Analysis
-
max time kernel
72s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 08:38
Behavioral task
behavioral1
Sample
NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe
-
Size
167KB
-
MD5
166fc0dcaeb8a818a8d2f6febc784988
-
SHA1
4b7d9f9ecf6c2bd98c1b117f0cfb087c718f7c54
-
SHA256
e7046d199bd6186e877f6195d7c9d91fc67fc65d8dcac0f7c76cc47e3990ff74
-
SHA512
67fa7c6231eb50dda161d477482fa83571bacfe86776fab112560730e3fb1e68bdefcf294a2868f167fd28884084705dbeab02f2457a4af703c80fcf60ac6cf1
-
SSDEEP
3072:MdEUfKj8BYbDiC1ZTK7sxtLUIGd7fKCibLon+wjcIDoB5W/3v2XJE:MUSiZTK405fKCibLkpQIDorqOXy
Malware Config
Signatures
-
Malware Backdoor - Berbew 36 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0006000000022e05-6.dat family_berbew behavioral2/files/0x0006000000022e05-35.dat family_berbew behavioral2/files/0x0006000000022e05-36.dat family_berbew behavioral2/files/0x0006000000022e04-41.dat family_berbew behavioral2/files/0x0008000000022e0f-72.dat family_berbew behavioral2/files/0x0008000000022e0f-71.dat family_berbew behavioral2/files/0x0008000000022e10-107.dat family_berbew behavioral2/files/0x0008000000022e10-106.dat family_berbew behavioral2/files/0x0007000000022e11-144.dat family_berbew behavioral2/files/0x0007000000022e11-145.dat family_berbew behavioral2/files/0x0008000000022e12-181.dat family_berbew behavioral2/files/0x0008000000022e12-182.dat family_berbew behavioral2/files/0x0008000000022e13-217.dat family_berbew behavioral2/files/0x0008000000022e13-218.dat family_berbew behavioral2/files/0x0009000000022e15-252.dat family_berbew behavioral2/files/0x0009000000022e15-253.dat family_berbew behavioral2/files/0x0008000000022e16-288.dat family_berbew behavioral2/files/0x0008000000022e16-289.dat family_berbew behavioral2/files/0x0006000000022e17-324.dat family_berbew behavioral2/files/0x0006000000022e17-325.dat family_berbew behavioral2/files/0x0006000000022e18-360.dat family_berbew behavioral2/files/0x0006000000022e18-361.dat family_berbew behavioral2/files/0x0006000000022e19-396.dat family_berbew behavioral2/files/0x0006000000022e19-397.dat family_berbew behavioral2/files/0x0006000000022e1a-432.dat family_berbew behavioral2/files/0x0006000000022e1a-433.dat family_berbew behavioral2/files/0x0006000000022e1b-468.dat family_berbew behavioral2/files/0x0006000000022e1b-469.dat family_berbew behavioral2/files/0x0006000000022e1c-504.dat family_berbew behavioral2/files/0x0006000000022e1c-505.dat family_berbew behavioral2/files/0x0006000000022e1d-540.dat family_berbew behavioral2/files/0x0006000000022e1d-541.dat family_berbew behavioral2/files/0x0006000000022e1e-576.dat family_berbew behavioral2/files/0x0006000000022e1e-577.dat family_berbew behavioral2/files/0x0006000000022e1f-612.dat family_berbew behavioral2/files/0x0006000000022e1f-613.dat family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemvxkfe.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemxgazr.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemsbgvc.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemoorlc.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemkebpv.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemlegme.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemqyoap.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemussmi.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemejhxp.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemjinli.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemjemyo.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemhlszu.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemdbavr.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzprmn.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemmfdzj.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemqusxg.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemxjbho.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemagzsm.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemucumw.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzcgpn.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzwdzo.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemybplx.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemuudir.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemlfgdr.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemuiedi.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemoslok.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemcqemy.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemuwytd.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemnjhqe.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemcxehz.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemohokv.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemecati.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemtnefa.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemleqks.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemdxeli.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemcivzr.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemxphqf.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzmczb.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemdnokl.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemdncpm.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemhvzdn.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemywfgm.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemyljoq.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemoruit.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzopkq.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemitjdv.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemikeqc.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemekawn.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemoyemt.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemblioa.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemxnljl.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemusiov.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemwrzop.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemqtvdf.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemfqavp.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzyzik.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzoizx.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemujiqc.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzufzw.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemfmxlf.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemcqofn.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemztoqb.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemdxyjy.exe -
Executes dropped EXE 64 IoCs
pid Process 4164 Sysqemtloaf.exe 2004 Sysqemvxkfe.exe 4564 Sysqemlfgdr.exe 556 Sysqemfmxlf.exe 4752 Sysqemyljoq.exe 4376 Sysqemdncpm.exe 3452 Sysqemqtvdf.exe 1052 Sysqemnjhqe.exe 3548 Sysqemitjdv.exe 4656 Sysqemczbmk.exe 4720 Sysqemxjbho.exe 3016 Sysqemxgazr.exe 3012 Sysqemsbgvc.exe 4968 Sysqemqyoap.exe 2088 Sysqemikeqc.exe 1132 Sysqemcivzr.exe 2328 Sysqemoorlc.exe 2732 Sysqemcxehz.exe 3540 Sysqemcqofn.exe 3076 Sysqemagzsm.exe 4276 Sysqemuqcgd.exe 4940 Sysqemuiedi.exe 640 Sysqemhlszu.exe 4936 Sysqemzohph.exe 3552 Sysqemzprmn.exe 5036 Sysqemfqavp.exe 1204 Sysqemztoqb.exe 4272 Sysqemxnljl.exe 4336 Sysqemusiov.exe 3708 Sysqemussmi.exe 2440 Sysqempgjpg.exe 4224 Sysqemkebpv.exe 3404 Sysqemzyzik.exe 2896 Sysqemwlcvp.exe 2328 Sysqemoorlc.exe 216 Sysqemmfdzj.exe 2616 Sysqemzoizx.exe 4580 Sysqemohokv.exe 3176 Sysqemdxyjy.exe 3636 Sysqemujiqc.exe 4412 Sysqemlegme.exe 4556 Sysqemucumw.exe 4320 Sysqemuohkw.exe 3900 Sysqemcqemy.exe 4596 Sysqemejhxp.exe 2868 Sysqemoruit.exe 3220 Sysqemjinli.exe 4024 Sysqemecati.exe 3920 Sysqemuwytd.exe 4404 Sysqemekawn.exe 3408 Sysqemzufzw.exe 2560 Sysqemehaub.exe 2308 Sysqemzcgpn.exe 3172 Sysqemqusxg.exe 2640 Sysqemhvzdn.exe 4936 Sysqemzwdzo.exe 3740 Sysqemjemyo.exe 2600 Sysqemzopkq.exe 4908 Sysqemtnefa.exe 3852 Sysqemxphqf.exe 3684 Sysqemzmczb.exe 3916 Sysqemywfgm.exe 2828 Sysqemoyemt.exe 4316 Sysqemdnokl.exe -
resource yara_rule behavioral2/memory/4012-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e05-6.dat upx behavioral2/files/0x0006000000022e05-35.dat upx behavioral2/files/0x0006000000022e05-36.dat upx behavioral2/files/0x0006000000022e04-41.dat upx behavioral2/files/0x0008000000022e0f-72.dat upx behavioral2/files/0x0008000000022e0f-71.dat upx behavioral2/memory/4012-108-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022e10-107.dat upx behavioral2/memory/4564-109-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022e10-106.dat upx behavioral2/files/0x0007000000022e11-144.dat upx behavioral2/files/0x0007000000022e11-145.dat upx behavioral2/memory/4164-150-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2004-175-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022e12-181.dat upx behavioral2/files/0x0008000000022e12-182.dat upx behavioral2/memory/4564-211-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022e13-217.dat upx behavioral2/files/0x0008000000022e13-218.dat upx behavioral2/files/0x0009000000022e15-252.dat upx behavioral2/files/0x0009000000022e15-253.dat upx behavioral2/memory/556-258-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022e16-288.dat upx behavioral2/files/0x0008000000022e16-289.dat upx behavioral2/memory/4752-294-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e17-324.dat upx behavioral2/files/0x0006000000022e17-325.dat upx behavioral2/memory/4376-333-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e18-360.dat upx behavioral2/files/0x0006000000022e18-361.dat upx behavioral2/memory/3452-366-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e19-396.dat upx behavioral2/files/0x0006000000022e19-397.dat upx behavioral2/memory/1052-426-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e1a-432.dat upx behavioral2/files/0x0006000000022e1a-433.dat upx behavioral2/memory/3548-438-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e1b-468.dat upx behavioral2/files/0x0006000000022e1b-469.dat upx behavioral2/memory/4656-474-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e1c-504.dat upx behavioral2/files/0x0006000000022e1c-505.dat upx behavioral2/memory/4720-510-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e1d-540.dat upx behavioral2/files/0x0006000000022e1d-541.dat upx behavioral2/memory/3016-546-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e1e-576.dat upx behavioral2/files/0x0006000000022e1e-577.dat upx behavioral2/memory/3012-583-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e1f-612.dat upx behavioral2/files/0x0006000000022e1f-613.dat upx behavioral2/memory/4968-642-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2088-675-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1132-708-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2328-718-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2732-753-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3540-807-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3076-816-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4276-852-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4940-906-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/640-939-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4936-948-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3552-1005-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemecati.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvxkfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoorlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcxehz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfqavp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxnljl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkebpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuohkw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlfgdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcivzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmfdzj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxyjy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemujiqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybplx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmxlf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnjhqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqyoap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuiedi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemehaub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhvzdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxphqf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtnefa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuqcgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhlszu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzprmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztoqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzoizx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqemy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqusxg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoyemt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgjpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzyzik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejhxp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdnokl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqtvdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitjdv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjinli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzufzw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxgazr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemikeqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzmczb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuudir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemussmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwrzop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbavr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlegme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemucumw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuwytd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemicypx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemusiov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzopkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlcvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwdzo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyljoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczbmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqofn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemekawn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoslok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzcgpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblioa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemleqks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdncpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsbgvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 4164 4012 NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe 90 PID 4012 wrote to memory of 4164 4012 NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe 90 PID 4012 wrote to memory of 4164 4012 NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe 90 PID 4164 wrote to memory of 2004 4164 Sysqemtloaf.exe 91 PID 4164 wrote to memory of 2004 4164 Sysqemtloaf.exe 91 PID 4164 wrote to memory of 2004 4164 Sysqemtloaf.exe 91 PID 2004 wrote to memory of 4564 2004 Sysqemvxkfe.exe 92 PID 2004 wrote to memory of 4564 2004 Sysqemvxkfe.exe 92 PID 2004 wrote to memory of 4564 2004 Sysqemvxkfe.exe 92 PID 4564 wrote to memory of 556 4564 Sysqemlfgdr.exe 93 PID 4564 wrote to memory of 556 4564 Sysqemlfgdr.exe 93 PID 4564 wrote to memory of 556 4564 Sysqemlfgdr.exe 93 PID 556 wrote to memory of 4752 556 Sysqemfmxlf.exe 94 PID 556 wrote to memory of 4752 556 Sysqemfmxlf.exe 94 PID 556 wrote to memory of 4752 556 Sysqemfmxlf.exe 94 PID 4752 wrote to memory of 4376 4752 Sysqemyljoq.exe 95 PID 4752 wrote to memory of 4376 4752 Sysqemyljoq.exe 95 PID 4752 wrote to memory of 4376 4752 Sysqemyljoq.exe 95 PID 4376 wrote to memory of 3452 4376 Sysqemdncpm.exe 96 PID 4376 wrote to memory of 3452 4376 Sysqemdncpm.exe 96 PID 4376 wrote to memory of 3452 4376 Sysqemdncpm.exe 96 PID 3452 wrote to memory of 1052 3452 Sysqemqtvdf.exe 97 PID 3452 wrote to memory of 1052 3452 Sysqemqtvdf.exe 97 PID 3452 wrote to memory of 1052 3452 Sysqemqtvdf.exe 97 PID 1052 wrote to memory of 3548 1052 Sysqemnjhqe.exe 98 PID 1052 wrote to memory of 3548 1052 Sysqemnjhqe.exe 98 PID 1052 wrote to memory of 3548 1052 Sysqemnjhqe.exe 98 PID 3548 wrote to memory of 4656 3548 Sysqemitjdv.exe 99 PID 3548 wrote to memory of 4656 3548 Sysqemitjdv.exe 99 PID 3548 wrote to memory of 4656 3548 Sysqemitjdv.exe 99 PID 4656 wrote to memory of 4720 4656 Sysqemczbmk.exe 100 PID 4656 wrote to memory of 4720 4656 Sysqemczbmk.exe 100 PID 4656 wrote to memory of 4720 4656 Sysqemczbmk.exe 100 PID 4720 wrote to memory of 3016 4720 Sysqemxjbho.exe 101 PID 4720 wrote to memory of 3016 4720 Sysqemxjbho.exe 101 PID 4720 wrote to memory of 3016 4720 Sysqemxjbho.exe 101 PID 3016 wrote to memory of 3012 3016 Sysqemxgazr.exe 102 PID 3016 wrote to memory of 3012 3016 Sysqemxgazr.exe 102 PID 3016 wrote to memory of 3012 3016 Sysqemxgazr.exe 102 PID 3012 wrote to memory of 4968 3012 Sysqemsbgvc.exe 103 PID 3012 wrote to memory of 4968 3012 Sysqemsbgvc.exe 103 PID 3012 wrote to memory of 4968 3012 Sysqemsbgvc.exe 103 PID 4968 wrote to memory of 2088 4968 Sysqemqyoap.exe 104 PID 4968 wrote to memory of 2088 4968 Sysqemqyoap.exe 104 PID 4968 wrote to memory of 2088 4968 Sysqemqyoap.exe 104 PID 2088 wrote to memory of 1132 2088 Sysqemikeqc.exe 105 PID 2088 wrote to memory of 1132 2088 Sysqemikeqc.exe 105 PID 2088 wrote to memory of 1132 2088 Sysqemikeqc.exe 105 PID 1132 wrote to memory of 2328 1132 Sysqemcivzr.exe 126 PID 1132 wrote to memory of 2328 1132 Sysqemcivzr.exe 126 PID 1132 wrote to memory of 2328 1132 Sysqemcivzr.exe 126 PID 2328 wrote to memory of 2732 2328 Sysqemoorlc.exe 107 PID 2328 wrote to memory of 2732 2328 Sysqemoorlc.exe 107 PID 2328 wrote to memory of 2732 2328 Sysqemoorlc.exe 107 PID 2732 wrote to memory of 3540 2732 Sysqemcxehz.exe 108 PID 2732 wrote to memory of 3540 2732 Sysqemcxehz.exe 108 PID 2732 wrote to memory of 3540 2732 Sysqemcxehz.exe 108 PID 3540 wrote to memory of 3076 3540 Sysqemcqofn.exe 109 PID 3540 wrote to memory of 3076 3540 Sysqemcqofn.exe 109 PID 3540 wrote to memory of 3076 3540 Sysqemcqofn.exe 109 PID 3076 wrote to memory of 4276 3076 Sysqemagzsm.exe 110 PID 3076 wrote to memory of 4276 3076 Sysqemagzsm.exe 110 PID 3076 wrote to memory of 4276 3076 Sysqemagzsm.exe 110 PID 4276 wrote to memory of 4940 4276 Sysqemuqcgd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.166fc0dcaeb8a818a8d2f6febc784988.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtloaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtloaf.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxkfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxkfe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlfgdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlfgdr.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmxlf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmxlf.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyljoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyljoq.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdncpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdncpm.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqtvdf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqtvdf.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjhqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjhqe.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitjdv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitjdv.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemczbmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczbmk.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjbho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjbho.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxgazr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgazr.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsbgvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbgvc.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqyoap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyoap.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemikeqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikeqc.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcivzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcivzr.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfwkps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfwkps.exe"18⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcxehz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxehz.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqofn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqofn.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemagzsm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagzsm.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuqcgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuqcgd.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuiedi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuiedi.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhlszu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhlszu.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzohph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzohph.exe"25⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzprmn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzprmn.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfqavp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfqavp.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztoqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztoqb.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnljl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnljl.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemusiov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemusiov.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemussmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemussmi.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkebpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkebpv.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzyzik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzyzik.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlcvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlcvp.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoorlc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoorlc.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfdzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfdzj.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzoizx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzoizx.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohokv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohokv.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemujysx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemujysx.exe"40⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\Sysqemujiqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemujiqc.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkbjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkbjk.exe"42⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\Sysqemucumw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucumw.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuohkw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuohkw.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoxkfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxkfn.exe"45⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemejhxp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejhxp.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoruit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoruit.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecati.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecati.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwytd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwytd.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzufzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzufzw.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehaub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehaub.exe"53⤵
- Executes dropped EXE
- Modifies registry class
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzcgpn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcgpn.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqusxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqusxg.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhvzdn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvzdn.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoslok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoslok.exe"57⤵
- Checks computer location settings
- Modifies registry class
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwaiup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaiup.exe"58⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzopkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzopkq.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnefa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnefa.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwttvb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwttvb.exe"61⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlcptn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcptn.exe"62⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemywfgm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywfgm.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoyemt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoyemt.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdnokl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdnokl.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalwxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalwxy.exe"66⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemybplx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybplx.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblioa.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrzop.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrzop.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbcjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbcjg.exe"70⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlegme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlegme.exe"71⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemleqks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemleqks.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemicypx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemicypx.exe"73⤵
- Modifies registry class
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxeli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxeli.exe"74⤵
- Checks computer location settings
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbavr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbavr.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnpcem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnpcem.exe"76⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdxyjy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxyjy.exe"77⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsflpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsflpl.exe"78⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtrhnt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrhnt.exe"79⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqoptx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqoptx.exe"80⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnqatn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnqatn.exe"81⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfqkrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfqkrs.exe"82⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvyfpf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvyfpf.exe"83⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvrhms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrhms.exe"84⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvcvss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcvss.exe"85⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvgqvb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgqvb.exe"86⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnkglw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkglw.exe"87⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhqxtd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqxtd.exe"88⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkwmje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwmje.exe"89⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiuuxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiuuxq.exe"90⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemafsne.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafsne.exe"91⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvwnvm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwnvm.exe"92⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnpxts.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnpxts.exe"93⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfamjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfamjf.exe"94⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcyuos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyuos.exe"95⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcqemy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqemy.exe"96⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakbni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakbni.exe"97⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuudir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuudir.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxphqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxphqf.exe"99⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsknlj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsknlj.exe"100⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnjqts.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjqts.exe"101⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmrqxx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrqxx.exe"102⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemshxcq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshxcq.exe"103⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkevnt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkevnt.exe"104⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemprqix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprqix.exe"105⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzfbrt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzfbrt.exe"106⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzxdoy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxdoy.exe"107⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzmczb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmczb.exe"108⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzqpks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzqpks.exe"109⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwoxpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwoxpw.exe"110⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxzsve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxzsve.exe"111⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrjniv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrjniv.exe"112⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\Sysqemubolz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubolz.exe"113⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\Sysqempwuhd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempwuhd.exe"114⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\Sysqemetcmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemetcmp.exe"115⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhlcpt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhlcpt.exe"116⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrzfxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzfxo.exe"117⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Sysqemglmqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglmqe.exe"118⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgidbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgidbg.exe"119⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzwdzo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwdzo.exe"120⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlmcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlmcf.exe"121⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwuvch.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuvch.exe"122⤵PID:4232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-