Analysis
-
max time kernel
65s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 01:13
Behavioral task
behavioral1
Sample
69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe
-
Size
114KB
-
MD5
69b3d62688020331acb3aded5d444ee0
-
SHA1
fdac8ee21ebc0e437be7830ed5e837acda096edc
-
SHA256
83b34ad7d9eddf93b67cba2f9dd9bbbd8b0442cebf895b3dbbfb64c0a075dd03
-
SHA512
12e05cceb2dfb5d59b4169c5ac55196cc36627ad3bfeeb62e772a58ae400d6d40275c24d2d3a9164bdc26db5b9a8d773db97d7710baecfd8d4a83a7cf4977970
-
SSDEEP
1536:+YjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nU:LdEUfKj8BYbDiC1ZTK7sxtLUIGB
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2864 Sysqembtdwt.exe 2236 Sysqemjxnjk.exe 2688 Sysqemabbue.exe 2468 Sysqemspazp.exe 1936 Sysqemxqiuf.exe 1656 Sysqemksocr.exe 1752 Sysqemhtgpm.exe 1908 Sysqemrpzhc.exe 1496 Sysqembolfn.exe 2292 Sysqemjhkkk.exe 1624 Sysqemoisfa.exe 108 Sysqemdcpac.exe 2152 Sysqemagksi.exe 2060 Sysqemvjopg.exe 2144 Sysqemakxkx.exe 2808 Sysqemkrjih.exe 2608 Sysqemohgcd.exe 1684 Sysqemgweio.exe 1728 Sysqemliyph.exe 1788 Sysqemdtlih.exe 2908 Sysqemibidd.exe 336 Sysqemxvfpm.exe 2604 Sysqemdenkd.exe 1216 Sysqemvsmqn.exe 2472 Sysqemuhjvf.exe 1768 Sysqemkejvr.exe 3056 Sysqemmojtj.exe 1984 Sysqemceusq.exe 2568 Sysqemtluqn.exe 1908 Sysqemlwhiu.exe 2252 Sysqemqqpit.exe 2228 Sysqemixrvy.exe 1560 Sysqemipaos.exe 2976 Sysqemaaggs.exe 1048 Sysqemzwsdx.exe 2232 Sysqemjsria.exe 2144 Sysqemjlrbc.exe 1936 Sysqembzqge.exe 1600 Sysqemlvrqu.exe 1820 Sysqemboodd.exe 2728 Sysqemgpwgm.exe 1760 Sysqemxpyqz.exe 1960 Sysqemcurys.exe 1740 Sysqemuiqed.exe 2496 Sysqemcnsrm.exe 2864 Sysqemxpwos.exe 2152 Sysqemzokeq.exe 3044 Sysqemumdol.exe 2444 Sysqemtipmi.exe 308 Sysqeminxmv.exe 2412 Sysqemdicbv.exe 2452 Sysqemvtquv.exe 920 Sysqemupczz.exe 2364 Sysqemmdtwc.exe 2980 Sysqemrmjzs.exe 2952 Sysqemkxora.exe 1732 Sysqemmkruv.exe 2232 Sysqemevfmd.exe 2836 Sysqemlolrs.exe 2164 Sysqemdzrja.exe 2912 Sysqemlhmkm.exe 1820 Sysqemasjxw.exe 2900 Sysqemckauo.exe 1064 Sysqemngbfd.exe -
Loads dropped DLL 64 IoCs
pid Process 2052 69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe 2052 69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe 2864 Sysqembtdwt.exe 2864 Sysqembtdwt.exe 2236 Sysqemjxnjk.exe 2236 Sysqemjxnjk.exe 2688 Sysqemabbue.exe 2688 Sysqemabbue.exe 2468 Sysqemspazp.exe 2468 Sysqemspazp.exe 1936 Sysqemxqiuf.exe 1936 Sysqemxqiuf.exe 1656 Sysqemksocr.exe 1656 Sysqemksocr.exe 1752 Sysqemhtgpm.exe 1752 Sysqemhtgpm.exe 1908 Sysqemrpzhc.exe 1908 Sysqemrpzhc.exe 1496 Sysqembolfn.exe 1496 Sysqembolfn.exe 2292 Sysqemjhkkk.exe 2292 Sysqemjhkkk.exe 1624 Sysqemoisfa.exe 1624 Sysqemoisfa.exe 108 Sysqemdcpac.exe 108 Sysqemdcpac.exe 2152 Sysqemagksi.exe 2152 Sysqemagksi.exe 2060 Sysqemvjopg.exe 2060 Sysqemvjopg.exe 2144 Sysqemakxkx.exe 2144 Sysqemakxkx.exe 2808 Sysqemkrjih.exe 2808 Sysqemkrjih.exe 2608 Sysqemohgcd.exe 2608 Sysqemohgcd.exe 1684 Sysqemgweio.exe 1684 Sysqemgweio.exe 1728 Sysqemliyph.exe 1728 Sysqemliyph.exe 1788 Sysqemdtlih.exe 1788 Sysqemdtlih.exe 2908 Sysqemibidd.exe 2908 Sysqemibidd.exe 336 Sysqemxvfpm.exe 336 Sysqemxvfpm.exe 2604 Sysqemdenkd.exe 2604 Sysqemdenkd.exe 1216 Sysqemvsmqn.exe 1216 Sysqemvsmqn.exe 2472 Sysqemuhjvf.exe 2472 Sysqemuhjvf.exe 1768 Sysqemkejvr.exe 1768 Sysqemkejvr.exe 3056 Sysqemmojtj.exe 3056 Sysqemmojtj.exe 1984 Sysqemceusq.exe 1984 Sysqemceusq.exe 2568 Sysqemtluqn.exe 2568 Sysqemtluqn.exe 1908 Sysqemlwhiu.exe 1908 Sysqemlwhiu.exe 2252 Sysqemqqpit.exe 2252 Sysqemqqpit.exe -
resource yara_rule behavioral1/memory/2052-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0007000000014b9f-7.dat upx behavioral1/memory/2864-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0008000000014b54-22.dat upx behavioral1/files/0x0007000000014bed-24.dat upx behavioral1/memory/2236-31-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0007000000014c65-38.dat upx behavioral1/memory/2688-51-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0007000000014fa6-53.dat upx behavioral1/memory/2468-65-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x000900000001488c-67.dat upx behavioral1/memory/2052-74-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1936-77-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0009000000015539-84.dat upx behavioral1/memory/2864-91-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1656-99-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2236-98-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0008000000015d30-101.dat upx behavioral1/memory/2688-107-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0007000000015d47-118.dat upx behavioral1/memory/1752-125-0x0000000003540000-0x00000000035D1000-memory.dmp upx behavioral1/memory/2468-132-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0006000000015d5f-141.dat upx behavioral1/memory/1496-142-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0006000000015d7f-150.dat upx behavioral1/memory/1936-157-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1496-156-0x0000000003430000-0x00000000034C1000-memory.dmp upx behavioral1/files/0x0006000000015d87-168.dat upx behavioral1/memory/1624-179-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/files/0x0006000000015d8f-183.dat upx behavioral1/memory/108-193-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1752-192-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2152-208-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1908-207-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2060-219-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1496-218-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2144-228-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1624-239-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2292-238-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2808-243-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2608-254-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/108-261-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1728-275-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1788-288-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2060-285-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2144-295-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2908-296-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/336-309-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2808-308-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2604-325-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2608-321-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1216-338-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2472-348-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1768-362-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1684-361-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2908-379-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3056-376-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1788-375-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/3056-388-0x0000000003490000-0x0000000003521000-memory.dmp upx behavioral1/memory/2568-401-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/336-408-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1908-416-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2252-429-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2164-927-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkxora.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuqyrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzbydk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemoymfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemeqyni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfwnfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvmlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjhkkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvsmqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlcnso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwwbag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdmlpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtcrvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvjopg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemibidd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcnsrm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemijthv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemslvmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgkfrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkshjw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemsavrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxvfpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlwhiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlvrqu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtipmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemalbpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkrjih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtkjcn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemyetaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemngmmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmdtwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzokeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempjwaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlgciw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtqhyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgknct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemposvm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdzrja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemecziz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemctnum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrigjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdicbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembguay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhonaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembzqge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzvaca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrfvga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtmpdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjbltp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemboodd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemiyjeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzrbdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwpide.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhlyad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemittuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmkruv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemautnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtvtxe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuxtnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzehme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgbqct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemsvyyo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemixrvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjsria.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2864 2052 69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2864 2052 69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2864 2052 69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2864 2052 69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe 28 PID 2864 wrote to memory of 2236 2864 Sysqembtdwt.exe 29 PID 2864 wrote to memory of 2236 2864 Sysqembtdwt.exe 29 PID 2864 wrote to memory of 2236 2864 Sysqembtdwt.exe 29 PID 2864 wrote to memory of 2236 2864 Sysqembtdwt.exe 29 PID 2236 wrote to memory of 2688 2236 Sysqemjxnjk.exe 30 PID 2236 wrote to memory of 2688 2236 Sysqemjxnjk.exe 30 PID 2236 wrote to memory of 2688 2236 Sysqemjxnjk.exe 30 PID 2236 wrote to memory of 2688 2236 Sysqemjxnjk.exe 30 PID 2688 wrote to memory of 2468 2688 Sysqemabbue.exe 31 PID 2688 wrote to memory of 2468 2688 Sysqemabbue.exe 31 PID 2688 wrote to memory of 2468 2688 Sysqemabbue.exe 31 PID 2688 wrote to memory of 2468 2688 Sysqemabbue.exe 31 PID 2468 wrote to memory of 1936 2468 Sysqemspazp.exe 32 PID 2468 wrote to memory of 1936 2468 Sysqemspazp.exe 32 PID 2468 wrote to memory of 1936 2468 Sysqemspazp.exe 32 PID 2468 wrote to memory of 1936 2468 Sysqemspazp.exe 32 PID 1936 wrote to memory of 1656 1936 Sysqemxqiuf.exe 33 PID 1936 wrote to memory of 1656 1936 Sysqemxqiuf.exe 33 PID 1936 wrote to memory of 1656 1936 Sysqemxqiuf.exe 33 PID 1936 wrote to memory of 1656 1936 Sysqemxqiuf.exe 33 PID 1656 wrote to memory of 1752 1656 Sysqemksocr.exe 34 PID 1656 wrote to memory of 1752 1656 Sysqemksocr.exe 34 PID 1656 wrote to memory of 1752 1656 Sysqemksocr.exe 34 PID 1656 wrote to memory of 1752 1656 Sysqemksocr.exe 34 PID 1752 wrote to memory of 1908 1752 Sysqemhtgpm.exe 35 PID 1752 wrote to memory of 1908 1752 Sysqemhtgpm.exe 35 PID 1752 wrote to memory of 1908 1752 Sysqemhtgpm.exe 35 PID 1752 wrote to memory of 1908 1752 Sysqemhtgpm.exe 35 PID 1908 wrote to memory of 1496 1908 Sysqemrpzhc.exe 36 PID 1908 wrote to memory of 1496 1908 Sysqemrpzhc.exe 36 PID 1908 wrote to memory of 1496 1908 Sysqemrpzhc.exe 36 PID 1908 wrote to memory of 1496 1908 Sysqemrpzhc.exe 36 PID 1496 wrote to memory of 2292 1496 Sysqembolfn.exe 37 PID 1496 wrote to memory of 2292 1496 Sysqembolfn.exe 37 PID 1496 wrote to memory of 2292 1496 Sysqembolfn.exe 37 PID 1496 wrote to memory of 2292 1496 Sysqembolfn.exe 37 PID 2292 wrote to memory of 1624 2292 Sysqemjhkkk.exe 38 PID 2292 wrote to memory of 1624 2292 Sysqemjhkkk.exe 38 PID 2292 wrote to memory of 1624 2292 Sysqemjhkkk.exe 38 PID 2292 wrote to memory of 1624 2292 Sysqemjhkkk.exe 38 PID 1624 wrote to memory of 108 1624 Sysqemoisfa.exe 39 PID 1624 wrote to memory of 108 1624 Sysqemoisfa.exe 39 PID 1624 wrote to memory of 108 1624 Sysqemoisfa.exe 39 PID 1624 wrote to memory of 108 1624 Sysqemoisfa.exe 39 PID 108 wrote to memory of 2152 108 Sysqemdcpac.exe 40 PID 108 wrote to memory of 2152 108 Sysqemdcpac.exe 40 PID 108 wrote to memory of 2152 108 Sysqemdcpac.exe 40 PID 108 wrote to memory of 2152 108 Sysqemdcpac.exe 40 PID 2152 wrote to memory of 2060 2152 Sysqemagksi.exe 41 PID 2152 wrote to memory of 2060 2152 Sysqemagksi.exe 41 PID 2152 wrote to memory of 2060 2152 Sysqemagksi.exe 41 PID 2152 wrote to memory of 2060 2152 Sysqemagksi.exe 41 PID 2060 wrote to memory of 2144 2060 Sysqemvjopg.exe 64 PID 2060 wrote to memory of 2144 2060 Sysqemvjopg.exe 64 PID 2060 wrote to memory of 2144 2060 Sysqemvjopg.exe 64 PID 2060 wrote to memory of 2144 2060 Sysqemvjopg.exe 64 PID 2144 wrote to memory of 2808 2144 Sysqemakxkx.exe 43 PID 2144 wrote to memory of 2808 2144 Sysqemakxkx.exe 43 PID 2144 wrote to memory of 2808 2144 Sysqemakxkx.exe 43 PID 2144 wrote to memory of 2808 2144 Sysqemakxkx.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69b3d62688020331acb3aded5d444ee0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtdwt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtdwt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxnjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxnjk.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemabbue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabbue.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemspazp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspazp.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxqiuf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqiuf.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemksocr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksocr.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtgpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtgpm.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrpzhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrpzhc.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqembolfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembolfn.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhkkk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhkkk.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoisfa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoisfa.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcpac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcpac.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemagksi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagksi.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjopg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjopg.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakxkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakxkx.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrjih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrjih.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohgcd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohgcd.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgweio.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgweio.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemliyph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemliyph.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtlih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtlih.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemibidd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemibidd.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxvfpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxvfpm.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdenkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdenkd.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvsmqn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvsmqn.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuhjvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhjvf.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkejvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkejvr.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmojtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmojtj.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemceusq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemceusq.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtluqn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtluqn.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwhiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwhiu.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqqpit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqpit.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixrvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixrvy.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemipaos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemipaos.exe"34⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaaggs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaaggs.exe"35⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzwsdx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwsdx.exe"36⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjsria.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjsria.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjlrbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjlrbc.exe"38⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzqge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzqge.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvrqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvrqu.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemboodd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemboodd.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgpwgm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpwgm.exe"42⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxpyqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxpyqz.exe"43⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcurys.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcurys.exe"44⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuiqed.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuiqed.exe"45⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcnsrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnsrm.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxpwos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxpwos.exe"47⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzokeq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzokeq.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemumdol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumdol.exe"49⤵
- Executes dropped EXE
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtipmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtipmi.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Sysqeminxmv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqeminxmv.exe"51⤵
- Executes dropped EXE
PID:308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdicbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdicbv.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvtquv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvtquv.exe"53⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemupczz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupczz.exe"54⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmdtwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdtwc.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrmjzs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmjzs.exe"56⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxora.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxora.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmkruv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkruv.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevfmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevfmd.exe"59⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlolrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlolrs.exe"60⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdzrja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdzrja.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhmkm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhmkm.exe"62⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemasjxw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemasjxw.exe"63⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckauo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckauo.exe"64⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngbfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngbfd.exe"65⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemslvmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslvmp.exe"66⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkvifw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvifw.exe"67⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtkjcn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkjcn.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrlhs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrlhs.exe"69⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemecziz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecziz.exe"70⤵
- System Location Discovery: System Language Discovery
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwqpfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqpfc.exe"71⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlnxno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnxno.exe"72⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Sysqembguay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembguay.exe"73⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcnso.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcnso.exe"74⤵
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyetaz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyetaz.exe"75⤵
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizush.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizush.exe"76⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Sysqemylrfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemylrfq.exe"77⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcbvam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbvam.exe"78⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxmfp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxmfp.exe"79⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzcfni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcfni.exe"80⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrjisn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrjisn.exe"81⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwwbag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwbag.exe"82⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqyni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqyni.exe"83⤵
- System Location Discovery: System Language Discovery
PID:328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemautnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemautnp.exe"84⤵
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtudsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtudsu.exe"85⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Sysqeminanv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqeminanv.exe"86⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Sysqemayggd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayggd.exe"87⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxcjgk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcjgk.exe"88⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmwgtt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmwgtt.exe"89⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrfonc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfonc.exe"90⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhcono.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhcono.exe"91⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeokjm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeokjm.exe"92⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtlsiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlsiz.exe"93⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemegttg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemegttg.exe"94⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Sysqemspegv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspegv.exe"95⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvzvdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvzvdo.exe"96⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkssqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkssqx.exe"97⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnzhbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzhbn.exe"98⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcvpbz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvpbz.exe"99⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemejreu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejreu.exe"100⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxqujr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqujr.exe"101⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwyrtz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyrtz.exe"102⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoaetz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoaetz.exe"103⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnbfet.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnbfet.exe"104⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgmtea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgmtea.exe"105⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkrmeu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrmeu.exe"106⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxtstf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtstf.exe"107⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcuaov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcuaov.exe"108⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsnxjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnxjf.exe"109⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtmlzd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmlzd.exe"110⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmtnea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtnea.exe"111⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuqyrr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuqyrr.exe"112⤵
- System Location Discovery: System Language Discovery
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyjeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyjeh.exe"113⤵
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqriwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqriwn.exe"114⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgkfrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkfrx.exe"115⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemijthv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijthv.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdilry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdilry.exe"117⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnhqpi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhqpi.exe"118⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemceypv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemceypv.exe"119⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Sysqempcsrd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempcsrd.exe"120⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemctnum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctnum.exe"121⤵
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmhork.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhork.exe"122⤵PID:1972
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-