Analysis
-
max time kernel
86s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
eab74a3db155c2b74a32a8bda01fdb1f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab74a3db155c2b74a32a8bda01fdb1f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab74a3db155c2b74a32a8bda01fdb1f_JaffaCakes118.exe
-
Size
113KB
-
MD5
eab74a3db155c2b74a32a8bda01fdb1f
-
SHA1
0fa2ec731c08791fc8297b2cb1e5315ad36f0e5b
-
SHA256
3e0065343293ea2f695f5e2518e63f5a23cb668dfbffe932de9dbbc92e71ceca
-
SHA512
0e6bb34f4ec27e568953553d9aecd286b20896d8673c48cd5188657c54663082d46c1e37bc639a645fb4a7bc9c85552aa982fc9e611321b3b4b98fcec5c5b463
-
SSDEEP
1536:ZGaq93mQy5PV4MSu4M3vfAlA89mWMMF4pzYU2qIUZ6kd+lu:Z5MaVVnLA0WLM0Uvh6kd+lu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemiwmvz.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemrvsab.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemhadtl.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqembtwhr.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemefukf.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemwuzcc.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemshqxa.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemlocvm.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemvjccy.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqembdmlx.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemlxnmz.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemyvqrg.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemnhoxj.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemxwcww.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemzqygd.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemehaub.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemwzovr.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemivgdd.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemppool.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqempofkq.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemsxkxi.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemfopxw.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemcugib.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemtfvbl.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqembmrha.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemaismm.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemmhviw.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemtstge.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemiyxde.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemuuqma.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemsqmiy.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemueolz.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemosgce.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemehllr.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemghcqb.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqempavif.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemfypzc.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemsdyvp.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemefesf.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemstxtq.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemxjdkg.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemmrfaj.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemygowf.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemtunnq.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemgtwtl.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemkobha.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemxdlsi.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemxulmh.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemqdiwh.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemdoswf.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemmihba.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemfplui.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemshkyg.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemavmnm.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemfaqgw.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemtoeqc.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemqvwks.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemxwptx.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemminga.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemzpxem.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemjdtwu.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemnipfr.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemfxbty.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation Sysqemxmtcz.exe -
Executes dropped EXE 64 IoCs
pid Process 4880 Sysqemgtwtl.exe 4260 Sysqemismwv.exe 3296 Sysqemfquch.exe 3860 Sysqemnquhz.exe 3064 Sysqemkobha.exe 2564 Sysqemlocvm.exe 3624 Sysqemiwmvz.exe 2932 Sysqemnjgdt.exe 3268 Sysqemvytqe.exe 5040 Sysqemddddo.exe 4156 Sysqemsdyvp.exe 3404 Sysqemspkod.exe 2600 Sysqemsawoz.exe 3440 Sysqemngfem.exe 3056 Sysqemaismm.exe 2584 Sysqemsxkxi.exe 368 Sysqemprfsy.exe 1472 Sysqemfopxw.exe 3216 Sysqemiuenx.exe 4484 Sysqemcxjdx.exe 1816 Sysqemnhzic.exe 224 Sysqemfdyty.exe 1116 Sysqemausww.exe 3860 Sysqemvpfeo.exe 620 Sysqempkkuo.exe 4212 Sysqemkxsja.exe 2512 Sysqemnawhn.exe 4884 Sysqemxdlsi.exe 3120 Sysqemcmbmq.exe 2712 Sysqemavmnm.exe 1180 Sysqemvjccy.exe 4856 Sysqemnxuvu.exe 1712 Sysqemfaqgw.exe 3096 Sysqemarkbt.exe 224 Sysqemvbpld.exe 2644 Sysqemxmgbk.exe 4552 Sysqemhperi.exe 3476 Sysqemfjamh.exe 3064 Sysqemxjdkg.exe 4752 Sysqemxmpcu.exe 640 Sysqemuglpk.exe 2728 Sysqemugmvw.exe 1260 Sysqemssiqu.exe 1032 Sysqemkphai.exe 1144 Sysqemfgjdg.exe 4432 Sysqemcdidh.exe 804 Sysqemxgngq.exe 2460 Sysqemxulmh.exe 4808 Sysqemmdfmi.exe 2116 Sysqemfoukc.exe 3512 Sysqemxkuuy.exe 5032 Sysqemmhviw.exe 544 Sysqemsqmiy.exe 5040 Sysqemueolz.exe 4788 Sysqemcizdc.exe 2660 Sysqemxwptx.exe 1672 Sysqemminga.exe 4936 Sysqemosgce.exe 4952 Sysqempdsut.exe 384 Sysqemhopam.exe 2872 Sysqemxlqfk.exe 884 Sysqemcugib.exe 2564 Sysqemrvsab.exe 2380 Sysqemmmudr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemghkwq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemavmnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemygowf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgoppw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemarkbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxkuuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemosgce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemovhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlluad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwpffh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembxdwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemokvpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemquxnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcxjdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmxjwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemddddo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemiuenx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmhviw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemeyvwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtoeqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemstxtq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuuqma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemsxkxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvbpld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlhtww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemffust.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxmgbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtkiai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfopxw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemehaub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjswyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxwbqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemssiqu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfoukc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhpwqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemivgdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlnfba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemccqmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempavif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxgngq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemefukf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnxuvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzpoza.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnipfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxqjyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempofkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmrqxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkxsja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgctzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwuzcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgtwtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemugmvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempdsut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrbqaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemoucab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqvwks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnjgdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuglpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwsarl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfxbty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcmypt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkgcfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfjamh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemsqmiy.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfjamh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjaxjv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemokvpu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxijam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvpfeo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemssiqu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxulmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefukf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshqxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshkyg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhzic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygowf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxnmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmrqxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiwmvz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsqmiy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyvwd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgctzq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtoeqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxwcww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlocvm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkxsja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdsut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwuzcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiuenx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemakhyt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmihba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjfqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsawoz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemausww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemccqmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhperi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfoukc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemosgce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhopam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefesf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlcarl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgoppw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvytqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcdidh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxgngq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmudr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnquhz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcxjdx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempkkuo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemehaub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlnfba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfquch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxmgbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemugmvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkiai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfyqhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnasmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnxuvu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkphai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzqygd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxwbqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcmypt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemueolz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemminga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmrfaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrbqaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlhtww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdpndc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 4880 2728 eab74a3db155c2b74a32a8bda01fdb1f_JaffaCakes118.exe 82 PID 2728 wrote to memory of 4880 2728 eab74a3db155c2b74a32a8bda01fdb1f_JaffaCakes118.exe 82 PID 2728 wrote to memory of 4880 2728 eab74a3db155c2b74a32a8bda01fdb1f_JaffaCakes118.exe 82 PID 4880 wrote to memory of 4260 4880 Sysqemgtwtl.exe 83 PID 4880 wrote to memory of 4260 4880 Sysqemgtwtl.exe 83 PID 4880 wrote to memory of 4260 4880 Sysqemgtwtl.exe 83 PID 4260 wrote to memory of 3296 4260 Sysqemismwv.exe 84 PID 4260 wrote to memory of 3296 4260 Sysqemismwv.exe 84 PID 4260 wrote to memory of 3296 4260 Sysqemismwv.exe 84 PID 3296 wrote to memory of 3860 3296 Sysqemfquch.exe 85 PID 3296 wrote to memory of 3860 3296 Sysqemfquch.exe 85 PID 3296 wrote to memory of 3860 3296 Sysqemfquch.exe 85 PID 3860 wrote to memory of 3064 3860 Sysqemnquhz.exe 88 PID 3860 wrote to memory of 3064 3860 Sysqemnquhz.exe 88 PID 3860 wrote to memory of 3064 3860 Sysqemnquhz.exe 88 PID 3064 wrote to memory of 2564 3064 Sysqemkobha.exe 89 PID 3064 wrote to memory of 2564 3064 Sysqemkobha.exe 89 PID 3064 wrote to memory of 2564 3064 Sysqemkobha.exe 89 PID 2564 wrote to memory of 3624 2564 Sysqemlocvm.exe 91 PID 2564 wrote to memory of 3624 2564 Sysqemlocvm.exe 91 PID 2564 wrote to memory of 3624 2564 Sysqemlocvm.exe 91 PID 3624 wrote to memory of 2932 3624 Sysqemiwmvz.exe 93 PID 3624 wrote to memory of 2932 3624 Sysqemiwmvz.exe 93 PID 3624 wrote to memory of 2932 3624 Sysqemiwmvz.exe 93 PID 2932 wrote to memory of 3268 2932 Sysqemnjgdt.exe 94 PID 2932 wrote to memory of 3268 2932 Sysqemnjgdt.exe 94 PID 2932 wrote to memory of 3268 2932 Sysqemnjgdt.exe 94 PID 3268 wrote to memory of 5040 3268 Sysqemvytqe.exe 95 PID 3268 wrote to memory of 5040 3268 Sysqemvytqe.exe 95 PID 3268 wrote to memory of 5040 3268 Sysqemvytqe.exe 95 PID 5040 wrote to memory of 4156 5040 Sysqemddddo.exe 96 PID 5040 wrote to memory of 4156 5040 Sysqemddddo.exe 96 PID 5040 wrote to memory of 4156 5040 Sysqemddddo.exe 96 PID 4156 wrote to memory of 3404 4156 Sysqemsdyvp.exe 97 PID 4156 wrote to memory of 3404 4156 Sysqemsdyvp.exe 97 PID 4156 wrote to memory of 3404 4156 Sysqemsdyvp.exe 97 PID 3404 wrote to memory of 2600 3404 Sysqemspkod.exe 98 PID 3404 wrote to memory of 2600 3404 Sysqemspkod.exe 98 PID 3404 wrote to memory of 2600 3404 Sysqemspkod.exe 98 PID 2600 wrote to memory of 3440 2600 Sysqemsawoz.exe 100 PID 2600 wrote to memory of 3440 2600 Sysqemsawoz.exe 100 PID 2600 wrote to memory of 3440 2600 Sysqemsawoz.exe 100 PID 3440 wrote to memory of 3056 3440 Sysqemngfem.exe 101 PID 3440 wrote to memory of 3056 3440 Sysqemngfem.exe 101 PID 3440 wrote to memory of 3056 3440 Sysqemngfem.exe 101 PID 3056 wrote to memory of 2584 3056 Sysqemaismm.exe 102 PID 3056 wrote to memory of 2584 3056 Sysqemaismm.exe 102 PID 3056 wrote to memory of 2584 3056 Sysqemaismm.exe 102 PID 2584 wrote to memory of 368 2584 Sysqemsxkxi.exe 103 PID 2584 wrote to memory of 368 2584 Sysqemsxkxi.exe 103 PID 2584 wrote to memory of 368 2584 Sysqemsxkxi.exe 103 PID 368 wrote to memory of 1472 368 Sysqemprfsy.exe 104 PID 368 wrote to memory of 1472 368 Sysqemprfsy.exe 104 PID 368 wrote to memory of 1472 368 Sysqemprfsy.exe 104 PID 1472 wrote to memory of 3216 1472 Sysqemfopxw.exe 105 PID 1472 wrote to memory of 3216 1472 Sysqemfopxw.exe 105 PID 1472 wrote to memory of 3216 1472 Sysqemfopxw.exe 105 PID 3216 wrote to memory of 4484 3216 Sysqemiuenx.exe 108 PID 3216 wrote to memory of 4484 3216 Sysqemiuenx.exe 108 PID 3216 wrote to memory of 4484 3216 Sysqemiuenx.exe 108 PID 4484 wrote to memory of 1816 4484 Sysqemcxjdx.exe 109 PID 4484 wrote to memory of 1816 4484 Sysqemcxjdx.exe 109 PID 4484 wrote to memory of 1816 4484 Sysqemcxjdx.exe 109 PID 1816 wrote to memory of 224 1816 Sysqemnhzic.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab74a3db155c2b74a32a8bda01fdb1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab74a3db155c2b74a32a8bda01fdb1f_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemismwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemismwv.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfquch.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfquch.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnquhz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnquhz.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkobha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkobha.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlocvm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlocvm.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwmvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwmvz.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjgdt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjgdt.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvytqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvytqe.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddddo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddddo.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsdyvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdyvp.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemspkod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspkod.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsawoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsawoz.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngfem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngfem.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaismm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaismm.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsxkxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsxkxi.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemprfsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprfsy.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfopxw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfopxw.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiuenx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiuenx.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcxjdx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxjdx.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhzic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhzic.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfdyty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfdyty.exe"23⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemausww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemausww.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvpfeo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvpfeo.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\Sysqempkkuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkkuo.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxsja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxsja.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnawhn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnawhn.exe"28⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxdlsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdlsi.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcmbmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmbmq.exe"30⤵
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemavmnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavmnm.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjccy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjccy.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxuvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxuvu.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfaqgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfaqgw.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemarkbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemarkbt.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbpld.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbpld.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxmgbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmgbk.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"38⤵
- Executes dropped EXE
- Modifies registry class
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfjamh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjamh.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjdkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjdkg.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxmpcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmpcu.exe"41⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuglpk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuglpk.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugmvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugmvw.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemssiqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssiqu.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkphai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkphai.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgjdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgjdg.exe"46⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcdidh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdidh.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxgngq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgngq.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxulmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxulmh.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmdfmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdfmi.exe"50⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfoukc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfoukc.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxkuuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkuuy.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmhviw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhviw.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsqmiy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqmiy.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemueolz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemueolz.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcizdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcizdc.exe"56⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxwptx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwptx.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemminga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemminga.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosgce.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosgce.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdsut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdsut.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhopam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhopam.exe"61⤵
- Executes dropped EXE
- Modifies registry class
PID:384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxlqfk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxlqfk.exe"62⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcugib.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcugib.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvsab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvsab.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmudr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmudr.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhadtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhadtl.exe"66⤵
- Checks computer location settings
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtfvbl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfvbl.exe"67⤵
- Checks computer location settings
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghkwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghkwq.exe"68⤵
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyvwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyvwd.exe"69⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzpoza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpoza.exe"70⤵
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzpxem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpxem.exe"71⤵
- Checks computer location settings
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrfaj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrfaj.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefesf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefesf.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhmnc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhmnc.exe"74⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzqygd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzqygd.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemovhtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovhtb.exe"76⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjaxjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjaxjv.exe"77⤵
- Modifies registry class
PID:264 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdmlx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdmlx.exe"78⤵
- Checks computer location settings
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmhojq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhojq.exe"79⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgctzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgctzq.exe"80⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehaub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehaub.exe"81⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtwhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtwhr.exe"82⤵
- Checks computer location settings
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrbqaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbqaa.exe"83⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwzovr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzovr.exe"84⤵
- Checks computer location settings
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlluad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlluad.exe"85⤵
- System Location Discovery: System Language Discovery
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehllr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehllr.exe"86⤵
- Checks computer location settings
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwsarl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwsarl.exe"87⤵
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmxjwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxjwj.exe"88⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxdwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxdwj.exe"89⤵
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygowf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygowf.exe"90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwpffh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwpffh.exe"91⤵
- System Location Discovery: System Language Discovery
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefukf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefukf.exe"92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjswyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjswyj.exe"93⤵
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtunnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtunnq.exe"94⤵
- Checks computer location settings
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtjvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtjvk.exe"95⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\Sysqemljpws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljpws.exe"96⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlrqje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrqje.exe"97⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjdtwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdtwu.exe"98⤵
- Checks computer location settings
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcarl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcarl.exe"99⤵
- Modifies registry class
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwuzcc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuzcc.exe"100⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoucab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoucab.exe"101⤵
- System Location Discovery: System Language Discovery
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkiai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkiai.exe"102⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiprng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiprng.exe"103⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtoeqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtoeqc.exe"104⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhtww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhtww.exe"105⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtstge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtstge.exe"106⤵
- Checks computer location settings
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmrha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmrha.exe"107⤵
- Checks computer location settings
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokvpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokvpu.exe"108⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvhguf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhguf.exe"109⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqvwks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvwks.exe"110⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvhryw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhryw.exe"111⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdpndc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpndc.exe"112⤵
- Modifies registry class
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyxde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyxde.exe"113⤵
- Checks computer location settings
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdiwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdiwh.exe"114⤵
- Checks computer location settings
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxnmz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxnmz.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgoppw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgoppw.exe"116⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxbhx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxbhx.exe"117⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnipfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnipfr.exe"118⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemivgdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivgdd.exe"119⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghcqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghcqb.exe"120⤵
- Checks computer location settings
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakhyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakhyt.exe"121⤵
- Modifies registry class
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxbty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxbty.exe"122⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-