Analysis
-
max time kernel
85s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 18:39
Behavioral task
behavioral1
Sample
1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe
Resource
win10v2004-20240226-en
General
-
Target
1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe
-
Size
332KB
-
MD5
2cfa137794f8010edf5527110b8f6c78
-
SHA1
111b76a0d6f8248b5c9404ecb0d5becba7b685a7
-
SHA256
1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572
-
SHA512
205aca933eac0aca4bd2b33a2b374712045923d9041ddaed5fa21e127a1d9801aafb72ddbc57f6c6fc79348bbac8f0d92c9c49b39dc7fcdb880793fac84a17a4
-
SSDEEP
3072:1dEUfKj8BYbDiC1ZTK7sxtLUIGcJLUIWdEUfKj8BYbDiC1ZJtA9V3E/GbT6hnyOF:1USiZTK40p7USiZI9xEFh9qs
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023207-6.dat UPX behavioral2/files/0x0008000000023203-42.dat UPX behavioral2/files/0x0008000000023204-72.dat UPX behavioral2/files/0x0007000000023209-108.dat UPX behavioral2/files/0x000300000002276c-144.dat UPX behavioral2/files/0x000300000002276e-180.dat UPX behavioral2/files/0x000700000002320a-215.dat UPX behavioral2/files/0x000e000000023121-251.dat UPX behavioral2/memory/392-258-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x000700000002320b-288.dat UPX behavioral2/memory/3288-289-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2532-296-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/676-322-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x000b00000002311b-328.dat UPX behavioral2/memory/2604-336-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x000a000000023120-366.dat UPX behavioral2/memory/2240-374-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4788-400-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3496-406-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x000700000002320c-408.dat UPX behavioral2/memory/232-416-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x000700000002320d-446.dat UPX behavioral2/memory/3288-483-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x000700000002320f-484.dat UPX behavioral2/memory/1548-486-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4212-492-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x0007000000023210-522.dat UPX behavioral2/memory/2540-530-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1924-556-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x0007000000023211-562.dat UPX behavioral2/memory/4920-566-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3500-565-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4868-602-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x0007000000023212-601.dat UPX behavioral2/memory/1548-632-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x0007000000023214-638.dat UPX behavioral2/memory/2400-670-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x0007000000023215-676.dat UPX behavioral2/memory/3896-678-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4920-708-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4868-743-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3680-749-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4684-778-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3896-822-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4700-848-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/332-854-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3680-883-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/856-889-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2936-923-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3684-924-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3416-953-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3500-959-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/332-988-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2332-994-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3740-1027-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/856-1056-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3684-1091-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3500-1102-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2332-1128-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1364-1134-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3740-1163-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4924-1169-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1392-1198-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3236-1204-0x0000000000400000-0x00000000004C9000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemdcxab.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemttxgq.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemavxyd.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemslhhe.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqembaigu.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemguxwh.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemucwzq.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemxulmh.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemktyef.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemworwh.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgcnds.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemmbfnm.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemotsur.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemfoukc.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemodlrp.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemzzrjq.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemblsdo.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemebnms.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemkbzig.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgakgs.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgctzq.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemwacvo.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgldja.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemduiub.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemstgsf.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemjvynh.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemznbnw.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqembidly.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemfctyx.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemzxwix.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemtyada.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemriran.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemqkhri.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemewkec.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemlepuv.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqembnikn.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgzvsk.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemxjmsn.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemuvpns.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgdkde.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemrtsoa.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemkadup.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemcpoqd.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemxioyn.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemlmfxq.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemmgxav.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemlxvxv.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemxszwp.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemmqtwk.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemwzxqj.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemnvhvl.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemwwpae.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemltkdp.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemizwbo.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemovwer.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemfmdel.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemeapdp.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemfdmco.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemiobui.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemcfxrk.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqembdxze.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqembbews.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemlafsq.exe -
Executes dropped EXE 64 IoCs
pid Process 2532 Sysqemrtspk.exe 676 Sysqemriran.exe 2604 Sysqemznbnw.exe 2240 Sysqemwhnih.exe 4788 Sysqembidly.exe 3496 Sysqembbews.exe 232 Sysqemjbdwg.exe 3288 Sysqemodlrp.exe 4212 Sysqemtxfuz.exe 2540 Sysqemeivjg.exe 1924 Sysqemlmfxq.exe 3500 Sysqemlepuv.exe 1548 Sysqemmbfnm.exe 2400 Sysqemgdkde.exe 4920 Sysqemwacvo.exe 4868 Sysqemrhuwc.exe 4684 Sysqemgldja.exe 3896 Sysqemotsur.exe 4700 Sysqemebnms.exe 3680 Sysqemtntfi.exe 2936 Sysqemjstaa.exe 3416 Sysqemwuavx.exe 332 Sysqemwjyga.exe 856 Sysqemguxwh.exe 3684 Sysqemwrgjf.exe 3500 Sysqemvrihk.exe 2332 Sysqemdwtzn.exe 3740 Sysqemlafsq.exe 1392 Sysqemnvhvl.exe 908 Sysqemwwpae.exe 1364 Sysqemttxgq.exe 4924 Sysqembbmlw.exe 3236 Sysqemqkhri.exe 2400 Sysqemvanrq.exe 3120 Sysqemlxvxv.exe 4764 Sysqembnikn.exe 3960 Sysqemgakgs.exe 624 Sysqemlnftx.exe 2612 Sysqemdcgwn.exe 4952 Sysqemduiub.exe 3300 Sysqemlvqzt.exe 4080 Sysqemffkmk.exe 2700 Sysqemdzpnu.exe 2164 Sysqemilkaz.exe 2836 Sysqemqxjtz.exe 4964 Sysqemfctyx.exe 392 Sysqemqxvwy.exe 2532 Sysqemktyef.exe 4388 Sysqemstgsf.exe 3336 Sysqemxjmsn.exe 2072 Sysqemfdmco.exe 2804 Sysqemxznav.exe 4016 Sysqemsutwh.exe 1628 Sysqemxszwp.exe 2708 Sysqemiobui.exe 4960 Sysqemfsfra.exe 4688 Sysqemkfanf.exe 4764 Sysqempsvak.exe 2380 Sysqemavxyd.exe 4264 Sysqemvqdto.exe 2756 Sysqemfmdel.exe 4984 Sysqemunpwl.exe 3976 Sysqemzzrjq.exe 2244 Sysqemucwzq.exe -
resource yara_rule behavioral2/memory/392-0-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x0007000000023207-6.dat upx behavioral2/memory/2532-37-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x0008000000023203-42.dat upx behavioral2/files/0x0008000000023204-72.dat upx behavioral2/memory/676-74-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x0007000000023209-108.dat upx behavioral2/memory/2604-110-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000300000002276c-144.dat upx behavioral2/memory/2240-146-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000300000002276e-180.dat upx behavioral2/files/0x000700000002320a-215.dat upx behavioral2/memory/3496-217-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000e000000023121-251.dat upx behavioral2/memory/392-258-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000700000002320b-288.dat upx behavioral2/memory/3288-289-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2532-296-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/676-322-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000b00000002311b-328.dat upx behavioral2/memory/4212-330-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2604-336-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000a000000023120-366.dat upx behavioral2/memory/2540-368-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2240-374-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4788-400-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3496-406-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000700000002320c-408.dat upx behavioral2/memory/1924-410-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/232-416-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000700000002320d-446.dat upx behavioral2/memory/3500-448-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3288-483-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x000700000002320f-484.dat upx behavioral2/memory/1548-486-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4212-492-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x0007000000023210-522.dat upx behavioral2/memory/2400-524-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2540-530-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1924-556-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x0007000000023211-562.dat upx behavioral2/memory/4920-566-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3500-565-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4868-602-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x0007000000023212-601.dat upx behavioral2/memory/1548-632-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x0007000000023214-638.dat upx behavioral2/memory/4684-639-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2400-670-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x0007000000023215-676.dat upx behavioral2/memory/3896-678-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4920-708-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4700-714-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4868-743-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3680-749-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4684-778-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2936-787-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3416-817-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3896-822-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4700-848-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/332-854-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3680-883-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/856-889-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2936-923-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrhuwc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtntfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvrihk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdcxab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuxbue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmqtwk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzxwix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemduiub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvjpx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemevlgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwuavx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjyga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemguxwh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqkhri.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemucwzq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhhrxs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgctzq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlmfxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkfanf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrtsoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlepuv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxznav.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwxor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemexfne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgakgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqxvwy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiobui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembitnq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltkdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemewkec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtyada.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxvxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvqzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwpxzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgpgeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhnih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjbdwg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwacvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemttxgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemffkmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvjls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjjfrh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembnikn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdzpnu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempsvak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemizwbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvanrq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemslhhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcrewi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblsdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgzvsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrtspk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemriran.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjmsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkbzig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfctyx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjvqod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembidly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqxjtz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfsfra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxulmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgdkde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeapdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlnftx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 2532 392 1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe 88 PID 392 wrote to memory of 2532 392 1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe 88 PID 392 wrote to memory of 2532 392 1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe 88 PID 2532 wrote to memory of 676 2532 Sysqemrtspk.exe 89 PID 2532 wrote to memory of 676 2532 Sysqemrtspk.exe 89 PID 2532 wrote to memory of 676 2532 Sysqemrtspk.exe 89 PID 676 wrote to memory of 2604 676 Sysqemriran.exe 90 PID 676 wrote to memory of 2604 676 Sysqemriran.exe 90 PID 676 wrote to memory of 2604 676 Sysqemriran.exe 90 PID 2604 wrote to memory of 2240 2604 Sysqemznbnw.exe 91 PID 2604 wrote to memory of 2240 2604 Sysqemznbnw.exe 91 PID 2604 wrote to memory of 2240 2604 Sysqemznbnw.exe 91 PID 2240 wrote to memory of 4788 2240 Sysqemwhnih.exe 92 PID 2240 wrote to memory of 4788 2240 Sysqemwhnih.exe 92 PID 2240 wrote to memory of 4788 2240 Sysqemwhnih.exe 92 PID 4788 wrote to memory of 3496 4788 Sysqembidly.exe 93 PID 4788 wrote to memory of 3496 4788 Sysqembidly.exe 93 PID 4788 wrote to memory of 3496 4788 Sysqembidly.exe 93 PID 3496 wrote to memory of 232 3496 Sysqembbews.exe 94 PID 3496 wrote to memory of 232 3496 Sysqembbews.exe 94 PID 3496 wrote to memory of 232 3496 Sysqembbews.exe 94 PID 232 wrote to memory of 3288 232 Sysqemjbdwg.exe 95 PID 232 wrote to memory of 3288 232 Sysqemjbdwg.exe 95 PID 232 wrote to memory of 3288 232 Sysqemjbdwg.exe 95 PID 3288 wrote to memory of 4212 3288 Sysqemodlrp.exe 96 PID 3288 wrote to memory of 4212 3288 Sysqemodlrp.exe 96 PID 3288 wrote to memory of 4212 3288 Sysqemodlrp.exe 96 PID 4212 wrote to memory of 2540 4212 Sysqemtxfuz.exe 97 PID 4212 wrote to memory of 2540 4212 Sysqemtxfuz.exe 97 PID 4212 wrote to memory of 2540 4212 Sysqemtxfuz.exe 97 PID 2540 wrote to memory of 1924 2540 Sysqemeivjg.exe 100 PID 2540 wrote to memory of 1924 2540 Sysqemeivjg.exe 100 PID 2540 wrote to memory of 1924 2540 Sysqemeivjg.exe 100 PID 1924 wrote to memory of 3500 1924 Sysqemlmfxq.exe 120 PID 1924 wrote to memory of 3500 1924 Sysqemlmfxq.exe 120 PID 1924 wrote to memory of 3500 1924 Sysqemlmfxq.exe 120 PID 3500 wrote to memory of 1548 3500 Sysqemlepuv.exe 104 PID 3500 wrote to memory of 1548 3500 Sysqemlepuv.exe 104 PID 3500 wrote to memory of 1548 3500 Sysqemlepuv.exe 104 PID 1548 wrote to memory of 2400 1548 Sysqemmbfnm.exe 105 PID 1548 wrote to memory of 2400 1548 Sysqemmbfnm.exe 105 PID 1548 wrote to memory of 2400 1548 Sysqemmbfnm.exe 105 PID 2400 wrote to memory of 4920 2400 Sysqemgdkde.exe 106 PID 2400 wrote to memory of 4920 2400 Sysqemgdkde.exe 106 PID 2400 wrote to memory of 4920 2400 Sysqemgdkde.exe 106 PID 4920 wrote to memory of 4868 4920 Sysqemwacvo.exe 108 PID 4920 wrote to memory of 4868 4920 Sysqemwacvo.exe 108 PID 4920 wrote to memory of 4868 4920 Sysqemwacvo.exe 108 PID 4868 wrote to memory of 4684 4868 Sysqemrhuwc.exe 109 PID 4868 wrote to memory of 4684 4868 Sysqemrhuwc.exe 109 PID 4868 wrote to memory of 4684 4868 Sysqemrhuwc.exe 109 PID 4684 wrote to memory of 3896 4684 Sysqemgldja.exe 110 PID 4684 wrote to memory of 3896 4684 Sysqemgldja.exe 110 PID 4684 wrote to memory of 3896 4684 Sysqemgldja.exe 110 PID 3896 wrote to memory of 4700 3896 Sysqemotsur.exe 111 PID 3896 wrote to memory of 4700 3896 Sysqemotsur.exe 111 PID 3896 wrote to memory of 4700 3896 Sysqemotsur.exe 111 PID 4700 wrote to memory of 3680 4700 Sysqemebnms.exe 114 PID 4700 wrote to memory of 3680 4700 Sysqemebnms.exe 114 PID 4700 wrote to memory of 3680 4700 Sysqemebnms.exe 114 PID 3680 wrote to memory of 2936 3680 Sysqemtntfi.exe 115 PID 3680 wrote to memory of 2936 3680 Sysqemtntfi.exe 115 PID 3680 wrote to memory of 2936 3680 Sysqemtntfi.exe 115 PID 2936 wrote to memory of 3416 2936 Sysqemjstaa.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe"C:\Users\Admin\AppData\Local\Temp\1242c19ef723a315459e94be3113856a8fdc4f6ebc3baf06e0d84ba21bb28572.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtspk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtspk.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemriran.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemriran.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznbnw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznbnw.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhnih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhnih.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqembidly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembidly.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqembbews.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbews.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbdwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbdwg.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodlrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodlrp.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxfuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxfuz.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeivjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeivjg.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmfxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmfxq.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlepuv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlepuv.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbfnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbfnm.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgdkde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgdkde.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwacvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwacvo.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrhuwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrhuwc.exe"17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgldja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgldja.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotsur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotsur.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebnms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebnms.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtntfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtntfi.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjstaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjstaa.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwuavx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuavx.exe"23⤵
- Executes dropped EXE
- Modifies registry class
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjyga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjyga.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguxwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguxwh.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrgjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrgjf.exe"26⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvrihk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrihk.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdwtzn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdwtzn.exe"28⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlafsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlafsq.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnvhvl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnvhvl.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwwpae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwpae.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttxgq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttxgq.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\Sysqembbmlw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbmlw.exe"33⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqkhri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkhri.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxvxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxvxv.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnikn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnikn.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgakgs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgakgs.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnftx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnftx.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcgwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcgwn.exe"40⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemduiub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemduiub.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvqzt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvqzt.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffkmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffkmk.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdzpnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdzpnu.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilkaz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilkaz.exe"45⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxjtz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxjtz.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfctyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfctyx.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxvwy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxvwy.exe"48⤵
- Executes dropped EXE
- Modifies registry class
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemktyef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemktyef.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemstgsf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemstgsf.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjmsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjmsn.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfdmco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfdmco.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxznav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxznav.exe"53⤵
- Executes dropped EXE
- Modifies registry class
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsutwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsutwh.exe"54⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxszwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxszwp.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiobui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiobui.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfsfra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfsfra.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkfanf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfanf.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Sysqempsvak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsvak.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemavxyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavxyd.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqdto.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqdto.exe"61⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmdel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmdel.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunpwl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunpwl.exe"63⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzrjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzrjq.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucwzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucwzq.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemslhhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslhhe.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptrhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptrhr.exe"67⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemslskv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslskv.exe"68⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"69⤵
- Checks computer location settings
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtsoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtsoa.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsfqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsfqw.exe"71⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxulmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxulmh.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkadup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkadup.exe"73⤵
- Checks computer location settings
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfoukc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfoukc.exe"74⤵
- Checks computer location settings
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzizac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzizac.exe"75⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcpoqd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpoqd.exe"76⤵
- Checks computer location settings
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkbzig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbzig.exe"77⤵
- Checks computer location settings
- Modifies registry class
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeapdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeapdp.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvvyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvvyb.exe"79⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxbue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxbue.exe"80⤵
- Modifies registry class
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcfxrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfxrk.exe"81⤵
- Checks computer location settings
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmlcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmlcg.exe"82⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhhrxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhhrxs.exe"83⤵
- Modifies registry class
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxioyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxioyn.exe"84⤵
- Checks computer location settings
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvjls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvjls.exe"85⤵
- Modifies registry class
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcrewi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrewi.exe"86⤵
- Modifies registry class
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjvqod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvqod.exe"87⤵
- Modifies registry class
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmqtwk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqtwk.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhyxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhyxg.exe"89⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"90⤵
- Checks computer location settings
PID:100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzxwix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxwix.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwvenc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvenc.exe"92⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtwxor.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwxor.exe"93⤵
- Modifies registry class
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqembaigu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembaigu.exe"94⤵
- Checks computer location settings
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemworwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemworwh.exe"95⤵
- Checks computer location settings
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgctzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgctzq.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuplui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuplui.exe"97⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\Sysqembitnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembitnq.exe"98⤵
- Modifies registry class
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltkdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltkdp.exe"99⤵
- Checks computer location settings
- Modifies registry class
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtagiv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtagiv.exe"100⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgcnds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcnds.exe"101⤵
- Checks computer location settings
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemewkec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewkec.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjjfrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjfrh.exe"103⤵
- Modifies registry class
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwpxzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwpxzh.exe"104⤵
- Modifies registry class
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"105⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjvynh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvynh.exe"106⤵
- Checks computer location settings
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtyada.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyada.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexfne.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexfne.exe"108⤵
- Modifies registry class
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizwbo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizwbo.exe"109⤵
- Checks computer location settings
- Modifies registry class
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgihon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgihon.exe"110⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgpgeg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpgeg.exe"111⤵
- Modifies registry class
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdxze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdxze.exe"112⤵
- Checks computer location settings
PID:636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvjpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvjpx.exe"113⤵
- Modifies registry class
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcxab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcxab.exe"114⤵
- Checks computer location settings
- Modifies registry class
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwzxqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzxqj.exe"115⤵
- Checks computer location settings
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblsdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblsdo.exe"116⤵
- Checks computer location settings
- Modifies registry class
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevlgs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevlgs.exe"117⤵
- Modifies registry class
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemovwer.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovwer.exe"118⤵
- Checks computer location settings
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvdskp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdskp.exe"119⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgzvsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgzvsk.exe"120⤵
- Checks computer location settings
- Modifies registry class
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemseoak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemseoak.exe"121⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdaqyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdaqyl.exe"122⤵PID:1704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-