Analysis
-
max time kernel
67s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 18:19
Behavioral task
behavioral1
Sample
062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe
Resource
win10v2004-20240319-en
General
-
Target
062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe
-
Size
108KB
-
MD5
87128440575fea01596dfd3c0b49a7c5
-
SHA1
1d6886d4d8bc6311152926e005318b97cd6ddddf
-
SHA256
062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d
-
SHA512
0306747807a716e66b98a6b4fb8980ed21a2a86ae4a042b8e952b3e27da0d6f48b2b32afc78f6e2dd5148e1a161d10e970b6277d8f1e56e471506c4f2adcc3b4
-
SSDEEP
1536:t3YjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nkyjQro:SdEUfKj8BYbDiC1ZTK7sxtLUIG5yyo
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/2796-0-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023316-6.dat UPX behavioral2/memory/4976-37-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023315-42.dat UPX behavioral2/memory/2956-74-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0008000000023312-72.dat UPX behavioral2/memory/2796-103-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023318-109.dat UPX behavioral2/files/0x000700000002331b-144.dat UPX behavioral2/files/0x000700000002331d-179.dat UPX behavioral2/memory/4976-209-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x00020000000226bd-216.dat UPX behavioral2/memory/2956-245-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0011000000023304-251.dat UPX behavioral2/memory/4088-253-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1728-258-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000b0000000230de-288.dat UPX behavioral2/memory/928-289-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0009000000023321-324.dat UPX behavioral2/memory/2596-330-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000a000000023324-360.dat UPX behavioral2/memory/3288-362-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4088-391-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000a000000023328-397.dat UPX behavioral2/memory/4960-427-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000800000002332a-433.dat UPX behavioral2/memory/3756-435-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x00090000000230dd-469.dat UPX behavioral2/memory/3304-478-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x00090000000230e0-505.dat UPX behavioral2/memory/2104-535-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000700000002332d-541.dat UPX behavioral2/memory/2888-571-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000700000002332f-577.dat UPX behavioral2/memory/3756-607-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x00100000000230cd-613.dat UPX behavioral2/memory/1988-615-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4516-644-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3104-677-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2788-686-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1128-711-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1988-712-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4476-749-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1156-751-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2860-802-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4768-817-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1880-821-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4164-851-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1156-884-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3436-917-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4768-945-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4164-954-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4264-987-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3924-1014-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1180-1042-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3992-1078-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2868-1143-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4960-1149-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3304-1177-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4064-1186-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2596-1216-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/492-1244-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1172-1285-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2596-1310-0x0000000000400000-0x000000000049A000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemovfxy.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemlgroq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemxuvul.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemdgpqr.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemshuxv.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqempeolo.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemzonmd.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemgtwtl.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemymuap.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemcqrie.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemmocox.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemgyajk.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemvanrq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemiwnin.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemshzih.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemkbydr.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemjdzss.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemblrzw.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemodbgt.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemgztzp.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemfzbpl.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemhccec.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemtsibk.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemnkzhj.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqempbcon.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqempruxo.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemknltb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqempjaqi.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemhiycg.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemayrzk.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemjoqzf.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemfmipe.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemhryiz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemmiynx.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemjggsb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation 062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqembtqcb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemgrxhu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemljipr.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemotgyl.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemkyxwu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemttzfq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemrlskk.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemaezry.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemkphqs.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemvzmaz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqempjmpy.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemeapdp.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemnzuna.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemqrftv.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemnuixb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemarykv.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemgkmly.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemvjccy.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemjgwrz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemrxzfw.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemtozmx.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemwcuns.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemprvla.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemhzdwb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemzhwkx.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemvdfgd.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemfabsg.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemvgbtb.exe -
Executes dropped EXE 64 IoCs
pid Process 4976 Sysqemrlskk.exe 2956 Sysqemecyxs.exe 1728 Sysqemtsibk.exe 928 Sysqemgyajk.exe 2596 Sysqemblrzw.exe 3288 Sysqemaezry.exe 4088 Sysqembtqcb.exe 4960 Sysqemovfxy.exe 3304 Sysqemgrxhu.exe 2104 Sysqemnzuna.exe 2888 Sysqemvdfgd.exe 3756 Sysqemdtblb.exe 4516 Sysqemqrftv.exe 3104 Sysqemodbgt.exe 2788 Sysqemgztzp.exe 1128 Sysqemvanrq.exe 1988 Sysqemayrzk.exe 4476 Sysqemljipr.exe 2860 Sysqemfabsg.exe 1880 Sysqemiwnin.exe 1156 Sysqemgtwtl.exe 3436 Sysqemlgroq.exe 4768 Sysqemfmipe.exe 4164 Sysqemymuap.exe 4264 Sysqemshzih.exe 3924 Sysqemnuixb.exe 1180 Sysqemdgpqr.exe 3992 Sysqemvgbtb.exe 2868 Sysqemxbfji.exe 4960 Sysqemnkzhj.exe 3304 Sysqemfzbpl.exe 4064 Sysqemkphqs.exe 492 Sysqemdmioa.exe 1172 Sysqempgybz.exe 2596 Sysqemarykv.exe 220 Sysqemvjccy.exe 1820 Sysqemcqrie.exe 4588 Sysqemknltb.exe 2704 Sysqemxmgbk.exe 4400 Sysqemshuxv.exe 4480 Sysqemvzmaz.exe 1128 Sysqemczkpz.exe 4404 Sysqempjaqi.exe 2252 Sysqempbcon.exe 2188 Sysqemzpnei.exe 4364 Sysqempjmpy.exe 4808 Sysqemwcuns.exe 4404 Sysqempruxo.exe 4836 Sysqemprvla.exe 3436 Sysqemhryiz.exe 1880 Sysqemeapdp.exe 2144 Sysqemkbydr.exe 3100 Sysqemkyxwu.exe 756 Sysqemjgwrz.exe 4316 Sysqemmiynx.exe 3116 Sysqemjggsb.exe 4408 Sysqempeolo.exe 3104 Sysqemjoqzf.exe 3924 Sysqemxuvul.exe 2144 Sysqemhiycg.exe 4544 Sysqemrxzfw.exe 1192 Sysqemmocox.exe 2860 Sysqemtozmx.exe 1988 Sysqemhccec.exe -
resource yara_rule behavioral2/memory/2796-0-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023316-6.dat upx behavioral2/memory/4976-37-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023315-42.dat upx behavioral2/memory/2956-74-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0008000000023312-72.dat upx behavioral2/memory/2796-103-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023318-109.dat upx behavioral2/files/0x000700000002331b-144.dat upx behavioral2/files/0x000700000002331d-179.dat upx behavioral2/memory/4976-209-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00020000000226bd-216.dat upx behavioral2/memory/2956-245-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0011000000023304-251.dat upx behavioral2/memory/4088-253-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1728-258-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000b0000000230de-288.dat upx behavioral2/memory/928-289-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0009000000023321-324.dat upx behavioral2/memory/2596-330-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000a000000023324-360.dat upx behavioral2/memory/3288-362-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4088-391-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000a000000023328-397.dat upx behavioral2/memory/4960-427-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000800000002332a-433.dat upx behavioral2/memory/3756-435-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00090000000230dd-469.dat upx behavioral2/memory/3304-478-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00090000000230e0-505.dat upx behavioral2/memory/2104-535-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000700000002332d-541.dat upx behavioral2/memory/2888-571-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000700000002332f-577.dat upx behavioral2/memory/3756-607-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00100000000230cd-613.dat upx behavioral2/memory/1988-615-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4516-644-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3104-677-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2788-686-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1128-711-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1988-712-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4476-749-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1156-751-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2860-802-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4768-817-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1880-821-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4164-851-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1156-884-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3436-917-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4768-945-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4164-954-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4264-987-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3924-1014-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1180-1042-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3992-1078-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2868-1143-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4960-1149-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3304-1177-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4064-1186-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2596-1216-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/492-1244-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1172-1285-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2596-1310-0x0000000000400000-0x000000000049A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtozmx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzdwb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaezry.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxmgbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmipe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgybz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmiynx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgkmly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemovfxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnzuna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempruxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkyxwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnuixb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvgbtb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodbgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempjaqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemttzfq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczkpz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuvul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhryiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkbydr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjggsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmocox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvanrq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdmioa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnkzhj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemknltb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzpnei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemprvla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempeolo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhiycg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemljipr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzhwkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempbcon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgwrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotgyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemecyxs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxbfji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshzih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwcuns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjoqzf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhccec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyajk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrxhu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjdzss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtwtl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkphqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdgpqr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjccy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqrie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrlskk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvdfgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemayrzk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemymuap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvzmaz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempjmpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrxzfw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembtqcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqrftv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfabsg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiwnin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdtblb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgztzp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4976 2796 062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe 95 PID 2796 wrote to memory of 4976 2796 062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe 95 PID 2796 wrote to memory of 4976 2796 062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe 95 PID 4976 wrote to memory of 2956 4976 Sysqemrlskk.exe 97 PID 4976 wrote to memory of 2956 4976 Sysqemrlskk.exe 97 PID 4976 wrote to memory of 2956 4976 Sysqemrlskk.exe 97 PID 2956 wrote to memory of 1728 2956 Sysqemecyxs.exe 99 PID 2956 wrote to memory of 1728 2956 Sysqemecyxs.exe 99 PID 2956 wrote to memory of 1728 2956 Sysqemecyxs.exe 99 PID 1728 wrote to memory of 928 1728 Sysqemtsibk.exe 100 PID 1728 wrote to memory of 928 1728 Sysqemtsibk.exe 100 PID 1728 wrote to memory of 928 1728 Sysqemtsibk.exe 100 PID 928 wrote to memory of 2596 928 Sysqemgyajk.exe 102 PID 928 wrote to memory of 2596 928 Sysqemgyajk.exe 102 PID 928 wrote to memory of 2596 928 Sysqemgyajk.exe 102 PID 2596 wrote to memory of 3288 2596 Sysqemblrzw.exe 106 PID 2596 wrote to memory of 3288 2596 Sysqemblrzw.exe 106 PID 2596 wrote to memory of 3288 2596 Sysqemblrzw.exe 106 PID 3288 wrote to memory of 4088 3288 Sysqemaezry.exe 107 PID 3288 wrote to memory of 4088 3288 Sysqemaezry.exe 107 PID 3288 wrote to memory of 4088 3288 Sysqemaezry.exe 107 PID 4088 wrote to memory of 4960 4088 Sysqembtqcb.exe 109 PID 4088 wrote to memory of 4960 4088 Sysqembtqcb.exe 109 PID 4088 wrote to memory of 4960 4088 Sysqembtqcb.exe 109 PID 4960 wrote to memory of 3304 4960 Sysqemovfxy.exe 111 PID 4960 wrote to memory of 3304 4960 Sysqemovfxy.exe 111 PID 4960 wrote to memory of 3304 4960 Sysqemovfxy.exe 111 PID 3304 wrote to memory of 2104 3304 Sysqemgrxhu.exe 112 PID 3304 wrote to memory of 2104 3304 Sysqemgrxhu.exe 112 PID 3304 wrote to memory of 2104 3304 Sysqemgrxhu.exe 112 PID 2104 wrote to memory of 2888 2104 Sysqemnzuna.exe 113 PID 2104 wrote to memory of 2888 2104 Sysqemnzuna.exe 113 PID 2104 wrote to memory of 2888 2104 Sysqemnzuna.exe 113 PID 2888 wrote to memory of 3756 2888 Sysqemvdfgd.exe 115 PID 2888 wrote to memory of 3756 2888 Sysqemvdfgd.exe 115 PID 2888 wrote to memory of 3756 2888 Sysqemvdfgd.exe 115 PID 3756 wrote to memory of 4516 3756 Sysqemdtblb.exe 117 PID 3756 wrote to memory of 4516 3756 Sysqemdtblb.exe 117 PID 3756 wrote to memory of 4516 3756 Sysqemdtblb.exe 117 PID 4516 wrote to memory of 3104 4516 Sysqemqrftv.exe 118 PID 4516 wrote to memory of 3104 4516 Sysqemqrftv.exe 118 PID 4516 wrote to memory of 3104 4516 Sysqemqrftv.exe 118 PID 3104 wrote to memory of 2788 3104 Sysqemodbgt.exe 119 PID 3104 wrote to memory of 2788 3104 Sysqemodbgt.exe 119 PID 3104 wrote to memory of 2788 3104 Sysqemodbgt.exe 119 PID 2788 wrote to memory of 1128 2788 Sysqemgztzp.exe 150 PID 2788 wrote to memory of 1128 2788 Sysqemgztzp.exe 150 PID 2788 wrote to memory of 1128 2788 Sysqemgztzp.exe 150 PID 1128 wrote to memory of 1988 1128 Sysqemvanrq.exe 122 PID 1128 wrote to memory of 1988 1128 Sysqemvanrq.exe 122 PID 1128 wrote to memory of 1988 1128 Sysqemvanrq.exe 122 PID 1988 wrote to memory of 4476 1988 Sysqemayrzk.exe 125 PID 1988 wrote to memory of 4476 1988 Sysqemayrzk.exe 125 PID 1988 wrote to memory of 4476 1988 Sysqemayrzk.exe 125 PID 4476 wrote to memory of 2860 4476 Sysqemljipr.exe 126 PID 4476 wrote to memory of 2860 4476 Sysqemljipr.exe 126 PID 4476 wrote to memory of 2860 4476 Sysqemljipr.exe 126 PID 2860 wrote to memory of 1880 2860 Sysqemfabsg.exe 160 PID 2860 wrote to memory of 1880 2860 Sysqemfabsg.exe 160 PID 2860 wrote to memory of 1880 2860 Sysqemfabsg.exe 160 PID 1880 wrote to memory of 1156 1880 Sysqemiwnin.exe 128 PID 1880 wrote to memory of 1156 1880 Sysqemiwnin.exe 128 PID 1880 wrote to memory of 1156 1880 Sysqemiwnin.exe 128 PID 1156 wrote to memory of 3436 1156 Sysqemgtwtl.exe 159
Processes
-
C:\Users\Admin\AppData\Local\Temp\062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe"C:\Users\Admin\AppData\Local\Temp\062580833ec85d08de0d80abb373e5d69bf7c68da362ee4a91cbb530662b9a5d.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlskk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlskk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecyxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecyxs.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsibk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsibk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyajk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyajk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblrzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblrzw.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaezry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaezry.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtqcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtqcb.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemovfxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovfxy.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnzuna.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzuna.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvdfgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdfgd.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqrftv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrftv.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodbgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodbgt.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgztzp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgztzp.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemayrzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayrzk.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljipr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljipr.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfabsg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfabsg.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwnin.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwnin.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgroq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgroq.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmipe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmipe.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemymuap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemymuap.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemshzih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshzih.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnuixb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnuixb.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgpqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgpqr.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgbtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgbtb.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxbfji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxbfji.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkzhj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkzhj.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzbpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzbpl.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkphqs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkphqs.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:492 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgybz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgybz.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemarykv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemarykv.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjccy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjccy.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqrie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqrie.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemknltb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemknltb.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxmgbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmgbk.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemshuxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshuxv.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvzmaz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvzmaz.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemczkpz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczkpz.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Sysqempjaqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjaqi.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Sysqempbcon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbcon.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzpnei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpnei.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Sysqempjmpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjmpy.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwcuns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwcuns.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqempruxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempruxo.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemprvla.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprvla.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhryiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhryiz.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeapdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeapdp.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkbydr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbydr.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkyxwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkyxwu.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgwrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgwrz.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmiynx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmiynx.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjggsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjggsb.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\Sysqempeolo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempeolo.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjoqzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjoqzf.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuvul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuvul.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhiycg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhiycg.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxzfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxzfw.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtozmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtozmx.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhccec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhccec.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttzfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttzfq.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkmly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkmly.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzdwb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzdwb.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzonmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzonmd.exe"69⤵
- Checks computer location settings
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhwkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhwkx.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjdzss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdzss.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotgyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotgyl.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbebx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbebx.exe"73⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlkahj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlkahj.exe"74⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjhimw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhimw.exe"75⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrltfz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrltfz.exe"76⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiefvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiefvs.exe"77⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\Sysqembdryd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdryd.exe"78⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\Sysqemybzmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybzmh.exe"79⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgczrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgczrh.exe"80⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvdskp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdskp.exe"81⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Sysqemolwnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolwnz.exe"82⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\Sysqemynvkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemynvkg.exe"83⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdmblo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmblo.exe"84⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtbnyg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbnyg.exe"85⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqdiwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdiwh.exe"86⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemacwrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacwrx.exe"87⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvxcmj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxcmj.exe"88⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyebax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyebax.exe"89⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\Sysqemasgby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemasgby.exe"90⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiwzht.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwzht.exe"91⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfylzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfylzj.exe"92⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiimnh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiimnh.exe"93⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnrfau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrfau.exe"94⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\Sysqemabklk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabklk.exe"95⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiqiwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqiwc.exe"96⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfoqkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfoqkg.exe"97⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcmypt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmypt.exe"98⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqrsde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrsde.exe"99⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\Sysqemisdoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemisdoe.exe"100⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmlubo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlubo.exe"101⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\Sysqemupfur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupfur.exe"102⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemszzsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszzsk.exe"103⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemasaqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemasaqe.exe"104⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhljoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhljoz.exe"105⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzakrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzakrp.exe"106⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnypev.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnypev.exe"107⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsljzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsljzz.exe"108⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Sysqempjrfm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjrfm.exe"109⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\Sysqemragak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemragak.exe"110⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjlvqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjlvqx.exe"111⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrtswv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtswv.exe"112⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\Sysqemriqgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemriqgg.exe"113⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\Sysqemewkus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewkus.exe"114⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeousf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeousf.exe"115⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\Sysqempkxis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkxis.exe"116⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeeuao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeeuao.exe"117⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcmnij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmnij.exe"118⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzkmjc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkmjc.exe"119⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemohvwa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohvwa.exe"120⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsgnhk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgnhk.exe"121⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\Sysqempwuhd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempwuhd.exe"122⤵PID:4584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-