Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 00:54
Behavioral task
behavioral1
Sample
a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512.exe
Resource
win10v2004-20240226-en
General
-
Target
a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512.exe
-
Size
110KB
-
MD5
13abbb9f722ed74ba79ea6ffb76cca8c
-
SHA1
837dfe5130f2b6aee57b164d04a60f8087598e0c
-
SHA256
a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512
-
SHA512
0e6edcbef6136909a11441eab2cfb20f23f4345cc6966434157f7482f55207e2764a8bf09353d8e6bdddccc405a1ffef7600509217de6526369a825156bbbea6
-
SSDEEP
1536:t3YjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nkyjQrh:SdEUfKj8BYbDiC1ZTK7sxtLUIG5yyh
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/2532-0-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023229-6.dat UPX behavioral2/files/0x0007000000023228-41.dat UPX behavioral2/files/0x000700000002322b-71.dat UPX behavioral2/files/0x000700000002322c-106.dat UPX behavioral2/files/0x000300000001e809-141.dat UPX behavioral2/memory/2532-175-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000300000001e806-177.dat UPX behavioral2/memory/440-207-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2456-212-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000b000000023132-214.dat UPX behavioral2/memory/5104-216-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3468-245-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000c00000002312e-252.dat UPX behavioral2/memory/416-253-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4088-282-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000b000000023134-288.dat UPX behavioral2/memory/4428-318-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000700000002322d-324.dat UPX behavioral2/memory/5104-330-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/416-355-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000700000002322e-361.dat UPX behavioral2/memory/4548-370-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023230-397.dat UPX behavioral2/memory/2840-427-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023231-433.dat UPX behavioral2/memory/2492-435-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4192-468-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023232-470.dat UPX behavioral2/memory/3684-472-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023236-506.dat UPX behavioral2/memory/2400-530-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023237-542.dat UPX behavioral2/memory/2492-544-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x0007000000023238-578.dat UPX behavioral2/memory/3684-608-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/files/0x000700000002323e-614.dat UPX behavioral2/memory/1056-620-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/5012-677-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2876-683-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4252-711-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/472-723-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3236-753-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2876-783-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4504-819-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4300-852-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3700-882-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/64-910-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1032-919-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/5000-976-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/400-982-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3432-1010-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/5100-1066-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/400-1084-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1944-1141-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/568-1151-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/2476-1175-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3488-1208-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4144-1241-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/4100-1282-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/416-1315-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3436-1340-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/1556-1373-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral2/memory/3288-1417-0x0000000000400000-0x000000000049A000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemsxviz.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemwjsvo.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemgqghc.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemqwdqi.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemszbfv.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemqpgqh.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemlemzb.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemtyvcv.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemunpwl.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemnubhw.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemhqmex.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemrcwym.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemeibrz.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqembmldg.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemgvzcq.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqembptqn.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemetqxc.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemuwytd.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqembhtdq.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemqujjw.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqempgzhl.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemqlsaf.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemynvkg.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqembfofk.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqembyxke.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemihnkx.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemtarjr.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemtaapb.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemwacvo.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemqqpbd.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemlcvyo.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemsmqsw.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqempdhdd.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemetbza.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemobwxb.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemtgzgf.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemndsbh.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemqrhuf.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemcagep.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemyjart.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemzzipv.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemrkiue.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemnfgjz.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemebckm.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemuzgqp.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqempsppq.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemjtkka.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemrrswu.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemorjhe.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemguiux.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemxwrwe.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemmgxav.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemmsnba.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemrmsub.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemtravu.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemaobjl.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemaraij.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemvdyhy.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemcesmo.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqempawfv.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemfqavp.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemucumw.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemyjtik.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Sysqemitjdv.exe -
Executes dropped EXE 64 IoCs
pid Process 440 Sysqemhkyhl.exe 2456 Sysqemzzipv.exe 3468 Sysqemysjip.exe 4088 Sysqembyxke.exe 4428 Sysqemwacvo.exe 5104 Sysqembnxjs.exe 416 Sysqemeibrz.exe 4548 Sysqemrkiue.exe 2840 Sysqemoiqzj.exe 4192 Sysqemgtnpw.exe 2400 Sysqembhtdq.exe 2492 Sysqemqqpbd.exe 3684 Sysqemorjhe.exe 1056 Sysqemteeuj.exe 5012 Sysqemguiux.exe 4252 Sysqembmldg.exe 472 Sysqemyjtik.exe 3236 Sysqemndsbh.exe 2876 Sysqemdtnoa.exe 4504 Sysqemlemzb.exe 4300 Sysqemqrhuf.exe 3700 Sysqemtyvcv.exe 64 Sysqemqwdqi.exe 1032 Sysqemlcvyo.exe 5000 Sysqemaobjl.exe 3432 Sysqemnfgjz.exe 5100 Sysqemihnkx.exe 400 Sysqemszbfv.exe 1944 Sysqemitjdv.exe 568 Sysqemqujjw.exe 2476 Sysqemqnshq.exe 3488 Sysqemvdyhy.exe 4144 Sysqemsxviz.exe 4100 Sysqemkasyn.exe 416 Sysqemcesmo.exe 3436 Sysqempgzhl.exe 1556 Sysqemvfgme.exe 3288 Sysqemaraij.exe 4320 Sysqempawfv.exe 2840 Sysqemxwrwe.exe 732 Sysqemunpwl.exe 4024 Sysqemnubhw.exe 5092 Sysqemebckm.exe 3992 Sysqemfqavp.exe 1648 Sysqemmgxav.exe 656 Sysqemuzgqp.exe 1812 Sysqemcagep.exe 700 Sysqemhqmex.exe 3288 Sysqemsmqsw.exe 2536 Sysqemcppax.exe 3988 Sysqempdhdd.exe 228 Sysqemrcwym.exe 4024 Sysqemetbza.exe 4256 Sysqempsppq.exe 2400 Sysqemzrdko.exe 2016 Sysqemwbxip.exe 3156 Sysqemzhfyq.exe 5072 Sysqemucumw.exe 3396 Sysqempfjmt.exe 4636 Sysqemobwxb.exe 4044 Sysqemwjsvo.exe 2496 Sysqemmsnba.exe 3128 Sysqemuwytd.exe 3468 Sysqemgqghc.exe -
resource yara_rule behavioral2/memory/2532-0-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023229-6.dat upx behavioral2/files/0x0007000000023228-41.dat upx behavioral2/files/0x000700000002322b-71.dat upx behavioral2/files/0x000700000002322c-106.dat upx behavioral2/files/0x000300000001e809-141.dat upx behavioral2/memory/2532-175-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000300000001e806-177.dat upx behavioral2/memory/440-207-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2456-212-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000b000000023132-214.dat upx behavioral2/memory/5104-216-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3468-245-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000c00000002312e-252.dat upx behavioral2/memory/416-253-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4088-282-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000b000000023134-288.dat upx behavioral2/memory/4428-318-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000700000002322d-324.dat upx behavioral2/memory/5104-330-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/416-355-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000700000002322e-361.dat upx behavioral2/memory/4548-370-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023230-397.dat upx behavioral2/memory/2840-427-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023231-433.dat upx behavioral2/memory/2492-435-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4192-468-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023232-470.dat upx behavioral2/memory/3684-472-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023236-506.dat upx behavioral2/memory/2400-530-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023237-542.dat upx behavioral2/memory/2492-544-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023238-578.dat upx behavioral2/memory/3684-608-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000700000002323e-614.dat upx behavioral2/memory/1056-620-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/5012-677-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2876-683-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4252-711-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/472-723-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3236-753-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2876-783-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4504-819-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4300-852-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3700-882-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/64-910-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1032-919-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/5000-976-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/400-982-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3432-1010-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/5100-1066-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/400-1084-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1944-1141-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/568-1151-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2476-1175-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3488-1208-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4144-1241-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4100-1282-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/416-1315-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3436-1340-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1556-1373-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3288-1417-0x0000000000400000-0x000000000049A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsmqsw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdhdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzrdko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmsnba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvdyhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlcvyo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemetbza.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemucumw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembigrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqqpbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkasyn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemorjhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemihnkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemszbfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgzhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjsvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemetqxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqlsaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjtik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqwdqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmldg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdtnoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqujjw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqnshq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsxviz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqghc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtarjr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjart.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwacvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnubhw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvmzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtyvcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxwrwe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmgxav.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzgqp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhqmex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrrswu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtravu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtnpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtaapb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembfofk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzhfyq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemteeuj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrcwym.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuwytd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemynvkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembyxke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkiue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnfgjz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempawfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfjmt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobwxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeibrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzipv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfgme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemunpwl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfqavp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempsppq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembptqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtgzgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhkyhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlkzuy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytutj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemysjip.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 440 2532 a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512.exe 87 PID 2532 wrote to memory of 440 2532 a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512.exe 87 PID 2532 wrote to memory of 440 2532 a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512.exe 87 PID 440 wrote to memory of 2456 440 Sysqemhkyhl.exe 88 PID 440 wrote to memory of 2456 440 Sysqemhkyhl.exe 88 PID 440 wrote to memory of 2456 440 Sysqemhkyhl.exe 88 PID 2456 wrote to memory of 3468 2456 Sysqemzzipv.exe 89 PID 2456 wrote to memory of 3468 2456 Sysqemzzipv.exe 89 PID 2456 wrote to memory of 3468 2456 Sysqemzzipv.exe 89 PID 3468 wrote to memory of 4088 3468 Sysqemysjip.exe 90 PID 3468 wrote to memory of 4088 3468 Sysqemysjip.exe 90 PID 3468 wrote to memory of 4088 3468 Sysqemysjip.exe 90 PID 4088 wrote to memory of 4428 4088 Sysqembyxke.exe 93 PID 4088 wrote to memory of 4428 4088 Sysqembyxke.exe 93 PID 4088 wrote to memory of 4428 4088 Sysqembyxke.exe 93 PID 4428 wrote to memory of 5104 4428 Sysqemwacvo.exe 94 PID 4428 wrote to memory of 5104 4428 Sysqemwacvo.exe 94 PID 4428 wrote to memory of 5104 4428 Sysqemwacvo.exe 94 PID 5104 wrote to memory of 416 5104 Sysqembnxjs.exe 97 PID 5104 wrote to memory of 416 5104 Sysqembnxjs.exe 97 PID 5104 wrote to memory of 416 5104 Sysqembnxjs.exe 97 PID 416 wrote to memory of 4548 416 Sysqemeibrz.exe 98 PID 416 wrote to memory of 4548 416 Sysqemeibrz.exe 98 PID 416 wrote to memory of 4548 416 Sysqemeibrz.exe 98 PID 4548 wrote to memory of 2840 4548 Sysqemrkiue.exe 99 PID 4548 wrote to memory of 2840 4548 Sysqemrkiue.exe 99 PID 4548 wrote to memory of 2840 4548 Sysqemrkiue.exe 99 PID 2840 wrote to memory of 4192 2840 Sysqemoiqzj.exe 101 PID 2840 wrote to memory of 4192 2840 Sysqemoiqzj.exe 101 PID 2840 wrote to memory of 4192 2840 Sysqemoiqzj.exe 101 PID 4192 wrote to memory of 2400 4192 Sysqemgtnpw.exe 102 PID 4192 wrote to memory of 2400 4192 Sysqemgtnpw.exe 102 PID 4192 wrote to memory of 2400 4192 Sysqemgtnpw.exe 102 PID 2400 wrote to memory of 2492 2400 Sysqembhtdq.exe 104 PID 2400 wrote to memory of 2492 2400 Sysqembhtdq.exe 104 PID 2400 wrote to memory of 2492 2400 Sysqembhtdq.exe 104 PID 2492 wrote to memory of 3684 2492 Sysqemqqpbd.exe 106 PID 2492 wrote to memory of 3684 2492 Sysqemqqpbd.exe 106 PID 2492 wrote to memory of 3684 2492 Sysqemqqpbd.exe 106 PID 3684 wrote to memory of 1056 3684 Sysqemorjhe.exe 107 PID 3684 wrote to memory of 1056 3684 Sysqemorjhe.exe 107 PID 3684 wrote to memory of 1056 3684 Sysqemorjhe.exe 107 PID 1056 wrote to memory of 5012 1056 Sysqemteeuj.exe 108 PID 1056 wrote to memory of 5012 1056 Sysqemteeuj.exe 108 PID 1056 wrote to memory of 5012 1056 Sysqemteeuj.exe 108 PID 5012 wrote to memory of 4252 5012 Sysqemguiux.exe 109 PID 5012 wrote to memory of 4252 5012 Sysqemguiux.exe 109 PID 5012 wrote to memory of 4252 5012 Sysqemguiux.exe 109 PID 4252 wrote to memory of 472 4252 Sysqembmldg.exe 110 PID 4252 wrote to memory of 472 4252 Sysqembmldg.exe 110 PID 4252 wrote to memory of 472 4252 Sysqembmldg.exe 110 PID 472 wrote to memory of 3236 472 Sysqemyjtik.exe 111 PID 472 wrote to memory of 3236 472 Sysqemyjtik.exe 111 PID 472 wrote to memory of 3236 472 Sysqemyjtik.exe 111 PID 3236 wrote to memory of 2876 3236 Sysqemndsbh.exe 112 PID 3236 wrote to memory of 2876 3236 Sysqemndsbh.exe 112 PID 3236 wrote to memory of 2876 3236 Sysqemndsbh.exe 112 PID 2876 wrote to memory of 4504 2876 Sysqemdtnoa.exe 113 PID 2876 wrote to memory of 4504 2876 Sysqemdtnoa.exe 113 PID 2876 wrote to memory of 4504 2876 Sysqemdtnoa.exe 113 PID 4504 wrote to memory of 4300 4504 Sysqemlemzb.exe 114 PID 4504 wrote to memory of 4300 4504 Sysqemlemzb.exe 114 PID 4504 wrote to memory of 4300 4504 Sysqemlemzb.exe 114 PID 4300 wrote to memory of 3700 4300 Sysqemqrhuf.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512.exe"C:\Users\Admin\AppData\Local\Temp\a0cb97be34965dc9a68882ef020a35c4524642f62355636334d0ec718f40c512.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkyhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkyhl.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzipv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzipv.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemysjip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemysjip.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Sysqembyxke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembyxke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwacvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwacvo.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnxjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnxjs.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeibrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeibrz.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkiue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkiue.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoiqzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoiqzj.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtnpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtnpw.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhtdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhtdq.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqqpbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqpbd.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorjhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorjhe.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteeuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteeuj.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguiux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguiux.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmldg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmldg.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjtik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjtik.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndsbh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndsbh.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtnoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtnoa.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlemzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlemzb.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqrhuf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrhuf.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtyvcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyvcv.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwdqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwdqi.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:64 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcvyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcvyo.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaobjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaobjl.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfgjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfgjz.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihnkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihnkx.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszbfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszbfv.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitjdv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitjdv.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqujjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqujjw.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqnshq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqnshq.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvdyhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdyhy.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsxviz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsxviz.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkasyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkasyn.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcesmo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcesmo.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:416 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgzhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgzhl.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfgme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfgme.exe"38⤵
- Executes dropped EXE
- Modifies registry class
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaraij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaraij.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Sysqempawfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempawfv.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxwrwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwrwe.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunpwl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunpwl.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnubhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnubhw.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebckm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebckm.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfqavp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfqavp.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzgqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzgqp.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcagep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcagep.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhqmex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqmex.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsmqsw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsmqsw.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcppax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcppax.exe"51⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdhdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdhdd.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrcwym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrcwym.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemetbza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemetbza.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqempsppq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsppq.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrdko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrdko.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbxip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbxip.exe"57⤵
- Executes dropped EXE
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhfyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhfyq.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucumw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucumw.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfjmt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfjmt.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobwxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobwxb.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjsvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjsvo.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmsnba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsnba.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwytd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwytd.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqghc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqghc.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjtkka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtkka.exe"66⤵
- Checks computer location settings
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrmsub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmsub.exe"67⤵
- Checks computer location settings
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Sysqembptqn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembptqn.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrswu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrswu.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Sysqembigrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembigrs.exe"70⤵
- Modifies registry class
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"71⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\Sysqemetqxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemetqxc.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtravu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtravu.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtgzgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtgzgf.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytutj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytutj.exe"75⤵
- Modifies registry class
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlkzuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlkzuy.exe"76⤵
- Modifies registry class
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvmzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvmzg.exe"77⤵
- Modifies registry class
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqlsaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqlsaf.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpgqh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpgqh.exe"79⤵
- Checks computer location settings
PID:812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtarjr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtarjr.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjart.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjart.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvzcq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvzcq.exe"82⤵
- Checks computer location settings
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtaapb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtaapb.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemynvkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemynvkg.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfofk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfofk.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiciqh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiciqh.exe"86⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnebop.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnebop.exe"87⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtqwkt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqwkt.exe"88⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqdtvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdtvx.exe"89⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnqzgb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnqzgb.exe"90⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdkfmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkfmp.exe"91⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkkcjo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkkcjo.exe"92⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvggxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvggxv.exe"93⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdzpvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdzpvp.exe"94⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnzeez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzeez.exe"95⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvocpq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvocpq.exe"96⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxcppr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcppr.exe"97⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemktvvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemktvvz.exe"98⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemflwdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemflwdo.exe"99⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhkdyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkdyy.exe"100⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcqemy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqemy.exe"101⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkjefg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjefg.exe"102⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfesas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfesas.exe"103⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemftjlv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemftjlv.exe"104⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfutia.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfutia.exe"105⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\Sysqemswadf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswadf.exe"106⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemurnzy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemurnzy.exe"107⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\Sysqempbqaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbqaa.exe"108⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuoknm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuoknm.exe"109⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrbqyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbqyq.exe"110⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrqgjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqgjs.exe"111⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfviwm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfviwm.exe"112⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\Sysqempgisy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgisy.exe"113⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\Sysqemedsdi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedsdi.exe"114⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzrlyi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrlyi.exe"115⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzvhoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvhoc.exe"116⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmemhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmemhy.exe"117⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxmqsj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmqsj.exe"118⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\Sysqembruyi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembruyi.exe"119⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\Sysqemglmqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglmqe.exe"120⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyaozg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyaozg.exe"121⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmytut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmytut.exe"122⤵PID:3256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-