Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
75s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 08:38
Behavioral task
behavioral1
Sample
NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe
-
Size
318KB
-
MD5
66f7b732d4c776d3ab1ffd8420b18090
-
SHA1
90baf44c74c906fca6e75c05eb2264381c6f6363
-
SHA256
2da683504ddbe613df6a22d6ecc68ed51a13cd2c800cbc79502b933feae46128
-
SHA512
8efa7c23199efb9719820a400c49e935b4ff6dbe81bdf3b5c7f070e0d6d3bc0902d5b190db58f8830cf6bf80cea9ab33fc4ffc14d1343e7dd118fa0e05885adb
-
SSDEEP
6144:2USiZTK40wbaqE7Al8jk2jcbaqE7Al8jk2ja:2UvRK4j1CVc1CVa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemiuxkl.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemzclbn.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemzqjjc.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqembiwnm.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemayjuk.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemhmobj.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemjwrbt.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemyszpa.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemopxfs.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemaexwd.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemkxreo.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemqnohv.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemtamel.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqembiusc.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemxbknc.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemkwpen.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemztbuk.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemeyedg.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemwomar.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemnndmg.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemdrehy.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemiaxic.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemcsvyt.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemtnzjb.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemekoih.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemqtcgj.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemwuukw.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemtoabm.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemdqkdo.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemksjnj.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemwlpzy.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemqzlgf.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemvuuxl.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemorfhj.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemsncta.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqembutps.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemibxxm.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemdexhe.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemoromu.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemglinu.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemobqeh.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemdmioa.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemcnigg.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemzcqfs.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemndrvt.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemecati.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemjgbee.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemoqtfx.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemjbjox.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemfpwkd.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemhlszu.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemjhkar.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemtozmx.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemlcpcy.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemngfem.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemzggdd.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemfxftt.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemjinli.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemcpyxb.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemizcbf.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemcqpds.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqempppbd.exe Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation Sysqemcduro.exe -
Executes dropped EXE 64 IoCs
pid Process 5008 Sysqemibxxm.exe 3596 Sysqemjbjox.exe 4344 Sysqemayjuk.exe 3096 Sysqemqrhuf.exe 4980 Sysqemdqkdo.exe 2928 Sysqemopxfs.exe 3444 Sysqemyandr.exe 452 Sysqemqazbq.exe 4900 Sysqemvbibs.exe 2288 Sysqemdrehy.exe 1292 Sysqemvuuxl.exe 3764 Sysqemlcpcy.exe 3096 Sysqemiaxic.exe 2776 Sysqemddddo.exe 4112 Sysqemaexwd.exe 4444 Sysqemngfem.exe 2580 Sysqemcpyxb.exe 2304 Sysqemdexhe.exe 4196 Sysqemfzbpl.exe 1032 Sysqemvwliu.exe 1908 Sysqemdmioa.exe 2952 Sysqemizcbf.exe 2964 Sysqemkxreo.exe 3572 Sysqemkdviu.exe 1812 Sysqemfpwkd.exe 3444 Sysqemcqpds.exe 2084 Sysqemfxftt.exe 1460 Sysqemcunyg.exe 3480 Sysqemhlszu.exe 832 Sysqemkshpv.exe 4936 Sysqemksjnj.exe 3380 Sysqemcsvyt.exe 3572 Sysqemkdviu.exe 1236 Sysqemhmobj.exe 2264 Sysqemkwpen.exe 4788 Sysqemjwrbt.exe 3152 Sysqemztbuk.exe 1212 Sysqemndrvt.exe 4196 Sysqemiuxkl.exe 3804 Sysqemzclbn.exe 2620 Sysqemzggdd.exe 4892 Sysqemxprrc.exe 2584 Sysqemubwwv.exe 1648 Sysqemwlpzy.exe 4416 Sysqemetlfe.exe 4100 Sysqemcnigg.exe 1900 Sysqempppbd.exe 3972 Sysqembuibl.exe 3896 Sysqemorfhj.exe 3604 Sysqempbnwr.exe 4344 Sysqemcduro.exe 3096 Sysqemmrdux.exe 4396 Sysqemwuukw.exe 3140 Sysqemjhkar.exe 3320 Sysqemeyedg.exe 1116 Sysqemjinli.exe 4940 Sysqemecati.exe 2324 Sysqemzqjjc.exe 488 Sysqemtozmx.exe 4948 Sysqemtamel.exe 3896 Sysqemorfhj.exe 3716 Sysqemoromu.exe 3980 Sysqemhngxq.exe 4924 Sysqemznrup.exe -
resource yara_rule behavioral2/memory/4472-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e07-6.dat upx behavioral2/files/0x0006000000022e07-35.dat upx behavioral2/files/0x0006000000022e07-36.dat upx behavioral2/files/0x0007000000022dfd-41.dat upx behavioral2/memory/4472-66-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e11-72.dat upx behavioral2/memory/3596-74-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e11-73.dat upx behavioral2/files/0x0006000000022e16-108.dat upx behavioral2/files/0x0006000000022e16-109.dat upx behavioral2/files/0x0007000000022e20-143.dat upx behavioral2/files/0x0007000000022e20-144.dat upx behavioral2/memory/5008-173-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022e1a-179.dat upx behavioral2/files/0x0008000000022e1a-180.dat upx behavioral2/memory/3596-209-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000022e1c-215.dat upx behavioral2/files/0x0009000000022e1c-216.dat upx behavioral2/files/0x0008000000022e21-250.dat upx behavioral2/files/0x0008000000022e21-251.dat upx behavioral2/memory/4344-256-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000022e22-286.dat upx behavioral2/files/0x0009000000022e22-287.dat upx behavioral2/memory/3096-288-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000022e24-322.dat upx behavioral2/files/0x0007000000022e24-323.dat upx behavioral2/memory/4980-324-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2928-354-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e25-360.dat upx behavioral2/files/0x0006000000022e25-361.dat upx behavioral2/memory/3444-387-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e27-396.dat upx behavioral2/files/0x0006000000022e27-397.dat upx behavioral2/memory/452-399-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e28-432.dat upx behavioral2/files/0x0006000000022e28-433.dat upx behavioral2/memory/4900-438-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e29-469.dat upx behavioral2/files/0x0006000000022e29-470.dat upx behavioral2/memory/2288-475-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e2a-505.dat upx behavioral2/files/0x0006000000022e2a-506.dat upx behavioral2/memory/1292-511-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e2c-541.dat upx behavioral2/files/0x0006000000022e2c-542.dat upx behavioral2/memory/3764-547-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e2d-577.dat upx behavioral2/files/0x0006000000022e2d-578.dat upx behavioral2/memory/3096-583-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e2e-615.dat upx behavioral2/files/0x0006000000022e2e-614.dat upx behavioral2/memory/2776-644-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e36-651.dat upx behavioral2/files/0x0006000000022e36-650.dat upx behavioral2/memory/4112-672-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4444-688-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2580-745-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2304-778-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4196-811-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1032-844-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1908-877-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2952-886-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2964-943-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlpzy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemecati.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtjvk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzvel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemekoih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqazbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqpds.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubwwv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtozmx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxbknc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdmgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemljyzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjbjox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdqkdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkxreo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcunyg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembiusc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtnzjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtoabm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqrhuf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaexwd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjwrbt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemetlfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoromu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemznrup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemibxxm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcduro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtamel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdexhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwuukw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjinli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwpen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcnigg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhngxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsncta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembiwnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqnohv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyandr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemngfem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcpyxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkdviu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmobj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempbnwr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemopxfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemksjnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzggdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemorfhj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgbee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembutps.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlcpcy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemizcbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzclbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjhkar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyszpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhlszu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztbuk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiuxkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzlgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqtcgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtpgci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemayjuk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxprrc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzcqfs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 5008 4472 NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe 89 PID 4472 wrote to memory of 5008 4472 NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe 89 PID 4472 wrote to memory of 5008 4472 NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe 89 PID 5008 wrote to memory of 3596 5008 Sysqemibxxm.exe 90 PID 5008 wrote to memory of 3596 5008 Sysqemibxxm.exe 90 PID 5008 wrote to memory of 3596 5008 Sysqemibxxm.exe 90 PID 3596 wrote to memory of 4344 3596 Sysqemjbjox.exe 92 PID 3596 wrote to memory of 4344 3596 Sysqemjbjox.exe 92 PID 3596 wrote to memory of 4344 3596 Sysqemjbjox.exe 92 PID 4344 wrote to memory of 3096 4344 Sysqemayjuk.exe 94 PID 4344 wrote to memory of 3096 4344 Sysqemayjuk.exe 94 PID 4344 wrote to memory of 3096 4344 Sysqemayjuk.exe 94 PID 3096 wrote to memory of 4980 3096 Sysqemqrhuf.exe 97 PID 3096 wrote to memory of 4980 3096 Sysqemqrhuf.exe 97 PID 3096 wrote to memory of 4980 3096 Sysqemqrhuf.exe 97 PID 4980 wrote to memory of 2928 4980 Sysqemdqkdo.exe 99 PID 4980 wrote to memory of 2928 4980 Sysqemdqkdo.exe 99 PID 4980 wrote to memory of 2928 4980 Sysqemdqkdo.exe 99 PID 2928 wrote to memory of 3444 2928 Sysqemopxfs.exe 101 PID 2928 wrote to memory of 3444 2928 Sysqemopxfs.exe 101 PID 2928 wrote to memory of 3444 2928 Sysqemopxfs.exe 101 PID 3444 wrote to memory of 452 3444 Sysqemyandr.exe 102 PID 3444 wrote to memory of 452 3444 Sysqemyandr.exe 102 PID 3444 wrote to memory of 452 3444 Sysqemyandr.exe 102 PID 452 wrote to memory of 4900 452 Sysqemqazbq.exe 103 PID 452 wrote to memory of 4900 452 Sysqemqazbq.exe 103 PID 452 wrote to memory of 4900 452 Sysqemqazbq.exe 103 PID 4900 wrote to memory of 2288 4900 Sysqemvbibs.exe 105 PID 4900 wrote to memory of 2288 4900 Sysqemvbibs.exe 105 PID 4900 wrote to memory of 2288 4900 Sysqemvbibs.exe 105 PID 2288 wrote to memory of 1292 2288 Sysqemdrehy.exe 106 PID 2288 wrote to memory of 1292 2288 Sysqemdrehy.exe 106 PID 2288 wrote to memory of 1292 2288 Sysqemdrehy.exe 106 PID 1292 wrote to memory of 3764 1292 Sysqemvuuxl.exe 107 PID 1292 wrote to memory of 3764 1292 Sysqemvuuxl.exe 107 PID 1292 wrote to memory of 3764 1292 Sysqemvuuxl.exe 107 PID 3764 wrote to memory of 3096 3764 Sysqemlcpcy.exe 108 PID 3764 wrote to memory of 3096 3764 Sysqemlcpcy.exe 108 PID 3764 wrote to memory of 3096 3764 Sysqemlcpcy.exe 108 PID 3096 wrote to memory of 2776 3096 Sysqemiaxic.exe 110 PID 3096 wrote to memory of 2776 3096 Sysqemiaxic.exe 110 PID 3096 wrote to memory of 2776 3096 Sysqemiaxic.exe 110 PID 2776 wrote to memory of 4112 2776 Sysqemddddo.exe 111 PID 2776 wrote to memory of 4112 2776 Sysqemddddo.exe 111 PID 2776 wrote to memory of 4112 2776 Sysqemddddo.exe 111 PID 4112 wrote to memory of 4444 4112 Sysqemaexwd.exe 112 PID 4112 wrote to memory of 4444 4112 Sysqemaexwd.exe 112 PID 4112 wrote to memory of 4444 4112 Sysqemaexwd.exe 112 PID 4444 wrote to memory of 2580 4444 Sysqemngfem.exe 114 PID 4444 wrote to memory of 2580 4444 Sysqemngfem.exe 114 PID 4444 wrote to memory of 2580 4444 Sysqemngfem.exe 114 PID 2580 wrote to memory of 2304 2580 Sysqemcpyxb.exe 115 PID 2580 wrote to memory of 2304 2580 Sysqemcpyxb.exe 115 PID 2580 wrote to memory of 2304 2580 Sysqemcpyxb.exe 115 PID 2304 wrote to memory of 4196 2304 Sysqemdexhe.exe 116 PID 2304 wrote to memory of 4196 2304 Sysqemdexhe.exe 116 PID 2304 wrote to memory of 4196 2304 Sysqemdexhe.exe 116 PID 4196 wrote to memory of 1032 4196 Sysqemkbzig.exe 117 PID 4196 wrote to memory of 1032 4196 Sysqemkbzig.exe 117 PID 4196 wrote to memory of 1032 4196 Sysqemkbzig.exe 117 PID 1032 wrote to memory of 1908 1032 Sysqemvwliu.exe 118 PID 1032 wrote to memory of 1908 1032 Sysqemvwliu.exe 118 PID 1032 wrote to memory of 1908 1032 Sysqemvwliu.exe 118 PID 1908 wrote to memory of 2952 1908 Sysqemdmioa.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.66f7b732d4c776d3ab1ffd8420b18090.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemibxxm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemibxxm.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbjox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbjox.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemayjuk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayjuk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqrhuf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrhuf.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqkdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqkdo.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopxfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopxfs.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyandr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyandr.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqazbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqazbq.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbibs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbibs.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdrehy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdrehy.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuuxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuuxl.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcpcy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcpcy.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiaxic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiaxic.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddddo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddddo.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaexwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaexwd.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngfem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngfem.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpyxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpyxb.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdexhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdexhe.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzbpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzbpl.exe"20⤵
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvwliu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwliu.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizcbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizcbf.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxreo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxreo.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"25⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfpwkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpwkd.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqpds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqpds.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxftt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxftt.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcunyg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcunyg.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhlszu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhlszu.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkshpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkshpv.exe"31⤵
- Executes dropped EXE
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsvyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsvyt.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdviu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdviu.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmobj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmobj.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwpen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwpen.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwrbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwrbt.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztbuk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztbuk.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndrvt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndrvt.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkbzig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbzig.exe"40⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzclbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzclbn.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzggdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzggdd.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxprrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxprrc.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubwwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubwwv.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlpzy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlpzy.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemetlfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemetlfe.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcnigg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnigg.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\Sysqempppbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempppbd.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Sysqembuibl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembuibl.exe"49⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmjea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmjea.exe"50⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\Sysqempbnwr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbnwr.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcduro.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcduro.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrdux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrdux.exe"53⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwuukw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuukw.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhkar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhkar.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyedg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyedg.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecati.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecati.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzqjjc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzqjjc.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtozmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtozmx.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtamel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtamel.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorfhj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorfhj.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoromu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoromu.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhngxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhngxq.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznrup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznrup.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Sysqembiusc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembiusc.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzcqfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcqfs.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwomar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwomar.exe"68⤵
- Checks computer location settings
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwaytf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaytf.exe"69⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqyooa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyooa.exe"70⤵PID:244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrueor.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrueor.exe"71⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjyszk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjyszk.exe"72⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjgbee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgbee.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\Sysqembutps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembutps.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglinu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglinu.exe"76⤵
- Checks computer location settings
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqtfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqtfx.exe"77⤵
- Checks computer location settings
PID:380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtjvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtjvk.exe"78⤵
- Modifies registry class
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnzjb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnzjb.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobqeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobqeh.exe"80⤵
- Checks computer location settings
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiltzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiltzz.exe"81⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemekoih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekoih.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Sysqembiwnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembiwnm.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqtcgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqtcgj.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdmgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdmgd.exe"85⤵
- Modifies registry class
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpgci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpgci.exe"86⤵
- Modifies registry class
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqnohv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqnohv.exe"87⤵
- Checks computer location settings
- Modifies registry class
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiuxkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiuxkl.exe"88⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtepfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtepfd.exe"89⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqzlgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzlgf.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzvel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzvel.exe"91⤵
- Modifies registry class
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljyzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljyzc.exe"92⤵
- Modifies registry class
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmlxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmlxk.exe"93⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtfuvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfuvw.exe"94⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Sysqemidesw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidesw.exe"95⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnmoty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmoty.exe"96⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Sysqemasfbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemasfbf.exe"97⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvjijo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjijo.exe"98⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqqzrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqzrc.exe"99⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnnhxp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnnhxp.exe"100⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxbknc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxbknc.exe"101⤵
- Checks computer location settings
- Modifies registry class
PID:244 -
C:\Users\Admin\AppData\Local\Temp\Sysqematlqg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqematlqg.exe"102⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdaagh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdaagh.exe"103⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvobbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvobbf.exe"104⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsmjpj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsmjpj.exe"105⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfrccd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrccd.exe"106⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkexpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkexpa.exe"107⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvlkae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvlkae.exe"108⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\Sysqempvcqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempvcqw.exe"109⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvqvth.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqvth.exe"110⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsncta.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsncta.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaromd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaromd.exe"112⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcqdhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqdhm.exe"113⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhrmpo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhrmpo.exe"114⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemskmkz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemskmkz.exe"115⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnidsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnidsn.exe"116⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkrolc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrolc.exe"117⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\Sysqemptgte.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptgte.exe"118⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnndmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnndmg.exe"119⤵
- Checks computer location settings
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkklzt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkklzt.exe"120⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemncdux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemncdux.exe"121⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcalij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcalij.exe"122⤵PID:652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-