Analysis
-
max time kernel
77s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2023 11:35
Behavioral task
behavioral1
Sample
NEAS.14c215510bdc1626421f7839c5d11ab2.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.14c215510bdc1626421f7839c5d11ab2.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.14c215510bdc1626421f7839c5d11ab2.exe
-
Size
167KB
-
MD5
14c215510bdc1626421f7839c5d11ab2
-
SHA1
b7222dc9c954c6a13a375c25f97d865e5676cefc
-
SHA256
0ace046350c51b2861948c7b267f426beeaba39e71ca6f7ed9a987c25d9f8735
-
SHA512
d6019c542d79b1bcba9959d4542ccd7af8d2e39e358c2ac9e63db13d74870c27b5fb23d9e154285fb4f1a679f967ddbf1873f57795cfd60a82c63cb0deea9354
-
SSDEEP
3072:4dEUfKj8BYbDiC1ZTK7sxtLUIGKxK/tDwXQw30naFYaCkKEfNqr:4USiZTK40uxKFLw+aFlKEfNI
Malware Config
Signatures
-
Malware Backdoor - Berbew 38 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0007000000022df4-6.dat family_berbew behavioral2/files/0x0007000000022df4-36.dat family_berbew behavioral2/files/0x0007000000022df4-35.dat family_berbew behavioral2/files/0x0007000000022df1-42.dat family_berbew behavioral2/files/0x0006000000022dfc-72.dat family_berbew behavioral2/files/0x0006000000022dfc-73.dat family_berbew behavioral2/files/0x0006000000022dfe-107.dat family_berbew behavioral2/files/0x0006000000022dfe-108.dat family_berbew behavioral2/files/0x0006000000022e00-143.dat family_berbew behavioral2/files/0x0006000000022e00-142.dat family_berbew behavioral2/files/0x000a000000022d1a-179.dat family_berbew behavioral2/files/0x000a000000022d1a-180.dat family_berbew behavioral2/files/0x0008000000022e02-216.dat family_berbew behavioral2/files/0x0008000000022e02-215.dat family_berbew behavioral2/files/0x000a00000001db1a-251.dat family_berbew behavioral2/files/0x000a00000001db1a-252.dat family_berbew behavioral2/files/0x000a000000022e03-287.dat family_berbew behavioral2/files/0x000a000000022e03-288.dat family_berbew behavioral2/files/0x000a000000022e07-324.dat family_berbew behavioral2/files/0x000a000000022e07-323.dat family_berbew behavioral2/files/0x0008000000022e0a-362.dat family_berbew behavioral2/files/0x0008000000022e0a-361.dat family_berbew behavioral2/files/0x0008000000022d0b-398.dat family_berbew behavioral2/files/0x0008000000022d0b-399.dat family_berbew behavioral2/files/0x0009000000022e0d-433.dat family_berbew behavioral2/files/0x0009000000022e0d-434.dat family_berbew behavioral2/files/0x0006000000022e0f-469.dat family_berbew behavioral2/files/0x0006000000022e0f-470.dat family_berbew behavioral2/files/0x0006000000022e10-506.dat family_berbew behavioral2/files/0x0006000000022e10-507.dat family_berbew behavioral2/files/0x0006000000022e11-542.dat family_berbew behavioral2/files/0x0006000000022e11-543.dat family_berbew behavioral2/files/0x0006000000022e12-578.dat family_berbew behavioral2/files/0x0006000000022e12-579.dat family_berbew behavioral2/files/0x0006000000022e16-615.dat family_berbew behavioral2/files/0x0006000000022e16-614.dat family_berbew behavioral2/files/0x0006000000022e17-650.dat family_berbew behavioral2/files/0x0006000000022e17-651.dat family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemwvrzm.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemgnztl.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemesyoe.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemnkrwn.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemyllcb.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzizac.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzzyrg.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemkupxx.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemdrkan.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemvatvk.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemymaej.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemhwzgi.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemwqwjn.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemgfpnp.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemxsuaq.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemzgwoq.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemmytap.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemhfwru.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemlvbog.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemnjgdt.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemrbqaa.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemajgez.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemgefpj.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemieknp.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemfoqkg.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemhbusv.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemcpyxb.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemsmnpf.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemjhttg.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemlkzuy.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemyafkv.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemgmpvf.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemxhdih.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemntesp.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemjeuzp.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemejhxp.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemtuemr.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemyhref.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemibtvw.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemxnqxq.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemvmuzl.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemqzmiq.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemnwtsz.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemkghdq.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemkevnt.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation NEAS.14c215510bdc1626421f7839c5d11ab2.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemagiku.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemspgbx.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemklunk.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemooydb.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemgbnax.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemqfycf.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemnkpjd.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqempuctq.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemvowxa.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqembparw.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemfvzsx.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemsfule.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemsftyt.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemhzfek.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemgmgcv.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemgjddr.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemyclqx.exe Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation Sysqemyytwf.exe -
Executes dropped EXE 64 IoCs
pid Process 3704 Sysqemyllcb.exe 4484 Sysqemswpng.exe 2056 Sysqemnjgdt.exe 2772 Sysqemdgpqr.exe 404 Sysqemsfule.exe 4936 Sysqemntesp.exe 4492 Sysqemyytwf.exe 4844 Sysqemnkpjd.exe 3096 Sysqemcpyxb.exe 4136 Sysqemxnqxq.exe 756 Sysqemklunk.exe 4412 Sysqemsftyt.exe 404 Sysqemsfule.exe 2012 Sysqemajgez.exe 4484 Sysqemvmuzl.exe 3956 Sysqemkupxx.exe 4936 Sysqemntesp.exe 2708 Sysqemqzmiq.exe 3212 Sysqemxsuaq.exe 4380 Sysqemkgotv.exe 3168 Sysqemzgwoq.exe 4396 Sysqemibtvw.exe 4988 Sysqempuctq.exe 1136 Sysqemspgbx.exe 384 backgroundTaskHost.exe 4912 Sysqemsmnpf.exe 4644 Sysqemzizac.exe 4948 Sysqemnwtsz.exe 3168 Sysqemzgwoq.exe 4152 Sysqemhzfek.exe 4656 Sysqemosgce.exe 3428 Sysqemlidcg.exe 4332 Sysqemkghdq.exe 2988 Sysqemjeuzp.exe 3704 Sysqemhwzgi.exe 1276 Sysqemjhttg.exe 4864 Sysqemebhps.exe 4924 Sysqemmytap.exe 3784 Sysqemejhxp.exe 4260 Sysqemlkzuy.exe 4420 Sysqemhfwru.exe 2988 Sysqemjeuzp.exe 2712 Sysqemwvrzm.exe 2300 Sysqemrbqaa.exe 4596 Sysqemtelxf.exe 2968 Sysqemooydb.exe 2976 Sysqemzzyrg.exe 2456 Sysqemtuemr.exe 2016 Sysqemglypo.exe 3612 Sysqemlvbog.exe 4260 Sysqemlkzuy.exe 4988 Sysqemyafkv.exe 3656 Sysqemgefpj.exe 2732 Sysqemgmgcv.exe 312 Sysqemgfpnp.exe 2148 Sysqemdrkan.exe 4412 Sysqemgunxa.exe 4572 Sysqemgjddr.exe 636 Sysqemgmpvf.exe 452 Sysqemgbnax.exe 4936 Sysqemgnztl.exe 4252 Sysqemesyoe.exe 2068 Sysqemtstge.exe 1284 Sysqemvowxa.exe -
resource yara_rule behavioral2/memory/3620-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000022df4-6.dat upx behavioral2/memory/3704-37-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000022df4-36.dat upx behavioral2/files/0x0007000000022df4-35.dat upx behavioral2/files/0x0007000000022df1-42.dat upx behavioral2/files/0x0006000000022dfc-72.dat upx behavioral2/files/0x0006000000022dfc-73.dat upx behavioral2/files/0x0006000000022dfe-107.dat upx behavioral2/files/0x0006000000022dfe-108.dat upx behavioral2/files/0x0006000000022e00-143.dat upx behavioral2/files/0x0006000000022e00-142.dat upx behavioral2/memory/2772-144-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3620-151-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000022d1a-179.dat upx behavioral2/files/0x000a000000022d1a-180.dat upx behavioral2/memory/3704-185-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022e02-216.dat upx behavioral2/files/0x0008000000022e02-215.dat upx behavioral2/memory/4484-245-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a00000001db1a-251.dat upx behavioral2/files/0x000a00000001db1a-252.dat upx behavioral2/memory/2056-281-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000022e03-287.dat upx behavioral2/files/0x000a000000022e03-288.dat upx behavioral2/memory/2772-294-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000022e07-324.dat upx behavioral2/files/0x000a000000022e07-323.dat upx behavioral2/memory/404-329-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4936-355-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022e0a-362.dat upx behavioral2/files/0x0008000000022e0a-361.dat upx behavioral2/memory/4492-392-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022d0b-398.dat upx behavioral2/files/0x0008000000022d0b-399.dat upx behavioral2/files/0x0009000000022e0d-433.dat upx behavioral2/files/0x0009000000022e0d-434.dat upx behavioral2/memory/4844-463-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e0f-469.dat upx behavioral2/files/0x0006000000022e0f-470.dat upx behavioral2/memory/3096-475-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4136-504-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e10-506.dat upx behavioral2/files/0x0006000000022e10-507.dat upx behavioral2/memory/756-512-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e11-542.dat upx behavioral2/files/0x0006000000022e11-543.dat upx behavioral2/memory/4412-548-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e12-578.dat upx behavioral2/files/0x0006000000022e12-579.dat upx behavioral2/memory/404-587-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e16-615.dat upx behavioral2/files/0x0006000000022e16-614.dat upx behavioral2/memory/2012-644-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0006000000022e17-650.dat upx behavioral2/files/0x0006000000022e17-651.dat upx behavioral2/memory/4484-656-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3956-681-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3212-687-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4936-692-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2708-720-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3212-781-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4380-822-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3168-855-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsmnpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtuemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtstge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnkrwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxytej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcpyxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzizac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemooydb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgmpvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfoqkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjhttg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejhxp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtelxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdrkan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemesyoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvowxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemymaej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyytwf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnkpjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemklunk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkupxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzgwoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjeuzp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemagiku.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemajgez.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxsuaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgmgcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgbnax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgnztl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyclqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnytsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempuctq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemspgbx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkghdq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzyrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxhdih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemswpng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdgpqr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxnqxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwqwjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqfycf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvmuzl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemibtvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhwzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwvrzm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrbqaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemieknp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnjgdt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemosgce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsftyt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvbog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgunxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjddr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembparw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlkzuy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhfwru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkevnt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlidcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvatvk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.14c215510bdc1626421f7839c5d11ab2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyllcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkgotv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnwtsz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgefpj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3704 3620 NEAS.14c215510bdc1626421f7839c5d11ab2.exe 89 PID 3620 wrote to memory of 3704 3620 NEAS.14c215510bdc1626421f7839c5d11ab2.exe 89 PID 3620 wrote to memory of 3704 3620 NEAS.14c215510bdc1626421f7839c5d11ab2.exe 89 PID 3704 wrote to memory of 4484 3704 Sysqemyllcb.exe 91 PID 3704 wrote to memory of 4484 3704 Sysqemyllcb.exe 91 PID 3704 wrote to memory of 4484 3704 Sysqemyllcb.exe 91 PID 4484 wrote to memory of 2056 4484 Sysqemswpng.exe 92 PID 4484 wrote to memory of 2056 4484 Sysqemswpng.exe 92 PID 4484 wrote to memory of 2056 4484 Sysqemswpng.exe 92 PID 2056 wrote to memory of 2772 2056 Sysqemnjgdt.exe 94 PID 2056 wrote to memory of 2772 2056 Sysqemnjgdt.exe 94 PID 2056 wrote to memory of 2772 2056 Sysqemnjgdt.exe 94 PID 2772 wrote to memory of 404 2772 Sysqemdgpqr.exe 108 PID 2772 wrote to memory of 404 2772 Sysqemdgpqr.exe 108 PID 2772 wrote to memory of 404 2772 Sysqemdgpqr.exe 108 PID 404 wrote to memory of 4936 404 Sysqemsfule.exe 114 PID 404 wrote to memory of 4936 404 Sysqemsfule.exe 114 PID 404 wrote to memory of 4936 404 Sysqemsfule.exe 114 PID 4936 wrote to memory of 4492 4936 Sysqemntesp.exe 101 PID 4936 wrote to memory of 4492 4936 Sysqemntesp.exe 101 PID 4936 wrote to memory of 4492 4936 Sysqemntesp.exe 101 PID 4492 wrote to memory of 4844 4492 Sysqemyytwf.exe 102 PID 4492 wrote to memory of 4844 4492 Sysqemyytwf.exe 102 PID 4492 wrote to memory of 4844 4492 Sysqemyytwf.exe 102 PID 4844 wrote to memory of 3096 4844 Sysqemnkpjd.exe 103 PID 4844 wrote to memory of 3096 4844 Sysqemnkpjd.exe 103 PID 4844 wrote to memory of 3096 4844 Sysqemnkpjd.exe 103 PID 3096 wrote to memory of 4136 3096 Sysqemcpyxb.exe 104 PID 3096 wrote to memory of 4136 3096 Sysqemcpyxb.exe 104 PID 3096 wrote to memory of 4136 3096 Sysqemcpyxb.exe 104 PID 4136 wrote to memory of 756 4136 Sysqemxnqxq.exe 106 PID 4136 wrote to memory of 756 4136 Sysqemxnqxq.exe 106 PID 4136 wrote to memory of 756 4136 Sysqemxnqxq.exe 106 PID 756 wrote to memory of 4412 756 Sysqemklunk.exe 107 PID 756 wrote to memory of 4412 756 Sysqemklunk.exe 107 PID 756 wrote to memory of 4412 756 Sysqemklunk.exe 107 PID 4412 wrote to memory of 404 4412 Sysqemsftyt.exe 108 PID 4412 wrote to memory of 404 4412 Sysqemsftyt.exe 108 PID 4412 wrote to memory of 404 4412 Sysqemsftyt.exe 108 PID 404 wrote to memory of 2012 404 Sysqemsfule.exe 109 PID 404 wrote to memory of 2012 404 Sysqemsfule.exe 109 PID 404 wrote to memory of 2012 404 Sysqemsfule.exe 109 PID 2012 wrote to memory of 4484 2012 Sysqemajgez.exe 110 PID 2012 wrote to memory of 4484 2012 Sysqemajgez.exe 110 PID 2012 wrote to memory of 4484 2012 Sysqemajgez.exe 110 PID 4484 wrote to memory of 3956 4484 Sysqemvmuzl.exe 113 PID 4484 wrote to memory of 3956 4484 Sysqemvmuzl.exe 113 PID 4484 wrote to memory of 3956 4484 Sysqemvmuzl.exe 113 PID 3956 wrote to memory of 4936 3956 Sysqemkupxx.exe 114 PID 3956 wrote to memory of 4936 3956 Sysqemkupxx.exe 114 PID 3956 wrote to memory of 4936 3956 Sysqemkupxx.exe 114 PID 4936 wrote to memory of 2708 4936 Sysqemntesp.exe 115 PID 4936 wrote to memory of 2708 4936 Sysqemntesp.exe 115 PID 4936 wrote to memory of 2708 4936 Sysqemntesp.exe 115 PID 2708 wrote to memory of 3212 2708 Sysqemqzmiq.exe 116 PID 2708 wrote to memory of 3212 2708 Sysqemqzmiq.exe 116 PID 2708 wrote to memory of 3212 2708 Sysqemqzmiq.exe 116 PID 3212 wrote to memory of 4380 3212 Sysqemxsuaq.exe 117 PID 3212 wrote to memory of 4380 3212 Sysqemxsuaq.exe 117 PID 3212 wrote to memory of 4380 3212 Sysqemxsuaq.exe 117 PID 4380 wrote to memory of 3168 4380 Sysqemkgotv.exe 126 PID 4380 wrote to memory of 3168 4380 Sysqemkgotv.exe 126 PID 4380 wrote to memory of 3168 4380 Sysqemkgotv.exe 126 PID 3168 wrote to memory of 4396 3168 Sysqemzgwoq.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.14c215510bdc1626421f7839c5d11ab2.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.14c215510bdc1626421f7839c5d11ab2.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyllcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyllcb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswpng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswpng.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjgdt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjgdt.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgpqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgpqr.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkolww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkolww.exe"6⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaeyjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaeyjp.exe"7⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyytwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyytwf.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkpjd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkpjd.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpyxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpyxb.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnqxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnqxq.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklunk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklunk.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsftyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsftyt.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsfule.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsfule.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajgez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajgez.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvmuzl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvmuzl.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkupxx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkupxx.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemntesp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntesp.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzmiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzmiq.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxsuaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxsuaq.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkgotv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkgotv.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemccnhd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccnhd.exe"22⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemibtvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemibtvw.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqempuctq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempuctq.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemspgbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspgbx.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfvioi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfvioi.exe"26⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsmnpf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsmnpf.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzizac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzizac.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnwtsz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnwtsz.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgwoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgwoq.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzfek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzfek.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosgce.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosgce.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmlcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmlcg.exe"33⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkghdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkghdq.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhhbvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhhbvf.exe"35⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhwzgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwzgi.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhttg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhttg.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebhps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebhps.exe"38⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmytap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmytap.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejhxp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejhxp.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"41⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhfwru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfwru.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjeuzp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjeuzp.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwvrzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvrzm.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrbqaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbqaa.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtelxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtelxf.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemooydb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemooydb.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzyrg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzyrg.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtuemr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtuemr.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglypo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglypo.exe"50⤵
- Executes dropped EXE
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvbog.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvbog.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlkzuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlkzuy.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqfen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqfen.exe"53⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgefpj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgefpj.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgmgcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgmgcv.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfpnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfpnp.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdrkan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdrkan.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgunxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgunxa.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjddr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjddr.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgmpvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgmpvf.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgbnax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbnax.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnztl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnztl.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemesyoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemesyoe.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtstge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtstge.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvowxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvowxa.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlidcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlidcg.exe"66⤵
- Executes dropped EXE
- Modifies registry class
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyclqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyclqx.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvatvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvatvk.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhref.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhref.exe"69⤵
- Checks computer location settings
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdiaeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdiaeh.exe"70⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\Sysqemagiku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagiku.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyafkv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyafkv.exe"72⤵
- Checks computer location settings
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhdih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhdih.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobkov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobkov.exe"74⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemymaej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemymaej.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmmhu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmmhu.exe"76⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqfycf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqfycf.exe"77⤵
- Checks computer location settings
- Modifies registry class
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemieknp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemieknp.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnytsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnytsa.exe"79⤵
- Modifies registry class
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvzbga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvzbga.exe"80⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnkrwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkrwn.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxytej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxytej.exe"82⤵
- Modifies registry class
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfoqkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfoqkg.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbusv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbusv.exe"84⤵
- Checks computer location settings
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfvzsx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfvzsx.exe"85⤵
- Checks computer location settings
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnemyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnemyj.exe"86⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfeybu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfeybu.exe"87⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkqtoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkqtoz.exe"88⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxemcs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxemcs.exe"89⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxltad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxltad.exe"90⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Sysqemplxdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplxdo.exe"91⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkrolc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrolc.exe"92⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcopjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcopjk.exe"93⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfyqeo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyqeo.exe"94⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\Sysqempigcn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempigcn.exe"95⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuglka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuglka.exe"96⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvrycp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrycp.exe"97⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxfbfk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxfbfk.exe"98⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaiwcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaiwcw.exe"99⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkevnt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkevnt.exe"100⤵
- Checks computer location settings
- Modifies registry class
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzjie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzjie.exe"101⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxkzgs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkzgs.exe"102⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjepmj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjepmj.exe"103⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemewkus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewkus.exe"104⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuiqnh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuiqnh.exe"105⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrfzst.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfzst.exe"106⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxabj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxabj.exe"107⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcfpgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfpgp.exe"108⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmedbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmedbn.exe"109⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrsepy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrsepy.exe"110⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwxbai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwxbai.exe"111⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhibdb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhibdb.exe"112⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwqwjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqwjn.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgmzrj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgmzrj.exe"114⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\Sysqemchosg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchosg.exe"115⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjladd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjladd.exe"116⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\Sysqemesslr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemesslr.exe"117⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\Sysqembparw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembparw.exe"118⤵
- Checks computer location settings
- Modifies registry class
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemedehc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedehc.exe"119⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwdpkc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdpkc.exe"120⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\Sysqembqkcs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqkcs.exe"121⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Sysqemygbaz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygbaz.exe"122⤵PID:2968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-