.exe 34 PID 2820 wrote to memory of 556 2820 Sysqemdqsad.exe 34 PID 2820 wrote to memory of 556 2820 Sysqemdqsad.exe 34 PID 2820 wrote to memory of 556 2820 Sysqemdqsad.exe 34 PID 556 wrote to memory of 2292 556 Sysqemvnrfn.exe 35 PID 556 wrote to memory of 2292 556 Sysqemvnrfn.exe 35 PID 556 wrote to memory of 2292 556 Sysqemvnrfn.exe 35 PID 556 wrote to memory of 2292 556 Sysqemvnrfn.exe 35 PID 2292 wrote to memory of 588 2292 Sysqemplhaq.exe 36 PID 2292 wrote to memory of 588 2292 Sysqemplhaq.exe 36 PID 2292 wrote to memory of 588 2292 Sysqemplhaq.exe 36 PID 2292 wrote to memory of 588 2292 Sysqemplhaq.exe 36 PID 588 wrote to memory of 1984 588 Sysqemknlyo.exe 37 PID 588 wrote to memory of 1984 588 Sysqemknlyo.exe 37 PID 588 wrote to memory of 1984 588 Sysqemknlyo.exe 37 PID 588 wrote to memory of 1984 588 Sysqemknlyo.exe 37 PID 1984 wrote to memory of 2656 1984 Sysqemjvzyi.exe 38 PID 1984 wrote to memory of 2656 1984 Sysqemjvzyi.exe 38 PID 1984 wrote to memory of 2656 1984 Sysqemjvzyi.exe 38 PID 1984 wrote to memory of 2656 1984 Sysqemjvzyi.exe 38 PID 2656 wrote to memory of 1164 2656 Sysqemccbdf.exe 39 PID 2656 wrote to memory of 1164 2656 Sysqemccbdf.exe 39 PID 2656 wrote to memory of 1164 2656 Sysqemccbdf.exe 39 PID 2656 wrote to memory of 1164 2656 Sysqemccbdf.exe 39 PID 1164 wrote to memory of 2896 1164 Sysqemexega.exe 40 PID 1164 wrote to memory of 2896 1164 Sysqemexega.exe 40 PID 1164 wrote to memory of 2896 1164 Sysqemexega.exe 40 PID 1164 wrote to memory of 2896 1164 Sysqemexega.exe 40 PID 2896 wrote to memory of 1760 2896 Sysqemrrkvu.exe 41 PID 2896 wrote to memory of 1760 2896 Sysqemrrkvu.exe 41 PID 2896 wrote to memory of 1760 2896 Sysqemrrkvu.exe 41 PID 2896 wrote to memory of 1760 2896 Sysqemrrkvu.exe 41 PID 1760 wrote to memory of 888 1760 Sysqemigjly.exe 42 PID 1760 wrote to memory of 888 1760 Sysqemigjly.exe 42 PID 1760 wrote to memory of 888 1760 Sysqemigjly.exe 42 PID 1760 wrote to memory of 888 1760 Sysqemigjly.exe 42 PID 888 wrote to memory of 2664 888 Sysqemkqjjq.exe 43 PID 888 wrote to memory of 2664 888 Sysqemkqjjq.exe 43 PID 888 wrote to memory of 2664 888 Sysqemkqjjq.exe 43 PID 888 wrote to memory of 2664 888 Sysqemkqjjq.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqfydm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqfydm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfrwiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrwiq.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhqkxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqkxv.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzinvm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzinvm.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrsanu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrsanu.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqsad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqsad.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvnrfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvnrfn.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemplhaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplhaq.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemknlyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemknlyo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjvzyi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvzyi.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemccbdf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccbdf.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexega.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexega.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrkvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrkvu.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemigjly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemigjly.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkqjjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkqjjq.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeadqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeadqo.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemulzdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemulzdy.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemooety.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemooety.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Sysqembikjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembikjj.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxiga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxiga.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxkyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxkyo.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsptri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsptri.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkagjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkagjq.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkyzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkyzi.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchgzu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchgzu.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztbuk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztbuk.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjagrv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjagrv.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqkmr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqkmr.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwsoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwsoa.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvemk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvemk.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemduirv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemduirv.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaoeet.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaoeet.exe"33⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqiarc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqiarc.exe"34⤵
- Executes dropped EXE
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjkey.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjkey.exe"35⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcuhzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcuhzi.exe"36⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjnoff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnoff.exe"37⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcnqkc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnqkc.exe"38⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeitmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeitmx.exe"39⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyoaxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyoaxg.exe"40⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemydycx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydycx.exe"41⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcauk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcauk.exe"42⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfofao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfofao.exe"43⤵
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemarcxm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemarcxm.exe"44⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkqove.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkqove.exe"45⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemupssp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupssp.exe"46⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrqkfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqkfl.exe"47⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjebkv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjebkv.exe"48⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnjfm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnjfm.exe"49⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycikw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycikw.exe"50⤵
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaxknr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaxknr.exe"51⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvzpkp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvzpkp.exe"52⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Sysqempbisv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbisv.exe"53⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmwlv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmwlv.exe"54⤵
- Executes dropped EXE
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmzpso.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmzpso.exe"55⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbtqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbtqu.exe"56⤵
- Executes dropped EXE
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvbql.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvbql.exe"57⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecddq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecddq.exe"58⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrmvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrmvw.exe"59⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlolah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlolah.exe"60⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjmlo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjmlo.exe"61⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnuzdw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnuzdw.exe"62⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcndi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcndi.exe"63⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnqlit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnqlit.exe"64⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexlyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexlyy.exe"65⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhqqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhqqf.exe"66⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrcdgx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrcdgx.exe"67⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgwath.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgwath.exe"68⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdtzbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtzbi.exe"69⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqvfjt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvfjt.exe"70⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemprroq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprroq.exe"71⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhcfgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhcfgy.exe"72⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmsjtu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsjtu.exe"73⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Sysqemedxtu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedxtu.exe"74⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzycbu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzycbu.exe"75⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjxgze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxgze.exe"76⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Sysqembacjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembacjg.exe"77⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqtzeq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqtzeq.exe"78⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnvjjm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnvjjm.exe"79⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcrrry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrrry.exe"80⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxmwzy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmwzy.exe"81⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmrwzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrwzk.exe"82⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtngmc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtngmc.exe"83⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhiyci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhiyci.exe"84⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlcgkz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcgkz.exe"85⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Sysqemavdxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavdxi.exe"86⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Sysqemytifw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytifw.exe"87⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnqimi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnqimi.exe"88⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkgpnb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkgpnb.exe"89⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemccnsm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccnsm.exe"90⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemepquh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemepquh.exe"91⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwadnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwadnp.exe"92⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdxpka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxpka.exe"93⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqcgno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcgno.exe"94⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvprnh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvprnh.exe"95⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkxlvg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxlvg.exe"96⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnsoxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnsoxb.exe"97⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcazfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcazfi.exe"98⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfkrva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkrva.exe"99⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemovgfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovgfw.exe"100⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzqhyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzqhyd.exe"101⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Sysqemonpyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemonpyq.exe"102⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwszlz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwszlz.exe"103⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlloyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlloyj.exe"104⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Sysqemibvyk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemibvyk.exe"105⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxxdyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxxdyw.exe"106⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuvkyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvkyp.exe"107⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemngxyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngxyx.exe"108⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Sysqempbabs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbabs.exe"109⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmfta.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmfta.exe"110⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemglddz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglddz.exe"111⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\Sysqembkwov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkwov.exe"112⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqlpbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqlpbk.exe"113⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdgyqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgyqq.exe"114⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdyhjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdyhjk.exe"115⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvqjbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqjbx.exe"116⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcritm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcritm.exe"117⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvbwtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbwtl.exe"118⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrgrls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgrls.exe"119⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhzogc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzogc.exe"120⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwllmf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwllmf.exe"121⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Sysqemowzen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowzen.exe"122⤵PID:2704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-