Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe
-
Size
97KB
-
MD5
531c36ae95bafcb3d9e2d2523d26b03f
-
SHA1
2d4dd22b2fa17cd5ac9fae2684b128db8203e85f
-
SHA256
d7e4b918ae8848371eb4d9d394637f53b14e90a282508e98d30b3a1f0828595b
-
SHA512
5ef5181fc847083386a3c0eec7ed77708c17f6f6dcf6d3bda495b6d5d0b16aea8fd448acba5997c0c125269a3acebe258cf49e63cb6432dc9291151d251a8a80
-
SSDEEP
1536:czfMMknJvVvwlTHavNbA8w9KxlO9Lc3Otp15wKwYPpLKb:KfMbJOZHaV7wdZcm19w6p8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 23 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqembohxx.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemfkdzy.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemxuqxk.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemwaytf.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemnjpcb.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemjzxga.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemfywda.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemrxzfw.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemwyqoq.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemreiof.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemocszx.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqembavlw.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemgkoje.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemlbujl.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemivalm.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemwnwff.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemrmdde.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemyxijd.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemjqxes.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemrnpwq.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemolxkd.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation Sysqemlrqje.exe Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe -
Executes dropped EXE 23 IoCs
pid Process 3900 Sysqemwnwff.exe 3880 Sysqemrxzfw.exe 3868 Sysqemwyqoq.exe 2180 Sysqemreiof.exe 4156 Sysqemjqxes.exe 2092 Sysqemocszx.exe 4904 Sysqemnjpcb.exe 4592 Sysqembavlw.exe 2284 Sysqemwaytf.exe 736 Sysqemgkoje.exe 1660 Sysqemlbujl.exe 2292 Sysqemrnpwq.exe 536 Sysqemolxkd.exe 3692 Sysqembohxx.exe 4016 Sysqemivalm.exe 2632 Sysqemfkdzy.exe 3020 Sysqemjzxga.exe 216 Sysqemlrqje.exe 2548 Sysqemyxijd.exe 4904 Sysqemxuqxk.exe 4632 Sysqemfywda.exe 4832 Sysqemrmdde.exe 2100 Sysqemtwwgi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwaytf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfkdzy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwyqoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemocszx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemreiof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemolxkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembohxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuqxk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwnwff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrxzfw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembavlw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlbujl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjzxga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlrqje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyxijd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfywda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjqxes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrnpwq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivalm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrmdde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnjpcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgkoje.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3900 3988 NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe 84 PID 3988 wrote to memory of 3900 3988 NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe 84 PID 3988 wrote to memory of 3900 3988 NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe 84 PID 3900 wrote to memory of 3880 3900 Sysqemwnwff.exe 85 PID 3900 wrote to memory of 3880 3900 Sysqemwnwff.exe 85 PID 3900 wrote to memory of 3880 3900 Sysqemwnwff.exe 85 PID 3880 wrote to memory of 3868 3880 Sysqemrxzfw.exe 88 PID 3880 wrote to memory of 3868 3880 Sysqemrxzfw.exe 88 PID 3880 wrote to memory of 3868 3880 Sysqemrxzfw.exe 88 PID 3868 wrote to memory of 2180 3868 Sysqemwyqoq.exe 91 PID 3868 wrote to memory of 2180 3868 Sysqemwyqoq.exe 91 PID 3868 wrote to memory of 2180 3868 Sysqemwyqoq.exe 91 PID 2180 wrote to memory of 4156 2180 Sysqemreiof.exe 94 PID 2180 wrote to memory of 4156 2180 Sysqemreiof.exe 94 PID 2180 wrote to memory of 4156 2180 Sysqemreiof.exe 94 PID 4156 wrote to memory of 2092 4156 Sysqemjqxes.exe 96 PID 4156 wrote to memory of 2092 4156 Sysqemjqxes.exe 96 PID 4156 wrote to memory of 2092 4156 Sysqemjqxes.exe 96 PID 2092 wrote to memory of 4904 2092 Sysqemocszx.exe 113 PID 2092 wrote to memory of 4904 2092 Sysqemocszx.exe 113 PID 2092 wrote to memory of 4904 2092 Sysqemocszx.exe 113 PID 4904 wrote to memory of 4592 4904 Sysqemnjpcb.exe 99 PID 4904 wrote to memory of 4592 4904 Sysqemnjpcb.exe 99 PID 4904 wrote to memory of 4592 4904 Sysqemnjpcb.exe 99 PID 4592 wrote to memory of 2284 4592 Sysqembavlw.exe 100 PID 4592 wrote to memory of 2284 4592 Sysqembavlw.exe 100 PID 4592 wrote to memory of 2284 4592 Sysqembavlw.exe 100 PID 2284 wrote to memory of 736 2284 Sysqemwaytf.exe 101 PID 2284 wrote to memory of 736 2284 Sysqemwaytf.exe 101 PID 2284 wrote to memory of 736 2284 Sysqemwaytf.exe 101 PID 736 wrote to memory of 1660 736 Sysqemgkoje.exe 102 PID 736 wrote to memory of 1660 736 Sysqemgkoje.exe 102 PID 736 wrote to memory of 1660 736 Sysqemgkoje.exe 102 PID 1660 wrote to memory of 2292 1660 Sysqemlbujl.exe 105 PID 1660 wrote to memory of 2292 1660 Sysqemlbujl.exe 105 PID 1660 wrote to memory of 2292 1660 Sysqemlbujl.exe 105 PID 2292 wrote to memory of 536 2292 Sysqemrnpwq.exe 106 PID 2292 wrote to memory of 536 2292 Sysqemrnpwq.exe 106 PID 2292 wrote to memory of 536 2292 Sysqemrnpwq.exe 106 PID 536 wrote to memory of 3692 536 Sysqemolxkd.exe 233 PID 536 wrote to memory of 3692 536 Sysqemolxkd.exe 233 PID 536 wrote to memory of 3692 536 Sysqemolxkd.exe 233 PID 3692 wrote to memory of 4016 3692 Sysqembohxx.exe 108 PID 3692 wrote to memory of 4016 3692 Sysqembohxx.exe 108 PID 3692 wrote to memory of 4016 3692 Sysqembohxx.exe 108 PID 4016 wrote to memory of 2632 4016 Sysqemivalm.exe 137 PID 4016 wrote to memory of 2632 4016 Sysqemivalm.exe 137 PID 4016 wrote to memory of 2632 4016 Sysqemivalm.exe 137 PID 2632 wrote to memory of 3020 2632 Sysqemfkdzy.exe 110 PID 2632 wrote to memory of 3020 2632 Sysqemfkdzy.exe 110 PID 2632 wrote to memory of 3020 2632 Sysqemfkdzy.exe 110 PID 3020 wrote to memory of 216 3020 Sysqemjzxga.exe 111 PID 3020 wrote to memory of 216 3020 Sysqemjzxga.exe 111 PID 3020 wrote to memory of 216 3020 Sysqemjzxga.exe 111 PID 216 wrote to memory of 2548 216 Sysqemlrqje.exe 112 PID 216 wrote to memory of 2548 216 Sysqemlrqje.exe 112 PID 216 wrote to memory of 2548 216 Sysqemlrqje.exe 112 PID 2548 wrote to memory of 4904 2548 Sysqemyxijd.exe 154 PID 2548 wrote to memory of 4904 2548 Sysqemyxijd.exe 154 PID 2548 wrote to memory of 4904 2548 Sysqemyxijd.exe 154 PID 4904 wrote to memory of 4632 4904 Sysqemxuqxk.exe 133 PID 4904 wrote to memory of 4632 4904 Sysqemxuqxk.exe 133 PID 4904 wrote to memory of 4632 4904 Sysqemxuqxk.exe 133 PID 4632 wrote to memory of 4832 4632 Sysqemfywda.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.531c36ae95bafcb3d9e2d2523d26b03f.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwnwff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwnwff.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxzfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxzfw.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwyqoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyqoq.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemreiof.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemreiof.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqxes.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqxes.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemocszx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemocszx.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Sysqembitnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembitnq.exe"8⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Sysqembavlw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembavlw.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwaytf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaytf.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkoje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkoje.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbujl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbujl.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrnpwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrnpwq.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolxkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolxkd.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopicy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopicy.exe"15⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\Sysqemivalm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivalm.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgetqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgetqt.exe"17⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjzxga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzxga.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrqje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrqje.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyxijd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxijd.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjpcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjpcb.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyqcfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyqcfx.exe"22⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrmdde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmdde.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwwgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwwgi.exe"24⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhtww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhtww.exe"25⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemswduo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswduo.exe"26⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqrauy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrauy.exe"27⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlxrum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxrum.exe"28⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\Sysqemveflu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemveflu.exe"29⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqcxti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcxti.exe"30⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemliobw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemliobw.exe"31⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvtowp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvtowp.exe"32⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlbjcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbjcb.exe"33⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvxmko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxmko.exe"34⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyebax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyebax.exe"35⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvbjoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbjoc.exe"36⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfuvwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfuvwv.exe"37⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvyfpf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvyfpf.exe"38⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkhbuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhbuz.exe"39⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfywda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfywda.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaiyqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaiyqr.exe"41⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\Sysqematmwz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqematmwz.exe"42⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqftgo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqftgo.exe"43⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfkdzy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkdzy.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaufup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaufup.exe"45⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvlady.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvlady.exe"46⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqooyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqooyc.exe"47⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcugyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcugyq.exe"48⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxvwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxvwe.exe"49⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemubizu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubizu.exe"50⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Sysqemphzpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphzpg.exe"51⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnxjxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxjxc.exe"52⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiolar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiolar.exe"53⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcjqir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjqir.exe"54⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxakkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxakkg.exe"55⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemppjvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppjvc.exe"56⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcrrqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrrqz.exe"57⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Sysqempejyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempejyh.exe"58⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemilury.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilury.exe"59⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzpjbs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpjbs.exe"60⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxuqxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuqxk.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgnco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgnco.exe"62⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhitfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhitfx.exe"63⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeyyff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyyff.exe"64⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzmhvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmhvz.exe"65⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuhulz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhulz.exe"66⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Sysqempyoop.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempyoop.exe"67⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkleej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkleej.exe"68⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhgarz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhgarz.exe"69⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\Sysqemulszh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemulszh.exe"70⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsqrus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqrus.exe"71⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\Sysqemewkus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewkus.exe"72⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Sysqemezwmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemezwmg.exe"73⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwkkxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkkxi.exe"74⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzfnvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzfnvu.exe"75⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemznxag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznxag.exe"76⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwdwih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdwih.exe"77⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwstgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwstgy.exe"78⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzvwdl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvwdl.exe"79⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcyzbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyzbx.exe"80⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzzjot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzjot.exe"81⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwhuwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhuwp.exe"82⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzcxmb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcxmb.exe"83⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzojmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzojmq.exe"84⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwlqmj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlqmj.exe"85⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmqxzt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqxzt.exe"86⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgpgcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpgcw.exe"87⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Sysqemexycr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexycr.exe"88⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxqmid.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqmid.exe"89⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjwfql.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwfql.exe"90⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeqkyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqkyd.exe"91⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\Sysqembzugy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzugy.exe"92⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwqwjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqwjn.exe"93⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuzgjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzgjj.exe"94⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoblzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoblzb.exe"95⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmytut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmytut.exe"96⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhqmxj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqmxj.exe"97⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\Sysqembwdsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwdsl.exe"98⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzensz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzensz.exe"99⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwyjnx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyjnx.exe"100⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtlean.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlean.exe"101⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmhelj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhelj.exe"102⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjpptx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpptx.exe"103⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Sysqembeoet.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembeoet.exe"104⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtezbs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtezbs.exe"105⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjmkjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmkjf.exe"106⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemehpzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehpzf.exe"107⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzvfpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvfpa.exe"108⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwpbcq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwpbcq.exe"109⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtbxpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbxpg.exe"110⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtquvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtquvf.exe"111⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrvtqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvtqq.exe"112⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlpygq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlpygq.exe"113⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjyrgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjyrgd.exe"114⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgsmtu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgsmtu.exe"115⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeeios.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeeios.exe"116⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemequgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemequgg.exe"117⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\Sysqemethzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemethzv.exe"118⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\Sysqembcrhi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembcrhi.exe"119⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzwnug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwnug.exe"120⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtnhxw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnhxw.exe"121⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemolxsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolxsy.exe"122⤵PID:4892
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-