Analysis
-
max time kernel
50s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 01:48
Behavioral task
behavioral1
Sample
db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe
Resource
win10v2004-20240226-en
General
-
Target
db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe
-
Size
93KB
-
MD5
8f4e3df706c1faa906584835f91d8ee0
-
SHA1
9efa2752154a4b5d970b734b1e4f50c7afe9cd7d
-
SHA256
db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a
-
SHA512
d709ed7363cd1f151234f6f05f2e489d60a45b98c65fc3fc381cb9198f2a0941166b052417062da63aaeaf111d8858c59de4afd5f2a10b34e0e94f8a7357e13c
-
SSDEEP
1536:eYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8ni:rdEUfKj8BYbDiC1ZTK7sxtLUIGN
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/2672-0-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023218-6.dat UPX behavioral2/files/0x0007000000023217-41.dat UPX behavioral2/files/0x0007000000023219-71.dat UPX behavioral2/memory/264-73-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000700000002321b-107.dat UPX behavioral2/memory/2672-137-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000700000002321d-143.dat UPX behavioral2/memory/5004-150-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000700000002321e-179.dat UPX behavioral2/memory/264-209-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000900000002321f-215.dat UPX behavioral2/memory/5044-249-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0009000000023221-251.dat UPX behavioral2/memory/2296-281-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0008000000023224-287.dat UPX behavioral2/files/0x0007000000023225-322.dat UPX behavioral2/memory/4280-328-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4524-353-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023227-359.dat UPX behavioral2/memory/4564-361-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4000-390-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000700000002322b-396.dat UPX behavioral2/memory/436-402-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4420-427-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000700000002322c-433.dat UPX behavioral2/memory/4344-447-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000700000002322e-469.dat UPX behavioral2/memory/4564-475-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023230-506.dat UPX behavioral2/memory/3944-508-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/436-513-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023235-543.dat UPX behavioral2/memory/4952-549-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023236-579.dat UPX behavioral2/memory/3812-581-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3944-614-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023238-616.dat UPX behavioral2/files/0x0007000000023239-652.dat UPX behavioral2/memory/540-657-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/5060-687-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4312-715-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4136-748-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/764-754-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3036-782-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/5060-792-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3752-848-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/764-881-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3264-919-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4472-947-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4276-980-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3980-991-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2656-1046-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2380-1076-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4996-1088-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1832-1113-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4180-1147-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4308-1187-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1000-1220-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4588-1253-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4912-1310-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3956-1343-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3960-1352-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4640-1382-0x0000000000400000-0x0000000000491000-memory.dmp UPX -
Checks computer location settings 2 TTPs 60 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemqvjgy.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemvjege.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemndmio.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemwgjdu.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemphqyg.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemhaqjx.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemayjuk.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemhfexj.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemnhigi.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemphtlm.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemsokzi.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemjcvfy.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemztlpu.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemidzrh.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemeoteq.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemsalda.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemhmede.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemxuajq.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemfekso.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemcunyg.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemcwesp.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemiudim.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemfhitq.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqempdqwn.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemtsibk.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemggvnl.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemndqdu.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemvcdyw.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemlsirr.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqembuwjc.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemlygiu.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqempfxze.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemnizdy.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemfpfqo.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemaavuh.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqempeolo.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemubxkg.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemjzdru.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemmrdux.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemjtyhb.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemdfrbq.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemfhvjs.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemmimog.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemeizkl.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemyjsdz.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemqvsni.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemzhfyq.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemyytwf.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemukxiz.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemhaowc.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqembtqcb.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemtzamk.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemdndvx.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemaumxc.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemcvjls.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemygcug.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemjbxyx.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqembmxup.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Sysqemvfvma.exe -
Executes dropped EXE 59 IoCs
pid Process 5004 Sysqemtsibk.exe 264 Sysqembtqcb.exe 5044 Sysqemjtyhb.exe 2296 Sysqemggvnl.exe 4280 Sysqemyjsdz.exe 4524 Sysqemndqdu.exe 4000 Sysqemqvjgy.exe 4420 Sysqembuwjc.exe 4344 Sysqemayjuk.exe 4564 Sysqemygcug.exe 436 Sysqemqvsni.exe 4952 Sysqemlygiu.exe 3812 Sysqemnizdy.exe 3944 Sysqemdfrbq.exe 540 Sysqemvfvma.exe 4312 Sysqemtzamk.exe 4136 Sysqemdndvx.exe 3036 Sysqemvcdyw.exe 5060 Sysqemsalda.exe 3752 Sysqemvjege.exe 764 Sysqemyytwf.exe 3264 Sysqemlsirr.exe 4472 Sysqemhfexj.exe 4276 Sysqemiudim.exe 3980 Sysqemndmio.exe 2656 Sysqemfhitq.exe 2380 Sysqemnhigi.exe 4996 Sysqemfhvjs.exe 1832 Sysqemidzrh.exe 4180 Sysqemfekso.exe 4308 Sysqemfpfqo.exe 1000 Sysqemphtlm.exe 4588 Sysqemcunyg.exe 4912 Sysqemsokzi.exe 3956 Sysqemhaqjx.exe 3960 Sysqemaavuh.exe 4640 Sysqemukxiz.exe 1372 Sysqemhmede.exe 3456 Sysqemxuajq.exe 4356 Sysqempfxze.exe 1508 Sysqemeoteq.exe 1880 Sysqemcwesp.exe 4668 Sysqemaumxc.exe 3512 Sysqemwgjdu.exe 4320 Sysqemjbxyx.exe 3424 Sysqemmimog.exe 452 Sysqempdqwn.exe 3264 Sysqemeizkl.exe 1508 Sysqemubxkg.exe 4068 Sysqembmxup.exe 4656 Sysqemphqyg.exe 3148 Sysqemjcvfy.exe 2776 Sysqemcvjls.exe 4828 Sysqemzhfyq.exe 3872 Sysqempeolo.exe 640 Sysqemhaowc.exe 3140 Sysqemjzdru.exe 1516 Sysqemmrdux.exe 1348 Sysqemztlpu.exe -
resource yara_rule behavioral2/memory/2672-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023218-6.dat upx behavioral2/files/0x0007000000023217-41.dat upx behavioral2/files/0x0007000000023219-71.dat upx behavioral2/memory/264-73-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002321b-107.dat upx behavioral2/memory/2672-137-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002321d-143.dat upx behavioral2/memory/5004-150-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002321e-179.dat upx behavioral2/memory/264-209-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000900000002321f-215.dat upx behavioral2/memory/5044-249-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0009000000023221-251.dat upx behavioral2/memory/2296-281-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0008000000023224-287.dat upx behavioral2/files/0x0007000000023225-322.dat upx behavioral2/memory/4280-328-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4524-353-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023227-359.dat upx behavioral2/memory/4564-361-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4000-390-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002322b-396.dat upx behavioral2/memory/436-402-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4420-427-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002322c-433.dat upx behavioral2/memory/4344-447-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002322e-469.dat upx behavioral2/memory/4564-475-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023230-506.dat upx behavioral2/memory/3944-508-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/436-513-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023235-543.dat upx behavioral2/memory/4952-549-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023236-579.dat upx behavioral2/memory/3812-581-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3944-614-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023238-616.dat upx behavioral2/files/0x0007000000023239-652.dat upx behavioral2/memory/540-657-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/5060-687-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4312-715-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4136-748-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/764-754-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3036-782-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/5060-792-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3752-848-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/764-881-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3264-919-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4472-947-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4276-980-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3980-991-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2656-1046-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2380-1076-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4996-1088-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1832-1113-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4180-1147-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4308-1187-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1000-1220-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4588-1253-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4912-1310-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3956-1343-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3960-1352-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4640-1382-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 60 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdqwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcunyg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfxze.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjcvfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembuwjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnizdy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhaowc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqvjgy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvcdyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfhitq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemidzrh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemukxiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempeolo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlygiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtzamk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsalda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmrdux.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygcug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaavuh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubxkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemndqdu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfvma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcwesp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemggvnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjsdz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdfrbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlsirr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemphtlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhaqjx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjbxyx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztlpu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhigi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfekso.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtsibk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjtyhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyytwf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhfexj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfpfqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeoteq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjzdru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembtqcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemayjuk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdndvx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemndmio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfhvjs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaumxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmimog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeizkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmxup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuajq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwgjdu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvjls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzhfyq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqvsni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiudim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemphqyg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjege.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsokzi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmede.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 5004 2672 db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe 93 PID 2672 wrote to memory of 5004 2672 db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe 93 PID 2672 wrote to memory of 5004 2672 db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe 93 PID 5004 wrote to memory of 264 5004 Sysqemtsibk.exe 94 PID 5004 wrote to memory of 264 5004 Sysqemtsibk.exe 94 PID 5004 wrote to memory of 264 5004 Sysqemtsibk.exe 94 PID 264 wrote to memory of 5044 264 Sysqembtqcb.exe 95 PID 264 wrote to memory of 5044 264 Sysqembtqcb.exe 95 PID 264 wrote to memory of 5044 264 Sysqembtqcb.exe 95 PID 5044 wrote to memory of 2296 5044 Sysqemjtyhb.exe 96 PID 5044 wrote to memory of 2296 5044 Sysqemjtyhb.exe 96 PID 5044 wrote to memory of 2296 5044 Sysqemjtyhb.exe 96 PID 2296 wrote to memory of 4280 2296 Sysqemggvnl.exe 97 PID 2296 wrote to memory of 4280 2296 Sysqemggvnl.exe 97 PID 2296 wrote to memory of 4280 2296 Sysqemggvnl.exe 97 PID 4280 wrote to memory of 4524 4280 Sysqemyjsdz.exe 98 PID 4280 wrote to memory of 4524 4280 Sysqemyjsdz.exe 98 PID 4280 wrote to memory of 4524 4280 Sysqemyjsdz.exe 98 PID 4524 wrote to memory of 4000 4524 Sysqemndqdu.exe 101 PID 4524 wrote to memory of 4000 4524 Sysqemndqdu.exe 101 PID 4524 wrote to memory of 4000 4524 Sysqemndqdu.exe 101 PID 4000 wrote to memory of 4420 4000 Sysqemqvjgy.exe 103 PID 4000 wrote to memory of 4420 4000 Sysqemqvjgy.exe 103 PID 4000 wrote to memory of 4420 4000 Sysqemqvjgy.exe 103 PID 4420 wrote to memory of 4344 4420 Sysqembuwjc.exe 105 PID 4420 wrote to memory of 4344 4420 Sysqembuwjc.exe 105 PID 4420 wrote to memory of 4344 4420 Sysqembuwjc.exe 105 PID 4344 wrote to memory of 4564 4344 Sysqemayjuk.exe 106 PID 4344 wrote to memory of 4564 4344 Sysqemayjuk.exe 106 PID 4344 wrote to memory of 4564 4344 Sysqemayjuk.exe 106 PID 4564 wrote to memory of 436 4564 Sysqemygcug.exe 107 PID 4564 wrote to memory of 436 4564 Sysqemygcug.exe 107 PID 4564 wrote to memory of 436 4564 Sysqemygcug.exe 107 PID 436 wrote to memory of 4952 436 Sysqemqvsni.exe 108 PID 436 wrote to memory of 4952 436 Sysqemqvsni.exe 108 PID 436 wrote to memory of 4952 436 Sysqemqvsni.exe 108 PID 4952 wrote to memory of 3812 4952 Sysqemlygiu.exe 110 PID 4952 wrote to memory of 3812 4952 Sysqemlygiu.exe 110 PID 4952 wrote to memory of 3812 4952 Sysqemlygiu.exe 110 PID 3812 wrote to memory of 3944 3812 Sysqemnizdy.exe 111 PID 3812 wrote to memory of 3944 3812 Sysqemnizdy.exe 111 PID 3812 wrote to memory of 3944 3812 Sysqemnizdy.exe 111 PID 3944 wrote to memory of 540 3944 Sysqemdfrbq.exe 112 PID 3944 wrote to memory of 540 3944 Sysqemdfrbq.exe 112 PID 3944 wrote to memory of 540 3944 Sysqemdfrbq.exe 112 PID 540 wrote to memory of 4312 540 Sysqemvfvma.exe 114 PID 540 wrote to memory of 4312 540 Sysqemvfvma.exe 114 PID 540 wrote to memory of 4312 540 Sysqemvfvma.exe 114 PID 4312 wrote to memory of 4136 4312 Sysqemtzamk.exe 115 PID 4312 wrote to memory of 4136 4312 Sysqemtzamk.exe 115 PID 4312 wrote to memory of 4136 4312 Sysqemtzamk.exe 115 PID 4136 wrote to memory of 3036 4136 Sysqemdndvx.exe 116 PID 4136 wrote to memory of 3036 4136 Sysqemdndvx.exe 116 PID 4136 wrote to memory of 3036 4136 Sysqemdndvx.exe 116 PID 3036 wrote to memory of 5060 3036 Sysqemvcdyw.exe 118 PID 3036 wrote to memory of 5060 3036 Sysqemvcdyw.exe 118 PID 3036 wrote to memory of 5060 3036 Sysqemvcdyw.exe 118 PID 5060 wrote to memory of 3752 5060 Sysqemsalda.exe 163 PID 5060 wrote to memory of 3752 5060 Sysqemsalda.exe 163 PID 5060 wrote to memory of 3752 5060 Sysqemsalda.exe 163 PID 3752 wrote to memory of 764 3752 Sysqemvjege.exe 120 PID 3752 wrote to memory of 764 3752 Sysqemvjege.exe 120 PID 3752 wrote to memory of 764 3752 Sysqemvjege.exe 120 PID 764 wrote to memory of 3264 764 Sysqemyytwf.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe"C:\Users\Admin\AppData\Local\Temp\db54a89577df688df6f6a1cb05e7764d21cfce010357bfd57869ed7e5d02059a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsibk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsibk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtqcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtqcb.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjtyhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtyhb.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemggvnl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemggvnl.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjsdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjsdz.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndqdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndqdu.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvjgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvjgy.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\Sysqembuwjc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembuwjc.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemayjuk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayjuk.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygcug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygcug.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvsni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvsni.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlygiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlygiu.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnizdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnizdy.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfrbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfrbq.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfvma.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfvma.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtzamk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtzamk.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdndvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdndvx.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcdyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcdyw.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsalda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsalda.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjege.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjege.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyytwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyytwf.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsirr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsirr.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfexj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfexj.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiudim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiudim.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndmio.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndmio.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfhitq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfhitq.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhigi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhigi.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfhvjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfhvjs.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidzrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidzrh.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfekso.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfekso.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpfqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpfqo.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphtlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphtlm.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcunyg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcunyg.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsokzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsokzi.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhaqjx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhaqjx.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaavuh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaavuh.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemukxiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukxiz.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmede.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmede.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuajq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuajq.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfxze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfxze.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeoteq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeoteq.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcwesp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwesp.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaumxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaumxc.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwgjdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgjdu.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbxyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbxyx.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmimog.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmimog.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdqwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdqwn.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeizkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeizkl.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubxkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubxkg.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmxup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmxup.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphqyg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphqyg.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcvfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcvfy.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvjls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvjls.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhfyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhfyq.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Sysqempeolo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempeolo.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhaowc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhaowc.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzdru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzdru.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrdux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrdux.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztlpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztlpu.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejhxp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejhxp.exe"61⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrxzfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxzfw.exe"62⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"63⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhjijj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjijj.exe"64⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzufzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzufzw.exe"65⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrxvxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxvxk.exe"66⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemognxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemognxf.exe"67⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlhxkb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhxkb.exe"68⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrndfa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrndfa.exe"69⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgcnds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcnds.exe"70⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\Sysqembbqlb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbqlb.exe"71⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemexvht.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexvht.exe"72⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwtisk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtisk.exe"73⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtnnkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnnkl.exe"74⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyaiyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyaiyq.exe"75⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtcotc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtcotc.exe"76⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqhsym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqhsym.exe"77⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlkzuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlkzuy.exe"78⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\Sysqemegzsf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemegzsf.exe"79⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgqsvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqsvj.exe"80⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdcxab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcxab.exe"81⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemblioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblioa.exe"82⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyynlt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyynlt.exe"83⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwgyza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgyza.exe"84⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiqbuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqbuj.exe"85⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemozkul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozkul.exe"86⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqyzxu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyzxu.exe"87⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfgvvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgvvp.exe"88⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqcxti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcxti.exe"89⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqdhrw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdhrw.exe"90⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoxdrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxdrx.exe"91⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdmnpp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmnpp.exe"92⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemagshz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagshz.exe"93⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\Sysqemavjac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavjac.exe"94⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqhqlr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqhqlr.exe"95⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\Sysqemisdjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemisdjz.exe"96⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\Sysqemawbhn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawbhn.exe"97⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemawces.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawces.exe"98⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapmcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapmcg.exe"99⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\Sysqemckqkn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckqkn.exe"100⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvkdnx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvkdnx.exe"101⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnzdqn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzdqn.exe"102⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfndjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfndjk.exe"103⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnodoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnodoc.exe"104⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnonmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnonmp.exe"105⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcpzfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpzfq.exe"106⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcamxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcamxf.exe"107⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsxvkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsxvkd.exe"108⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkqjiw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkqjiw.exe"109⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Sysqemidedb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidedb.exe"110⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcmhqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmhqk.exe"111⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmxgud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxgud.exe"112⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkrdmm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrdmm.exe"113⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuirhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuirhc.exe"114⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnfsfk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfsfk.exe"115⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhljoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhljoz.exe"116⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfjrtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjrtl.exe"117⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkvmgq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvmgq.exe"118⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuglka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuglka.exe"119⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\Sysqempmdsp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempmdsp.exe"120⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxuyqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuyqb.exe"121⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnziil.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnziil.exe"122⤵PID:1580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-