Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 18:39
Behavioral task
behavioral1
Sample
2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe
-
Size
93KB
-
MD5
2609f9bf3e0525e0872dfcf760c45e20
-
SHA1
b606d00a57f94042751b4971b18afdabf6459790
-
SHA256
69e66c6a08cc6ff9a4d6bd507998549d956b6797156ed4ad0a88c1253bcee6b3
-
SHA512
12af51cdda705a8f45aef9a65074618185fb56162ae06f414cf0b93e5cdedfad0f7f8184944f0333d159f03425c4065779be5d95c4401b6b74d75315d15f7486
-
SSDEEP
1536:mYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nB:jdEUfKj8BYbDiC1ZTK7sxtLUIGi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemeavgb.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemtvkno.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemtdode.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemkodpi.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemwlcvp.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemrrujp.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemhueum.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemkwvcz.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemxcyld.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemxcboc.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemzmnqw.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemjsylu.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemepnos.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemzrdko.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemwyhho.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqempjwyd.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemotcpk.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemokjtj.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemanokr.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemhanrr.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemejdon.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemscrnd.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemarkbt.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemjimyw.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemrxoqj.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemsixms.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemdxhif.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemtucxr.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemuzlew.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemwdtwp.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemteexe.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemohtxt.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemfkahc.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqeminqjr.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemomwag.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemeurfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemqvyyc.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemnhzic.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemscdxr.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemjwvbo.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemlevqu.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemvuuxl.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemuepno.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqempaegm.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqembszlf.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemwomsn.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemmtugi.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemrlwkq.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemmxrxk.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemscfkm.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemnrkyv.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemffkmk.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemsitmx.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemacdcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemplblj.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemzazub.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemakoyv.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemqtkwj.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemhzwav.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemrexlo.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemoydwe.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemlubgl.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemtarcu.exe Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Sysqemsotas.exe -
Executes dropped EXE 64 IoCs
pid Process 1544 Sysqemtucxr.exe 2632 Sysqemomwag.exe 2900 Sysqemrlwkq.exe 4924 Sysqemchpdy.exe 3376 Sysqemeurfb.exe 2316 Sysqempjwyd.exe 4848 Sysqemrwzay.exe 220 Sysqembszlf.exe 3352 Sysqemjsylu.exe 4680 Sysqemuzlew.exe 852 Sysqemzphys.exe 392 Sysqemjhxwx.exe 4380 Sysqemjwvbo.exe 4904 Sysqemoydwe.exe 1472 Sysqemtdams.exe 1408 Sysqemzfqha.exe 1596 Sysqemhueum.exe 1864 Sysqempvdut.exe 4400 Sysqemjmexq.exe 3224 Sysqemlzhal.exe 4468 Sysqemwomsn.exe 1700 Sysqemeswxe.exe 3248 Sysqembertv.exe 3188 Sysqemlevqu.exe 4068 Sysqemokjtj.exe 4860 Sysqemzrnll.exe 4352 Sysqemeavgb.exe 2952 Sysqemmtugi.exe 3980 Sysqemrgoob.exe 724 Sysqemwdtwp.exe 1156 Sysqembnbzf.exe 716 Sysqemmxrxk.exe 3348 Sysqemteexe.exe 2316 Sysqemexuuj.exe 2212 Sysqemjgcpz.exe 1060 Sysqemrcmcj.exe 1840 Sysqemohtxt.exe 4284 Sysqemeqgqc.exe 4228 Sysqemqvyyc.exe 4040 Sysqemeucgw.exe 380 Sysqemlubgl.exe 4276 Sysqemrvjbt.exe 3348 Sysqemlnleq.exe 4624 Sysqemejdon.exe 988 Sysqemqovxn.exe 3436 Sysqemtvkno.exe 1560 Sysqemlvwkn.exe 3388 Sysqemrtrah.exe 1004 Sysqemyezlp.exe 3552 Sysqemrxoqj.exe 4408 Sysqemddgrj.exe 540 Sysqemgnzum.exe 1804 Sysqemtarcu.exe 1312 Sysqemaiohs.exe 1892 Sysqemyqyhn.exe 2552 Sysqemibxxm.exe 1156 Sysqemlebik.exe 1988 Sysqemworyr.exe 4452 Sysqemoocwq.exe 1248 Sysqemjclmd.exe 1736 Sysqemlpxcj.exe 968 Sysqemsixms.exe 2204 Sysqemotcpk.exe 4812 Sysqemscfkm.exe -
resource yara_rule behavioral2/memory/4344-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023ba7-6.dat upx behavioral2/memory/1544-37-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023ba6-42.dat upx behavioral2/files/0x000a000000023ba8-72.dat upx behavioral2/files/0x000a000000023ba9-107.dat upx behavioral2/files/0x000b000000023ba3-142.dat upx behavioral2/memory/4924-144-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023baa-178.dat upx behavioral2/memory/3376-180-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023bac-214.dat upx behavioral2/files/0x000a000000023bad-249.dat upx behavioral2/memory/4344-279-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023bae-285.dat upx behavioral2/memory/220-291-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1544-316-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000300000002297f-322.dat upx behavioral2/memory/3352-324-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2632-354-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000400000002297e-360.dat upx behavioral2/memory/2900-395-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0014000000023a0d-397.dat upx behavioral2/memory/4924-428-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023baf-434.dat upx behavioral2/memory/392-436-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3376-466-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023bb0-472.dat upx behavioral2/memory/2316-503-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0011000000023a0a-509.dat upx behavioral2/memory/4904-511-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4848-516-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023bb1-546.dat upx behavioral2/memory/220-553-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023bb2-583.dat upx behavioral2/memory/3352-590-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4680-620-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023bb4-622.dat upx behavioral2/memory/1596-624-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/852-654-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0031000000023bb5-660.dat upx behavioral2/memory/392-691-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4400-697-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4380-726-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4904-763-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1472-793-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1408-826-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1596-836-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1864-894-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4400-928-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3224-938-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4468-996-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1700-1037-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3248-1095-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3188-1129-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4068-1163-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3348-1169-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4860-1198-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2316-1204-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4352-1233-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2952-1267-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3980-1278-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/724-1303-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1156-1313-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/716-1338-0x0000000000400000-0x0000000000492000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeurfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyezlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlebik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfrrji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemacdcs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxnxhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzlew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlevqu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzrnll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzazub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwyhho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlpxcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvmym.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuyvyo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwomsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembnbzf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemarkbt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxvrkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnrkyv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmruzf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdchbz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemawnvt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemacazs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscdxr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjmexq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxhif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtdode.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeucgw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubxkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemplblj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmtugi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnxwdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzrdko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztmvg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempjwyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejdon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcpdbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqtkwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemffkmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlcvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjhxwx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzfqha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaiohs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdtwp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeqgqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuwppo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhanrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsitmx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfkahc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemepnos.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtarcu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaqdsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhzic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhueum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvkno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzxwix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscrnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrgtua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtdams.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemokjtj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrcmcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsotas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembszlf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemohtxt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1544 4344 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 85 PID 4344 wrote to memory of 1544 4344 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 85 PID 4344 wrote to memory of 1544 4344 2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe 85 PID 1544 wrote to memory of 2632 1544 Sysqemtucxr.exe 86 PID 1544 wrote to memory of 2632 1544 Sysqemtucxr.exe 86 PID 1544 wrote to memory of 2632 1544 Sysqemtucxr.exe 86 PID 2632 wrote to memory of 2900 2632 Sysqemomwag.exe 89 PID 2632 wrote to memory of 2900 2632 Sysqemomwag.exe 89 PID 2632 wrote to memory of 2900 2632 Sysqemomwag.exe 89 PID 2900 wrote to memory of 4924 2900 Sysqemrlwkq.exe 91 PID 2900 wrote to memory of 4924 2900 Sysqemrlwkq.exe 91 PID 2900 wrote to memory of 4924 2900 Sysqemrlwkq.exe 91 PID 4924 wrote to memory of 3376 4924 Sysqemchpdy.exe 92 PID 4924 wrote to memory of 3376 4924 Sysqemchpdy.exe 92 PID 4924 wrote to memory of 3376 4924 Sysqemchpdy.exe 92 PID 3376 wrote to memory of 2316 3376 Sysqemeurfb.exe 93 PID 3376 wrote to memory of 2316 3376 Sysqemeurfb.exe 93 PID 3376 wrote to memory of 2316 3376 Sysqemeurfb.exe 93 PID 2316 wrote to memory of 4848 2316 Sysqempjwyd.exe 94 PID 2316 wrote to memory of 4848 2316 Sysqempjwyd.exe 94 PID 2316 wrote to memory of 4848 2316 Sysqempjwyd.exe 94 PID 4848 wrote to memory of 220 4848 Sysqemrwzay.exe 95 PID 4848 wrote to memory of 220 4848 Sysqemrwzay.exe 95 PID 4848 wrote to memory of 220 4848 Sysqemrwzay.exe 95 PID 220 wrote to memory of 3352 220 Sysqembszlf.exe 96 PID 220 wrote to memory of 3352 220 Sysqembszlf.exe 96 PID 220 wrote to memory of 3352 220 Sysqembszlf.exe 96 PID 3352 wrote to memory of 4680 3352 Sysqemjsylu.exe 97 PID 3352 wrote to memory of 4680 3352 Sysqemjsylu.exe 97 PID 3352 wrote to memory of 4680 3352 Sysqemjsylu.exe 97 PID 4680 wrote to memory of 852 4680 Sysqemuzlew.exe 98 PID 4680 wrote to memory of 852 4680 Sysqemuzlew.exe 98 PID 4680 wrote to memory of 852 4680 Sysqemuzlew.exe 98 PID 852 wrote to memory of 392 852 Sysqemzphys.exe 99 PID 852 wrote to memory of 392 852 Sysqemzphys.exe 99 PID 852 wrote to memory of 392 852 Sysqemzphys.exe 99 PID 392 wrote to memory of 4380 392 Sysqemjhxwx.exe 102 PID 392 wrote to memory of 4380 392 Sysqemjhxwx.exe 102 PID 392 wrote to memory of 4380 392 Sysqemjhxwx.exe 102 PID 4380 wrote to memory of 4904 4380 Sysqemjwvbo.exe 103 PID 4380 wrote to memory of 4904 4380 Sysqemjwvbo.exe 103 PID 4380 wrote to memory of 4904 4380 Sysqemjwvbo.exe 103 PID 4904 wrote to memory of 1472 4904 Sysqemoydwe.exe 104 PID 4904 wrote to memory of 1472 4904 Sysqemoydwe.exe 104 PID 4904 wrote to memory of 1472 4904 Sysqemoydwe.exe 104 PID 1472 wrote to memory of 1408 1472 Sysqemtdams.exe 107 PID 1472 wrote to memory of 1408 1472 Sysqemtdams.exe 107 PID 1472 wrote to memory of 1408 1472 Sysqemtdams.exe 107 PID 1408 wrote to memory of 1596 1408 Sysqemzfqha.exe 108 PID 1408 wrote to memory of 1596 1408 Sysqemzfqha.exe 108 PID 1408 wrote to memory of 1596 1408 Sysqemzfqha.exe 108 PID 1596 wrote to memory of 1864 1596 Sysqemhueum.exe 109 PID 1596 wrote to memory of 1864 1596 Sysqemhueum.exe 109 PID 1596 wrote to memory of 1864 1596 Sysqemhueum.exe 109 PID 1864 wrote to memory of 4400 1864 Sysqempvdut.exe 110 PID 1864 wrote to memory of 4400 1864 Sysqempvdut.exe 110 PID 1864 wrote to memory of 4400 1864 Sysqempvdut.exe 110 PID 4400 wrote to memory of 3224 4400 Sysqemjmexq.exe 111 PID 4400 wrote to memory of 3224 4400 Sysqemjmexq.exe 111 PID 4400 wrote to memory of 3224 4400 Sysqemjmexq.exe 111 PID 3224 wrote to memory of 4468 3224 Sysqemlzhal.exe 112 PID 3224 wrote to memory of 4468 3224 Sysqemlzhal.exe 112 PID 3224 wrote to memory of 4468 3224 Sysqemlzhal.exe 112 PID 4468 wrote to memory of 1700 4468 Sysqemwomsn.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2609f9bf3e0525e0872dfcf760c45e20_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtucxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtucxr.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemomwag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemomwag.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlwkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlwkq.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchpdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchpdy.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeurfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeurfb.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\Sysqempjwyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjwyd.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwzay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwzay.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Sysqembszlf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembszlf.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjsylu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjsylu.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzlew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzlew.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzphys.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzphys.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhxwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhxwx.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwvbo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwvbo.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoydwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoydwe.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtdams.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtdams.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzfqha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzfqha.exe"17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhueum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhueum.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqempvdut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempvdut.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmexq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmexq.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzhal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzhal.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwomsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwomsn.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeswxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeswxe.exe"23⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Sysqembertv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembertv.exe"24⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlevqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlevqu.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokjtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokjtj.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrnll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrnll.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeavgb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeavgb.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtugi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtugi.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgoob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgoob.exe"30⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:724 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnbzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnbzf.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmxrxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxrxk.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteexe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteexe.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexuuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexuuj.exe"35⤵
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgcpz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgcpz.exe"36⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrcmcj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrcmcj.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohtxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohtxt.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqgqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqgqc.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvyyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvyyc.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeucgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeucgw.exe"41⤵
- Executes dropped EXE
- Modifies registry class
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlubgl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlubgl.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvjbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvjbt.exe"43⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnleq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnleq.exe"44⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejdon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejdon.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqovxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqovxn.exe"46⤵
- Executes dropped EXE
PID:988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvkno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvkno.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvwkn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvwkn.exe"48⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtrah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtrah.exe"49⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyezlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyezlp.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxoqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxoqj.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddgrj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddgrj.exe"52⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"53⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtarcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtarcu.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaiohs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaiohs.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyqyhn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyqyhn.exe"56⤵
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemibxxm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemibxxm.exe"57⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlebik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlebik.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemworyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemworyr.exe"59⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoocwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoocwq.exe"60⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjclmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjclmd.exe"61⤵
- Executes dropped EXE
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlpxcj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlpxcj.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsixms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsixms.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotcpk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotcpk.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscfkm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscfkm.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxhif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxhif.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscrnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscrnd.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxwdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxwdd.exe"68⤵
- Modifies registry class
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakoyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakoyv.exe"69⤵
- Checks computer location settings
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdchbz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdchbz.exe"70⤵
- Modifies registry class
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqtkwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqtkwj.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuuxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuuxl.exe"72⤵
- Checks computer location settings
PID:812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffkmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffkmk.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtdode.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtdode.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawnvt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawnvt.exe"75⤵
- Modifies registry class
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemipvnb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemipvnb.exe"76⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvnrvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvnrvw.exe"77⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdzzoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdzzoe.exe"78⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfrrji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrrji.exe"79⤵
- Modifies registry class
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsitmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsitmx.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfkahc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkahc.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwvcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwvcz.exe"82⤵
- Checks computer location settings
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxvrkb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxvrkb.exe"83⤵
- Modifies registry class
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqdsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqdsi.exe"84⤵
- Modifies registry class
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhzic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhzic.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:716 -
C:\Users\Admin\AppData\Local\Temp\Sysqeminqjr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqeminqjr.exe"86⤵
- Checks computer location settings
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutirq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutirq.exe"87⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemacazs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacazs.exe"88⤵
- Modifies registry class
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscdxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscdxr.exe"89⤵
- Checks computer location settings
- Modifies registry class
PID:780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacdcs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacdcs.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzwav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzwav.exe"91⤵
- Checks computer location settings
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemanokr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemanokr.exe"92⤵
- Checks computer location settings
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuepno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuepno.exe"93⤵
- Checks computer location settings
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemarkbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemarkbt.exe"94⤵
- Checks computer location settings
- Modifies registry class
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvmym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvmym.exe"95⤵
- Modifies registry class
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\Sysqempaegm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempaegm.exe"96⤵
- Checks computer location settings
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhwpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhwpb.exe"97⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeypky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeypky.exe"98⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsotas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsotas.exe"99⤵
- Checks computer location settings
- Modifies registry class
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\Sysqempxnsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxnsi.exe"100⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxcyld.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcyld.exe"101⤵
- Checks computer location settings
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrkyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrkyv.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxcboc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcboc.exe"103⤵
- Checks computer location settings
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpdbh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpdbh.exe"104⤵
- Modifies registry class
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmruzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmruzf.exe"105⤵
- Modifies registry class
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhuzhf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhuzhf.exe"106⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxnxhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnxhb.exe"107⤵
- Modifies registry class
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwppo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwppo.exe"108⤵
- Modifies registry class
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmnqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmnqw.exe"109⤵
- Checks computer location settings
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmoclb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmoclb.exe"110⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwlcvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlcvp.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemepnos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemepnos.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrujp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrujp.exe"113⤵
- Checks computer location settings
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgtua.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgtua.exe"114⤵
- Modifies registry class
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubxkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubxkg.exe"115⤵
- Modifies registry class
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrdko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrdko.exe"116⤵
- Checks computer location settings
- Modifies registry class
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemplblj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplblj.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuyvyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyvyo.exe"118⤵
- Modifies registry class
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunujr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunujr.exe"119⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhanrr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhanrr.exe"120⤵
- Checks computer location settings
- Modifies registry class
PID:716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefmmj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefmmj.exe"121⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzazub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzazub.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:4400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-