Analysis
-
max time kernel
44s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe
Resource
win10v2004-20240226-en
General
-
Target
be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe
-
Size
82KB
-
MD5
cf05b6eb616dd077443786bee4c7b90c
-
SHA1
bedcb5011de27307f075a48b13b3cb29eabab491
-
SHA256
be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f
-
SHA512
5d985095ae12df218ca3ec10e307f4f2bc7390d89bcc477ccc9cbf51facb021221ef8296c3eed6f5fdfc3f19254531bd24bee558a08d4177f4ad2cb5a0b20da4
-
SSDEEP
1536:6zfMMkqZPUMRsNFljx5sGOgMsqPhd976zdNE6ecbe1wA2sAVza:AfMibQPj7Msq5j5cUwAZ4O
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 64 IoCs
resource yara_rule behavioral2/memory/3428-0-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3428-1-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023231-7.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/1812-38-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023230-43.dat INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023232-73.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4064-75-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4064-76-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023233-110.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/2244-112-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023234-146.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4712-148-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3428-177-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000e000000023142-183.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/1620-185-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1812-190-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023235-220.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4064-226-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000b00000002313c-257.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4152-259-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2244-264-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000a000000023123-294.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4712-295-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3352-297-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3352-302-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1620-328-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023237-334.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3492-336-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4500-341-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023238-371.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/820-373-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4152-378-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023239-408.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4548-410-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000a00000002323b-445.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/1396-451-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000800000002323f-481.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3492-482-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2416-484-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023240-518.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/1644-522-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/820-549-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000300000002289b-556.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3244-561-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4548-586-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0008000000023242-592.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/664-594-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2416-624-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023246-630.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/736-632-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1644-637-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023247-667.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/2340-669-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3244-670-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4872-703-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/664-731-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4548-738-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/736-769-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2340-802-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/224-807-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4872-832-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2388-838-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4548-845-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3552-872-0x0000000000400000-0x0000000000493000-memory.dmp INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/4064-76-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2244-112-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3428-177-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1620-185-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1812-190-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4064-226-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4152-259-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2244-264-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4712-295-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3352-297-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3352-302-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1620-328-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4500-341-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4152-378-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1396-451-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3492-482-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2416-484-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1644-522-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/820-549-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3244-561-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4548-586-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/664-594-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2416-624-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/736-632-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1644-637-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2340-669-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3244-670-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4872-703-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/664-731-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4548-738-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/736-769-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2340-802-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/224-807-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4872-832-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4548-845-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/5044-876-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/224-910-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2388-940-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3512-941-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3552-978-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2196-1008-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3756-1013-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4568-1042-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3512-1046-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3540-1076-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4916-1080-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2196-1111-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1436-1110-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4568-1139-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4852-1215-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1436-1240-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2660-1246-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4688-1271-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1604-1280-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4500-1285-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4852-1341-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2660-1375-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1604-1408-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1952-1414-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4064-1442-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2488-1476-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4024-1483-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3188-1517-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1952-1554-0x0000000000400000-0x0000000000493000-memory.dmp UPX -
Checks computer location settings 2 TTPs 57 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemxjdkg.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemkwshm.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemcjkoc.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemgqgsk.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemfzqmu.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemhvuzh.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemfffru.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemklsay.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqempfxze.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemxuvul.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemxoaxr.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemrhqwh.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemknbsq.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemvqkxo.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqempgjpg.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemkkets.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemrdpxa.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemyrdjv.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemsgjtw.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemuvloh.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemzmnqw.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemvffko.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemqwdqi.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemkjodz.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemtbium.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemukxiz.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemafqau.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemepejg.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqempocpb.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemroeaw.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemxtudm.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemvfqqk.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemndmio.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemxpyfs.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemxdlsi.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemxnljl.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemdbwyh.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemcifww.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemrfzky.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemnzhtw.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemdtblb.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemkpvzc.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemuyfwu.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemrddgx.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemefscu.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemiziqg.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemksyjj.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemwezxe.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemgtwtl.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemfxkeu.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemqvsni.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemlqtgd.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemueolz.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemelmcz.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemrntxw.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation Sysqemiemye.exe -
Executes dropped EXE 57 IoCs
pid Process 1812 Sysqemdtblb.exe 4064 Sysqemyrdjv.exe 2244 Sysqemtbium.exe 4712 Sysqemvqkxo.exe 1620 Sysqemqvsni.exe 4500 Sysqemxoaxr.exe 4152 Sysqemqwdqi.exe 3352 Sysqemdbwyh.exe 3492 Sysqemgtwtl.exe 820 Sysqemfxkeu.exe 4548 Sysqemvffko.exe 1396 Sysqemxpyfs.exe 2416 Sysqemgqgsk.exe 1644 Sysqemxtudm.exe 3244 Sysqemvfqqk.exe 664 Sysqemiemye.exe 736 Sysqemfffru.exe 2340 Sysqemkpvzc.exe 4872 Sysqemfzqmu.exe 4548 Sysqemklsay.exe 5044 Sysqemafqau.exe 224 Sysqemndmio.exe 2388 Sysqemnzhtw.exe 3552 Sysqemlqtgd.exe 3756 Sysqemcifww.exe 3512 Sysqemxdlsi.exe 3540 Sysqemknbsq.exe 2196 Sysqemkjodz.exe 4568 Sysqemiziqg.exe 4916 Sysqemsgjtw.exe 1436 Sysqemksyjj.exe 4688 Sysqemxjdkg.exe 4500 Sysqemukxiz.exe 4852 Sysqemuvloh.exe 2660 Sysqemxnljl.exe 1604 Sysqempfxze.exe 4064 Sysqemkwshm.exe 2488 Sysqempgjpg.exe 3188 Sysqemrfzky.exe 1952 Sysqemzmnqw.exe 3100 Sysqemueolz.exe 4024 Sysqemepejg.exe 2244 Sysqemhvuzh.exe 1012 Sysqemcjkoc.exe 3688 Sysqempocpb.exe 2200 Sysqemelmcz.exe 5080 Sysqemrntxw.exe 2484 Sysqemwezxe.exe 3992 Sysqemroeaw.exe 1636 Sysqemkkets.exe 4844 Sysqemuyfwu.exe 4372 Sysqemrhqwh.exe 3608 Sysqemrddgx.exe 1532 Sysqemefscu.exe 4360 Sysqemxuvul.exe 1952 Sysqemrdpxa.exe 3100 Sysqemmursx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 57 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyrdjv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwezxe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrhqwh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfxkeu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkpvzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkjodz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtbium.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxoaxr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqgsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfffru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxnljl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcjkoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqvsni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbwyh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxpyfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfxze.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemueolz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemafqau.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemklsay.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnzhtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxdlsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjdkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqwdqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgjpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuvul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcifww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkkets.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrdpxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvqkxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfzqmu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemndmio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsgjtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemksyjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhvuzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfqqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiziqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzmnqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempocpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefscu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtwtl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemknbsq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemepejg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrntxw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvffko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwshm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrfzky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemroeaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuyfwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrddgx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiemye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdtblb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxtudm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlqtgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemukxiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuvloh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemelmcz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3428 wrote to memory of 1812 3428 be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe 89 PID 3428 wrote to memory of 1812 3428 be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe 89 PID 3428 wrote to memory of 1812 3428 be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe 89 PID 1812 wrote to memory of 4064 1812 Sysqemdtblb.exe 91 PID 1812 wrote to memory of 4064 1812 Sysqemdtblb.exe 91 PID 1812 wrote to memory of 4064 1812 Sysqemdtblb.exe 91 PID 4064 wrote to memory of 2244 4064 Sysqemyrdjv.exe 92 PID 4064 wrote to memory of 2244 4064 Sysqemyrdjv.exe 92 PID 4064 wrote to memory of 2244 4064 Sysqemyrdjv.exe 92 PID 2244 wrote to memory of 4712 2244 Sysqemtbium.exe 93 PID 2244 wrote to memory of 4712 2244 Sysqemtbium.exe 93 PID 2244 wrote to memory of 4712 2244 Sysqemtbium.exe 93 PID 4712 wrote to memory of 1620 4712 Sysqemvqkxo.exe 96 PID 4712 wrote to memory of 1620 4712 Sysqemvqkxo.exe 96 PID 4712 wrote to memory of 1620 4712 Sysqemvqkxo.exe 96 PID 1620 wrote to memory of 4500 1620 Sysqemqvsni.exe 97 PID 1620 wrote to memory of 4500 1620 Sysqemqvsni.exe 97 PID 1620 wrote to memory of 4500 1620 Sysqemqvsni.exe 97 PID 4500 wrote to memory of 4152 4500 Sysqemxoaxr.exe 100 PID 4500 wrote to memory of 4152 4500 Sysqemxoaxr.exe 100 PID 4500 wrote to memory of 4152 4500 Sysqemxoaxr.exe 100 PID 4152 wrote to memory of 3352 4152 Sysqemqwdqi.exe 101 PID 4152 wrote to memory of 3352 4152 Sysqemqwdqi.exe 101 PID 4152 wrote to memory of 3352 4152 Sysqemqwdqi.exe 101 PID 3352 wrote to memory of 3492 3352 Sysqemdbwyh.exe 102 PID 3352 wrote to memory of 3492 3352 Sysqemdbwyh.exe 102 PID 3352 wrote to memory of 3492 3352 Sysqemdbwyh.exe 102 PID 3492 wrote to memory of 820 3492 Sysqemgtwtl.exe 103 PID 3492 wrote to memory of 820 3492 Sysqemgtwtl.exe 103 PID 3492 wrote to memory of 820 3492 Sysqemgtwtl.exe 103 PID 820 wrote to memory of 4548 820 Sysqemfxkeu.exe 116 PID 820 wrote to memory of 4548 820 Sysqemfxkeu.exe 116 PID 820 wrote to memory of 4548 820 Sysqemfxkeu.exe 116 PID 4548 wrote to memory of 1396 4548 Sysqemvffko.exe 106 PID 4548 wrote to memory of 1396 4548 Sysqemvffko.exe 106 PID 4548 wrote to memory of 1396 4548 Sysqemvffko.exe 106 PID 1396 wrote to memory of 2416 1396 Sysqemxpyfs.exe 107 PID 1396 wrote to memory of 2416 1396 Sysqemxpyfs.exe 107 PID 1396 wrote to memory of 2416 1396 Sysqemxpyfs.exe 107 PID 2416 wrote to memory of 1644 2416 Sysqemgqgsk.exe 108 PID 2416 wrote to memory of 1644 2416 Sysqemgqgsk.exe 108 PID 2416 wrote to memory of 1644 2416 Sysqemgqgsk.exe 108 PID 1644 wrote to memory of 3244 1644 Sysqemxtudm.exe 110 PID 1644 wrote to memory of 3244 1644 Sysqemxtudm.exe 110 PID 1644 wrote to memory of 3244 1644 Sysqemxtudm.exe 110 PID 3244 wrote to memory of 664 3244 Sysqemvfqqk.exe 112 PID 3244 wrote to memory of 664 3244 Sysqemvfqqk.exe 112 PID 3244 wrote to memory of 664 3244 Sysqemvfqqk.exe 112 PID 664 wrote to memory of 736 664 Sysqemiemye.exe 113 PID 664 wrote to memory of 736 664 Sysqemiemye.exe 113 PID 664 wrote to memory of 736 664 Sysqemiemye.exe 113 PID 736 wrote to memory of 2340 736 Sysqemfffru.exe 114 PID 736 wrote to memory of 2340 736 Sysqemfffru.exe 114 PID 736 wrote to memory of 2340 736 Sysqemfffru.exe 114 PID 2340 wrote to memory of 4872 2340 Sysqemkpvzc.exe 115 PID 2340 wrote to memory of 4872 2340 Sysqemkpvzc.exe 115 PID 2340 wrote to memory of 4872 2340 Sysqemkpvzc.exe 115 PID 4872 wrote to memory of 4548 4872 Sysqemfzqmu.exe 116 PID 4872 wrote to memory of 4548 4872 Sysqemfzqmu.exe 116 PID 4872 wrote to memory of 4548 4872 Sysqemfzqmu.exe 116 PID 4548 wrote to memory of 5044 4548 Sysqemklsay.exe 117 PID 4548 wrote to memory of 5044 4548 Sysqemklsay.exe 117 PID 4548 wrote to memory of 5044 4548 Sysqemklsay.exe 117 PID 5044 wrote to memory of 224 5044 Sysqemafqau.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe"C:\Users\Admin\AppData\Local\Temp\be351124077f6a331e1b8ee78e1991a96607ce1d264043c81acb47465ba25b0f.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyrdjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyrdjv.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtbium.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbium.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqkxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqkxo.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvsni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvsni.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxoaxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxoaxr.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwdqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwdqi.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbwyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbwyh.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxkeu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxkeu.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvffko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvffko.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxpyfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxpyfs.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqgsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqgsk.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxtudm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtudm.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfqqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfqqk.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiemye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiemye.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfffru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfffru.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkpvzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpvzc.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzqmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzqmu.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklsay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklsay.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafqau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafqau.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndmio.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndmio.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnzhtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzhtw.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqtgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqtgd.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcifww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcifww.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxdlsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdlsi.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemknbsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemknbsq.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkjodz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjodz.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiziqg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiziqg.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsgjtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgjtw.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemksyjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksyjj.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjdkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjdkg.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemukxiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukxiz.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvloh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvloh.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnljl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnljl.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfxze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfxze.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwshm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwshm.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrfzky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfzky.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmnqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmnqw.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemueolz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemueolz.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemepejg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemepejg.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhvuzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvuzh.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcjkoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjkoc.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Sysqempocpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempocpb.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemelmcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemelmcz.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrntxw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrntxw.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwezxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwezxe.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemroeaw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemroeaw.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkkets.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkkets.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwu.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrhqwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrhqwh.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrddgx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrddgx.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefscu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefscu.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuvul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuvul.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrdpxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdpxa.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmursx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmursx.exe"58⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtddsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtddsy.exe"59⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoufvv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoufvv.exe"60⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwyqoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyqoq.exe"61⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmdztw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdztw.exe"62⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhjijj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjijj.exe"63⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwrcbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrcbk.exe"64⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwrdpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrdpv.exe"65⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwgbuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgbuu.exe"66⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\Sysqemojpfo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojpfo.exe"67⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemryfnx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryfnx.exe"68⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjyrya.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjyrya.exe"69⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhvzdn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvzdn.exe"70⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjrdtt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrdtt.exe"71⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgolzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgolzg.exe"72⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemghnxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghnxl.exe"73⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtnefa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnefa.exe"74⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemivalm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivalm.exe"75⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiokaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiokaa.exe"76⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\Sysqemglsoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglsoe.exe"77⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\Sysqemboyjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemboyjq.exe"78⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\Sysqembdwut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdwut.exe"79⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\Sysqemejmku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejmku.exe"80⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\Sysqembhupg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhupg.exe"81⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwnlyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwnlyv.exe"82⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyfebz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfebz.exe"83⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwdmgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdmgd.exe"84⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdseed.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdseed.exe"85⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaqmri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqmri.exe"86⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqrlxp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrlxp.exe"87⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvhryw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhryw.exe"88⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqzlgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzlgf.exe"89⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnafyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnafyv.exe"90⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Sysqemluczw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemluczw.exe"91⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtnkxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnkxr.exe"92⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlcmfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcmfs.exe"93⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemluwdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemluwdg.exe"94⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdfutu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfutu.exe"95⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdkfmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkfmp.exe"96⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkdfex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdfex.exe"97⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemytjmr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytjmr.exe"98⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemswocr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswocr.exe"99⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\Sysqempijpi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempijpi.exe"100⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkzdsf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkzdsf.exe"101⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\Sysqemieknp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemieknp.exe"102⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcdais.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdais.exe"103⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqbwqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbwqm.exe"104⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqqvbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqvbx.exe"105⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemclloo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemclloo.exe"106⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemafipy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafipy.exe"107⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcamxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcamxf.exe"108⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsihdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsihdr.exe"109⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkuvar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuvar.exe"110⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhvobh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvobh.exe"111⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhzbep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzbep.exe"112⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemskbhh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemskbhh.exe"113⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemscdfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscdfn.exe"114⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxijam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxijam.exe"115⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Sysqemppjvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppjvc.exe"116⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkvbdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvbdr.exe"117⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhsjrd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhsjrd.exe"118⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkkjmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkkjmh.exe"119⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeqbuw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqbuw.exe"120⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcojaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcojaa.exe"121⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmovll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmovll.exe"122⤵PID:4500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-