Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 21:20
Behavioral task
behavioral1
Sample
60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe
Resource
win10v2004-20240226-en
General
-
Target
60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe
-
Size
239KB
-
MD5
1c8d865709dd05a953ed5fd2887763ce
-
SHA1
a3a67cd3ea5a1b085cf81ffed3a954833cc74af0
-
SHA256
60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9
-
SHA512
1fbcc058a17d9fd37eddfe210fd3a2a8c04e56fe4702be4453977749fa24980d9ab434ad4a7c21bfbf6dbdc5bf48ac94156a4e84cebe399cfd609704e70be4a1
-
SSDEEP
3072:ydEUfKj8BYbDiC1ZTK7sxtLUIGT9kXH0hga4PjBy2XiXV/mwTwyg4K+mpPNHdUpO:yUSiZTK40V2a4PdyoeV/Hwz4zmpPNipO
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 58 IoCs
resource yara_rule behavioral2/files/0x00070000000231ee-6.dat UPX behavioral2/files/0x000b0000000231e3-42.dat UPX behavioral2/files/0x00070000000231f0-72.dat UPX behavioral2/files/0x00070000000231f1-108.dat UPX behavioral2/files/0x000900000000a064-145.dat UPX behavioral2/files/0x000b00000002311c-179.dat UPX behavioral2/files/0x000a00000002311f-215.dat UPX behavioral2/files/0x00090000000231ea-253.dat UPX behavioral2/memory/860-254-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4580-252-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4388-284-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/224-287-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231f2-292.dat UPX behavioral2/memory/3936-298-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3000-324-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4500-334-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231f3-332.dat UPX behavioral2/files/0x00070000000231f4-368.dat UPX behavioral2/memory/1804-400-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231f6-406.dat UPX behavioral2/memory/2744-442-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231f7-444.dat UPX behavioral2/memory/860-476-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231f8-482.dat UPX behavioral2/memory/4940-484-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3936-514-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2268-516-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231f9-522.dat UPX behavioral2/memory/5016-554-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/928-560-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231fa-562.dat UPX behavioral2/files/0x00070000000231fb-598.dat UPX behavioral2/memory/4880-601-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231fd-635.dat UPX behavioral2/memory/4940-639-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1380-670-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00070000000231fe-676.dat UPX behavioral2/memory/336-708-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1456-714-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1032-743-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/5032-778-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4404-846-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1456-881-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4388-887-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/5016-916-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2240-951-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2148-1019-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4752-1027-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4388-1056-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/740-1091-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2808-1093-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1200-1128-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1672-1134-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/400-1168-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2608-1169-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4128-1198-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2620-1237-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1672-1272-0x0000000000400000-0x000000000049E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemevzkh.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemeeizq.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemnusym.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemhvjnq.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemokllf.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemibkzl.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemthwiu.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemvyhcy.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemyllcb.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemsyfde.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemffyqe.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemqaaox.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemcmnij.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemtntim.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemtcsbx.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemztoye.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemriqgg.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemlbahm.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemcvrtv.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemjkpkj.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemljzeo.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemyhref.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqembyduo.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemuovwg.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemlhjyq.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemlormi.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemnuixb.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemqhvjl.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemguoll.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemeprhy.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemplrsu.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemuhxiy.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemwmbsm.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemdurzm.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemuscdj.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemgeuyk.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemwojin.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemglmnp.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemoxdrx.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemvbhwg.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemiuanc.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemmlacf.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemxmtcz.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemebrnz.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemrlioa.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemqpndx.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemoodbc.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemnfrnz.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemckrxf.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemyvkzh.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemcxjlt.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemaraij.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemfwqih.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemauixg.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemmjqti.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemfixpc.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemrkiax.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemciwof.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemnkauu.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemecati.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqembczns.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqembnmie.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Sysqemdoswf.exe -
Executes dropped EXE 64 IoCs
pid Process 4388 Sysqemzaxpr.exe 224 Sysqemmceko.exe 3000 Sysqemwbqhg.exe 4500 Sysqemjkpkj.exe 1804 Sysqemugqdr.exe 2744 Sysqemebrnz.exe 860 Sysqemrdyie.exe 3936 Sysqemobfix.exe 2268 Sysqemmgedh.exe 5016 Sysqemgeuyk.exe 928 Sysqemgqgrz.exe 4880 Sysqempfcmk.exe 4940 Sysqemrlioa.exe 1380 Sysqemctwzw.exe 336 Sysqemerluf.exe 1032 Sysqemuhxiy.exe 5032 Sysqemevzkh.exe 4404 Sysqemwojin.exe 1456 Sysqemovmbd.exe 5016 Sysqemeeizq.exe 2240 Sysqembyduo.exe 2148 Sysqemlmfxq.exe 4752 Sysqemeafhm.exe 4388 Sysqemolvxl.exe 740 Sysqemgdkde.exe 2808 Sysqembvmfb.exe 1200 Sysqemeqpdo.exe 400 Sysqemghgtg.exe 4128 Sysqemmjqti.exe 2620 Sysqemrvkon.exe 1672 Sysqemejdon.exe 2608 Sysqemgtdrr.exe 3940 Sysqemwmbsm.exe 4968 Sysqemecyxs.exe 2988 Sysqembseyz.exe 5036 Sysqemqpndx.exe 3520 Sysqembtpbq.exe 4308 Sysqemlsueu.exe 396 Sysqembaoev.exe 3112 Sysqemozkmp.exe 4140 Sysqemlormi.exe 4316 Sysqemataag.exe 4300 Sysqemogtvg.exe 4484 Sysqemdpfvh.exe 3028 Sysqemgkrdn.exe 4868 Sysqemyyjoj.exe 2000 Sysqemoodbc.exe 3900 Sysqemiuuex.exe 3164 Sysqemlbahm.exe 4580 Sysqemjghcf.exe 3052 Sysqemwioxc.exe 2984 Sysqemnaxpw.exe 1780 Sysqemglmnp.exe 5100 Sysqemtntim.exe 4880 Sysqemqlain.exe 4652 Sysqemtcsbx.exe 3220 Sysqemtrhyo.exe 4748 Sysqemvbhwg.exe 4372 Sysqemqsbzw.exe 2956 Sysqemljctt.exe 4580 Sysqemdurzm.exe 3308 Sysqemyllcb.exe 2808 Sysqemnquhz.exe 4904 Sysqemnfrnz.exe -
resource yara_rule behavioral2/memory/4580-0-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231ee-6.dat upx behavioral2/memory/4388-37-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000b0000000231e3-42.dat upx behavioral2/files/0x00070000000231f0-72.dat upx behavioral2/memory/224-74-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231f1-108.dat upx behavioral2/memory/3000-110-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000900000000a064-145.dat upx behavioral2/files/0x000b00000002311c-179.dat upx behavioral2/memory/1804-181-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000a00000002311f-215.dat upx behavioral2/files/0x00090000000231ea-253.dat upx behavioral2/memory/860-254-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4580-252-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4388-284-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/224-287-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231f2-292.dat upx behavioral2/memory/3936-298-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3000-324-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2268-333-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4500-334-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231f3-332.dat upx behavioral2/files/0x00070000000231f4-368.dat upx behavioral2/memory/5016-369-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1804-400-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231f6-406.dat upx behavioral2/memory/928-408-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2744-442-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231f7-444.dat upx behavioral2/memory/4880-446-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/860-476-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231f8-482.dat upx behavioral2/memory/4940-484-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3936-514-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2268-516-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231f9-522.dat upx behavioral2/memory/1380-524-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5016-554-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/928-560-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231fa-562.dat upx behavioral2/memory/336-564-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231fb-598.dat upx behavioral2/memory/4880-601-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231fd-635.dat upx behavioral2/memory/5032-636-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4940-639-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1380-670-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000231fe-676.dat upx behavioral2/memory/4404-678-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/336-708-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1456-714-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1032-743-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5016-749-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5032-778-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2240-784-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2148-817-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4404-846-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4752-852-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1456-881-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4388-887-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5016-916-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/740-922-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2240-951-0x0000000000400000-0x000000000049E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmazmq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemthwiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvyhcy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcxjlt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjfcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqlain.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczfbu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmtzhv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrdyie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembyduo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmhviw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfiff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemctwzw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsjrby.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofyta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdajrk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemutikc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfjxsx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfbrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgdkde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmkfyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaafsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjqti.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembnmie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcyuyv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempzkqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemolvxl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuovwg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdffx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmlacf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemevzkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkpcfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemucwzq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobfix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemguoll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaraij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuhxiy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemovmbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmowqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemugqdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnkauu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdthpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvrtv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwbqhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqgrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkucx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzueul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiuanc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwjki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztoye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemciwof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemebrnz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiuuex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemljzeo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwioxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrxaid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmobj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemglqgv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjfqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemplrsu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtcsbx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnquhz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemriqgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemurybs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 4388 4580 60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe 88 PID 4580 wrote to memory of 4388 4580 60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe 88 PID 4580 wrote to memory of 4388 4580 60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe 88 PID 4388 wrote to memory of 224 4388 Sysqemzaxpr.exe 89 PID 4388 wrote to memory of 224 4388 Sysqemzaxpr.exe 89 PID 4388 wrote to memory of 224 4388 Sysqemzaxpr.exe 89 PID 224 wrote to memory of 3000 224 Sysqemmceko.exe 90 PID 224 wrote to memory of 3000 224 Sysqemmceko.exe 90 PID 224 wrote to memory of 3000 224 Sysqemmceko.exe 90 PID 3000 wrote to memory of 4500 3000 Sysqemwbqhg.exe 91 PID 3000 wrote to memory of 4500 3000 Sysqemwbqhg.exe 91 PID 3000 wrote to memory of 4500 3000 Sysqemwbqhg.exe 91 PID 4500 wrote to memory of 1804 4500 Sysqemjkpkj.exe 92 PID 4500 wrote to memory of 1804 4500 Sysqemjkpkj.exe 92 PID 4500 wrote to memory of 1804 4500 Sysqemjkpkj.exe 92 PID 1804 wrote to memory of 2744 1804 Sysqemugqdr.exe 93 PID 1804 wrote to memory of 2744 1804 Sysqemugqdr.exe 93 PID 1804 wrote to memory of 2744 1804 Sysqemugqdr.exe 93 PID 2744 wrote to memory of 860 2744 Sysqemebrnz.exe 94 PID 2744 wrote to memory of 860 2744 Sysqemebrnz.exe 94 PID 2744 wrote to memory of 860 2744 Sysqemebrnz.exe 94 PID 860 wrote to memory of 3936 860 Sysqemrdyie.exe 97 PID 860 wrote to memory of 3936 860 Sysqemrdyie.exe 97 PID 860 wrote to memory of 3936 860 Sysqemrdyie.exe 97 PID 3936 wrote to memory of 2268 3936 Sysqemobfix.exe 98 PID 3936 wrote to memory of 2268 3936 Sysqemobfix.exe 98 PID 3936 wrote to memory of 2268 3936 Sysqemobfix.exe 98 PID 2268 wrote to memory of 5016 2268 Sysqemmgedh.exe 100 PID 2268 wrote to memory of 5016 2268 Sysqemmgedh.exe 100 PID 2268 wrote to memory of 5016 2268 Sysqemmgedh.exe 100 PID 5016 wrote to memory of 928 5016 Sysqemgeuyk.exe 102 PID 5016 wrote to memory of 928 5016 Sysqemgeuyk.exe 102 PID 5016 wrote to memory of 928 5016 Sysqemgeuyk.exe 102 PID 928 wrote to memory of 4880 928 Sysqemgqgrz.exe 103 PID 928 wrote to memory of 4880 928 Sysqemgqgrz.exe 103 PID 928 wrote to memory of 4880 928 Sysqemgqgrz.exe 103 PID 4880 wrote to memory of 4940 4880 Sysqempfcmk.exe 104 PID 4880 wrote to memory of 4940 4880 Sysqempfcmk.exe 104 PID 4880 wrote to memory of 4940 4880 Sysqempfcmk.exe 104 PID 4940 wrote to memory of 1380 4940 Sysqemrlioa.exe 105 PID 4940 wrote to memory of 1380 4940 Sysqemrlioa.exe 105 PID 4940 wrote to memory of 1380 4940 Sysqemrlioa.exe 105 PID 1380 wrote to memory of 336 1380 Sysqemctwzw.exe 106 PID 1380 wrote to memory of 336 1380 Sysqemctwzw.exe 106 PID 1380 wrote to memory of 336 1380 Sysqemctwzw.exe 106 PID 336 wrote to memory of 1032 336 Sysqemerluf.exe 108 PID 336 wrote to memory of 1032 336 Sysqemerluf.exe 108 PID 336 wrote to memory of 1032 336 Sysqemerluf.exe 108 PID 1032 wrote to memory of 5032 1032 Sysqemuhxiy.exe 109 PID 1032 wrote to memory of 5032 1032 Sysqemuhxiy.exe 109 PID 1032 wrote to memory of 5032 1032 Sysqemuhxiy.exe 109 PID 5032 wrote to memory of 4404 5032 Sysqemevzkh.exe 110 PID 5032 wrote to memory of 4404 5032 Sysqemevzkh.exe 110 PID 5032 wrote to memory of 4404 5032 Sysqemevzkh.exe 110 PID 4404 wrote to memory of 1456 4404 Sysqemwojin.exe 111 PID 4404 wrote to memory of 1456 4404 Sysqemwojin.exe 111 PID 4404 wrote to memory of 1456 4404 Sysqemwojin.exe 111 PID 1456 wrote to memory of 5016 1456 Sysqemovmbd.exe 114 PID 1456 wrote to memory of 5016 1456 Sysqemovmbd.exe 114 PID 1456 wrote to memory of 5016 1456 Sysqemovmbd.exe 114 PID 5016 wrote to memory of 2240 5016 Sysqemeeizq.exe 115 PID 5016 wrote to memory of 2240 5016 Sysqemeeizq.exe 115 PID 5016 wrote to memory of 2240 5016 Sysqemeeizq.exe 115 PID 2240 wrote to memory of 2148 2240 Sysqembyduo.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe"C:\Users\Admin\AppData\Local\Temp\60f9b1616dc19eda9f78c54c89dd59669f18717c4df0f7580e4244d80ef078b9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzaxpr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzaxpr.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmceko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmceko.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbqhg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbqhg.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjkpkj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjkpkj.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugqdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugqdr.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebrnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebrnz.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrdyie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdyie.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobfix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobfix.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgedh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgedh.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgeuyk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgeuyk.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqgrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqgrz.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfcmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfcmk.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlioa.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemctwzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctwzw.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemerluf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemerluf.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuhxiy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhxiy.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevzkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevzkh.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwojin.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwojin.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemovmbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovmbd.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeeizq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeeizq.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqembyduo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembyduo.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmfxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmfxq.exe"23⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeafhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeafhm.exe"24⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolvxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolvxl.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgdkde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgdkde.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:740 -
C:\Users\Admin\AppData\Local\Temp\Sysqembvmfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvmfb.exe"27⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqpdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqpdo.exe"28⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghgtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghgtg.exe"29⤵
- Executes dropped EXE
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjqti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjqti.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvkon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvkon.exe"31⤵
- Executes dropped EXE
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejdon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejdon.exe"32⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtdrr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtdrr.exe"33⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmbsm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmbsm.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecyxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecyxs.exe"35⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Sysqembseyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembseyz.exe"36⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpndx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpndx.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtpbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtpbq.exe"38⤵
- Executes dropped EXE
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsueu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsueu.exe"39⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqembaoev.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembaoev.exe"40⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemozkmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozkmp.exe"41⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlormi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlormi.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemataag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemataag.exe"43⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemogtvg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogtvg.exe"44⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpfvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpfvh.exe"45⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkrdn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkrdn.exe"46⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyyjoj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyyjoj.exe"47⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoodbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoodbc.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiuuex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiuuex.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbahm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbahm.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"51⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwioxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwioxc.exe"52⤵
- Executes dropped EXE
- Modifies registry class
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnaxpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnaxpw.exe"53⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglmnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglmnp.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtntim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtntim.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqlain.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqlain.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtcsbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtcsbx.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrhyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrhyo.exe"58⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbhwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbhwg.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqsbzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsbzw.exe"60⤵
- Executes dropped EXE
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljctt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljctt.exe"61⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdurzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdurzm.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyllcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyllcb.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnquhz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnquhz.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfrnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfrnz.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnuixb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnuixb.exe"66⤵
- Checks computer location settings
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfqqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfqqk.exe"67⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfjsod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjsod.exe"68⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnusym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnusym.exe"69⤵
- Checks computer location settings
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyytwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyytwf.exe"70⤵PID:244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdajrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdajrk.exe"71⤵
- Modifies registry class
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkauu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkauu.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqtvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqtvu.exe"73⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\Sysqemafrnf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafrnf.exe"74⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkatd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkatd.exe"75⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcptbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcptbd.exe"76⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsjrby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsjrby.exe"77⤵
- Modifies registry class
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnakwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnakwv.exe"78⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsnnra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnnra.exe"79⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxdlsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdlsi.exe"80⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaraij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaraij.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"82⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiowyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiowyr.exe"83⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnebyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnebyz.exe"84⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrsuyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrsuyz.exe"85⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"86⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemucwzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucwzq.exe"87⤵
- Modifies registry class
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaavuh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaavuh.exe"88⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaafsv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaafsv.exe"89⤵
- Modifies registry class
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemssiqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssiqu.exe"90⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmobj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmobj.exe"91⤵
- Modifies registry class
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuovwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuovwg.exe"92⤵
- Checks computer location settings
- Modifies registry class
PID:336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbqjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbqjl.exe"93⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmdfmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdfmi.exe"94⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkpcfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpcfs.exe"95⤵
- Modifies registry class
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmhviw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhviw.exe"96⤵
- Modifies registry class
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxaid.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxaid.exe"97⤵
- Modifies registry class
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhvjnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvjnq.exe"98⤵
- Checks computer location settings
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjnjqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnjqu.exe"99⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmtzhv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtzhv.exe"100⤵
- Modifies registry class
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzkucx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkucx.exe"101⤵
- Modifies registry class
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmjxu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmjxu.exe"102⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzdffx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdffx.exe"103⤵
- Modifies registry class
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbjnr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbjnr.exe"104⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrrhnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrhnz.exe"105⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcyuyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyuyv.exe"106⤵
- Modifies registry class
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjlob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjlob.exe"107⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\Sysqemczfbu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczfbu.exe"108⤵
- Modifies registry class
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhchs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhchs.exe"109⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\Sysqemckrxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckrxf.exe"110⤵
- Checks computer location settings
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnghh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnghh.exe"111⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjdavz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdavz.exe"112⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmkfyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkfyd.exe"113⤵
- Modifies registry class
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuscdj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuscdj.exe"114⤵
- Checks computer location settings
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecati.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecati.exe"115⤵
- Checks computer location settings
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemreiof.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemreiof.exe"116⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzueul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzueul.exe"117⤵
- Modifies registry class
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmlacf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlacf.exe"118⤵
- Checks computer location settings
- Modifies registry class
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"119⤵
- Modifies registry class
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgceci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgceci.exe"120⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\Sysqemutikc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutikc.exe"121⤵
- Modifies registry class
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxvvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxvvs.exe"122⤵PID:3160
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-