Analysis
-
max time kernel
20s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 02:22
Behavioral task
behavioral1
Sample
bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe
Resource
win10v2004-20240226-en
General
-
Target
bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe
-
Size
239KB
-
MD5
4437183890b90c15f3acc6153fee0535
-
SHA1
0dce2e71597095a986769f2c986f58b2a9d592b9
-
SHA256
bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89
-
SHA512
37ce242ffe2b9dd5f45b20e0ec3227906cf436f23c0728e3673f9aba8f20160ee64a1df88b5f7c0e58f698b37b161923a7705ac02fa5fee82a369ffbb6116d90
-
SSDEEP
3072:SdEUfKj8BYbDiC1ZTK7sxtLUIGxCk/Ey5qgl331+sBRjm/E7/Ey5qgl331+sBRjK:SUSiZTK401CE9zBlz9zBlK
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 37 IoCs
resource yara_rule behavioral1/files/0x0028000000012265-6.dat UPX behavioral1/files/0x000a000000012246-20.dat UPX behavioral1/files/0x002c0000000122b7-22.dat UPX behavioral1/files/0x000a0000000122fb-38.dat UPX behavioral1/files/0x0009000000012303-52.dat UPX behavioral1/memory/2296-67-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/2588-69-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/files/0x0009000000012315-71.dat UPX behavioral1/memory/2188-77-0x0000000003030000-0x00000000030E7000-memory.dmp UPX behavioral1/files/0x0009000000012327-86.dat UPX behavioral1/memory/1728-93-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/files/0x0009000000012351-103.dat UPX behavioral1/memory/2884-107-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/1712-117-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/files/0x000b000000012687-121.dat UPX behavioral1/memory/2188-136-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/files/0x000a0000000126ab-137.dat UPX behavioral1/files/0x00080000000139d9-152.dat UPX behavioral1/memory/3016-167-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/1728-170-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/files/0x00080000000139fa-172.dat UPX behavioral1/files/0x0008000000013aa6-190.dat UPX behavioral1/memory/1856-187-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/2152-203-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/2084-216-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/840-227-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/1928-233-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/1300-251-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/2192-267-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/2792-279-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/3040-278-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/1588-284-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/2792-292-0x0000000004520000-0x00000000045D7000-memory.dmp UPX behavioral1/memory/2744-291-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/2552-299-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/936-302-0x0000000003090000-0x0000000003147000-memory.dmp UPX behavioral1/memory/2680-322-0x0000000000400000-0x00000000004B7000-memory.dmp UPX -
Executes dropped EXE 37 IoCs
pid Process 2588 Sysqembgamy.exe 2884 Sysqemqxxxf.exe 1712 Sysqemqqgqz.exe 2188 Sysqemhmedx.exe 3016 Sysqemoihig.exe 1728 Sysqemtrmvw.exe 1856 Sysqemlrxtv.exe 2152 Sysqemxletb.exe 2084 Sysqemjgtto.exe 840 Sysqemicfyl.exe 1928 Sysqemvljln.exe 1300 Sysqemuelok.exe 2192 Sysqemfamgr.exe 3040 Sysqemtpuzy.exe 1588 Sysqemqfbzz.exe 2744 Sysqemkwtwp.exe 2552 Sysqemzpqrz.exe 2680 Sysqemeckzs.exe 2792 Sysqemoxkka.exe 936 Sysqemcnqmv.exe 2428 Sysqemmygct.exe 2432 Sysqemgsict.exe 1484 Sysqemtqlfc.exe 2692 Sysqemqokfd.exe 1868 Sysqemkqmni.exe 1820 Sysqemmamvv.exe 1628 Sysqemorsls.exe 2800 Sysqemogqik.exe 2068 Sysqemqbttf.exe 2836 Sysqemslkix.exe 2180 Sysqemckwgp.exe 620 Sysqempjriy.exe 2676 Sysqemrwult.exe 2252 Sysqemzeplf.exe 2640 Sysqemoxmyp.exe 1796 Sysqemwylyd.exe 3028 Sysqemgaajr.exe -
Loads dropped DLL 64 IoCs
pid Process 2296 bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe 2296 bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe 2588 Sysqembgamy.exe 2588 Sysqembgamy.exe 2884 Sysqemqxxxf.exe 2884 Sysqemqxxxf.exe 1712 Sysqemqqgqz.exe 1712 Sysqemqqgqz.exe 2188 Sysqemhmedx.exe 2188 Sysqemhmedx.exe 3016 Sysqemoihig.exe 3016 Sysqemoihig.exe 1728 Sysqemtrmvw.exe 1728 Sysqemtrmvw.exe 1856 Sysqemlrxtv.exe 1856 Sysqemlrxtv.exe 2152 Sysqemxletb.exe 2152 Sysqemxletb.exe 2084 Sysqemjgtto.exe 2084 Sysqemjgtto.exe 840 Sysqemicfyl.exe 840 Sysqemicfyl.exe 1928 Sysqemvljln.exe 1928 Sysqemvljln.exe 1300 Sysqemuelok.exe 1300 Sysqemuelok.exe 2192 Sysqemfamgr.exe 2192 Sysqemfamgr.exe 3040 Sysqemtpuzy.exe 3040 Sysqemtpuzy.exe 1588 Sysqemqfbzz.exe 1588 Sysqemqfbzz.exe 2744 Sysqemkwtwp.exe 2744 Sysqemkwtwp.exe 2552 Sysqemzpqrz.exe 2552 Sysqemzpqrz.exe 2680 Sysqemeckzs.exe 2680 Sysqemeckzs.exe 2792 Sysqemoxkka.exe 2792 Sysqemoxkka.exe 936 Sysqemcnqmv.exe 936 Sysqemcnqmv.exe 2428 Sysqemmygct.exe 2428 Sysqemmygct.exe 2432 Sysqemgsict.exe 2432 Sysqemgsict.exe 1484 Sysqemtqlfc.exe 1484 Sysqemtqlfc.exe 2692 Sysqemqokfd.exe 2692 Sysqemqokfd.exe 1868 Sysqemkqmni.exe 1868 Sysqemkqmni.exe 1820 Sysqemmamvv.exe 1820 Sysqemmamvv.exe 1628 Sysqemorsls.exe 1628 Sysqemorsls.exe 2800 Sysqemogqik.exe 2800 Sysqemogqik.exe 2068 Sysqemqbttf.exe 2068 Sysqemqbttf.exe 2836 Sysqemslkix.exe 2836 Sysqemslkix.exe 2180 Sysqemckwgp.exe 2180 Sysqemckwgp.exe -
resource yara_rule behavioral1/memory/2296-0-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x0028000000012265-6.dat upx behavioral1/memory/2296-8-0x0000000002FE0000-0x0000000003097000-memory.dmp upx behavioral1/files/0x000a000000012246-20.dat upx behavioral1/files/0x002c0000000122b7-22.dat upx behavioral1/memory/2884-36-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x000a0000000122fb-38.dat upx behavioral1/memory/1712-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x0009000000012303-52.dat upx behavioral1/memory/2296-59-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2188-60-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2296-67-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2588-69-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x0009000000012315-71.dat upx behavioral1/memory/2188-77-0x0000000003030000-0x00000000030E7000-memory.dmp upx behavioral1/files/0x0009000000012327-86.dat upx behavioral1/memory/1728-93-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x0009000000012351-103.dat upx behavioral1/memory/2884-107-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1856-115-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1712-117-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x000b000000012687-121.dat upx behavioral1/memory/2152-128-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2188-136-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x000a0000000126ab-137.dat upx behavioral1/memory/2152-139-0x0000000002F50000-0x0000000003007000-memory.dmp upx behavioral1/memory/2084-145-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x00080000000139d9-152.dat upx behavioral1/memory/3016-159-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3016-167-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/840-168-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1728-170-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x00080000000139fa-172.dat upx behavioral1/memory/1928-185-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/files/0x0008000000013aa6-190.dat upx behavioral1/memory/1856-187-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1300-200-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2152-203-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2192-208-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2084-213-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3040-221-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2084-216-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/840-227-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1928-233-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1588-234-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1588-243-0x0000000003080000-0x0000000003137000-memory.dmp upx behavioral1/memory/2744-247-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1300-251-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2552-259-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2192-267-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2680-271-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2792-279-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3040-278-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1588-284-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2792-292-0x0000000004520000-0x00000000045D7000-memory.dmp upx behavioral1/memory/2744-291-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2792-296-0x0000000004520000-0x00000000045D7000-memory.dmp upx behavioral1/memory/936-297-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2552-299-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/936-302-0x0000000003090000-0x0000000003147000-memory.dmp upx behavioral1/memory/2428-310-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2432-318-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2680-322-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2588 2296 bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe 28 PID 2296 wrote to memory of 2588 2296 bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe 28 PID 2296 wrote to memory of 2588 2296 bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe 28 PID 2296 wrote to memory of 2588 2296 bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe 28 PID 2588 wrote to memory of 2884 2588 Sysqembgamy.exe 29 PID 2588 wrote to memory of 2884 2588 Sysqembgamy.exe 29 PID 2588 wrote to memory of 2884 2588 Sysqembgamy.exe 29 PID 2588 wrote to memory of 2884 2588 Sysqembgamy.exe 29 PID 2884 wrote to memory of 1712 2884 Sysqemqxxxf.exe 30 PID 2884 wrote to memory of 1712 2884 Sysqemqxxxf.exe 30 PID 2884 wrote to memory of 1712 2884 Sysqemqxxxf.exe 30 PID 2884 wrote to memory of 1712 2884 Sysqemqxxxf.exe 30 PID 1712 wrote to memory of 2188 1712 Sysqemqqgqz.exe 31 PID 1712 wrote to memory of 2188 1712 Sysqemqqgqz.exe 31 PID 1712 wrote to memory of 2188 1712 Sysqemqqgqz.exe 31 PID 1712 wrote to memory of 2188 1712 Sysqemqqgqz.exe 31 PID 2188 wrote to memory of 3016 2188 Sysqemhmedx.exe 32 PID 2188 wrote to memory of 3016 2188 Sysqemhmedx.exe 32 PID 2188 wrote to memory of 3016 2188 Sysqemhmedx.exe 32 PID 2188 wrote to memory of 3016 2188 Sysqemhmedx.exe 32 PID 3016 wrote to memory of 1728 3016 Sysqemoihig.exe 33 PID 3016 wrote to memory of 1728 3016 Sysqemoihig.exe 33 PID 3016 wrote to memory of 1728 3016 Sysqemoihig.exe 33 PID 3016 wrote to memory of 1728 3016 Sysqemoihig.exe 33 PID 1728 wrote to memory of 1856 1728 Sysqemtrmvw.exe 34 PID 1728 wrote to memory of 1856 1728 Sysqemtrmvw.exe 34 PID 1728 wrote to memory of 1856 1728 Sysqemtrmvw.exe 34 PID 1728 wrote to memory of 1856 1728 Sysqemtrmvw.exe 34 PID 1856 wrote to memory of 2152 1856 Sysqemlrxtv.exe 35 PID 1856 wrote to memory of 2152 1856 Sysqemlrxtv.exe 35 PID 1856 wrote to memory of 2152 1856 Sysqemlrxtv.exe 35 PID 1856 wrote to memory of 2152 1856 Sysqemlrxtv.exe 35 PID 2152 wrote to memory of 2084 2152 Sysqemxletb.exe 87 PID 2152 wrote to memory of 2084 2152 Sysqemxletb.exe 87 PID 2152 wrote to memory of 2084 2152 Sysqemxletb.exe 87 PID 2152 wrote to memory of 2084 2152 Sysqemxletb.exe 87 PID 2084 wrote to memory of 840 2084 Sysqemjgtto.exe 37 PID 2084 wrote to memory of 840 2084 Sysqemjgtto.exe 37 PID 2084 wrote to memory of 840 2084 Sysqemjgtto.exe 37 PID 2084 wrote to memory of 840 2084 Sysqemjgtto.exe 37 PID 840 wrote to memory of 1928 840 Sysqemicfyl.exe 38 PID 840 wrote to memory of 1928 840 Sysqemicfyl.exe 38 PID 840 wrote to memory of 1928 840 Sysqemicfyl.exe 38 PID 840 wrote to memory of 1928 840 Sysqemicfyl.exe 38 PID 1928 wrote to memory of 1300 1928 Sysqemvljln.exe 39 PID 1928 wrote to memory of 1300 1928 Sysqemvljln.exe 39 PID 1928 wrote to memory of 1300 1928 Sysqemvljln.exe 39 PID 1928 wrote to memory of 1300 1928 Sysqemvljln.exe 39 PID 1300 wrote to memory of 2192 1300 Sysqemuelok.exe 40 PID 1300 wrote to memory of 2192 1300 Sysqemuelok.exe 40 PID 1300 wrote to memory of 2192 1300 Sysqemuelok.exe 40 PID 1300 wrote to memory of 2192 1300 Sysqemuelok.exe 40 PID 2192 wrote to memory of 3040 2192 Sysqemfamgr.exe 41 PID 2192 wrote to memory of 3040 2192 Sysqemfamgr.exe 41 PID 2192 wrote to memory of 3040 2192 Sysqemfamgr.exe 41 PID 2192 wrote to memory of 3040 2192 Sysqemfamgr.exe 41 PID 3040 wrote to memory of 1588 3040 Sysqemtpuzy.exe 42 PID 3040 wrote to memory of 1588 3040 Sysqemtpuzy.exe 42 PID 3040 wrote to memory of 1588 3040 Sysqemtpuzy.exe 42 PID 3040 wrote to memory of 1588 3040 Sysqemtpuzy.exe 42 PID 1588 wrote to memory of 2744 1588 Sysqemqfbzz.exe 150 PID 1588 wrote to memory of 2744 1588 Sysqemqfbzz.exe 150 PID 1588 wrote to memory of 2744 1588 Sysqemqfbzz.exe 150 PID 1588 wrote to memory of 2744 1588 Sysqemqfbzz.exe 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe"C:\Users\Admin\AppData\Local\Temp\bfa6ddbcc6d5877ef84a897156af69d3a98219f48382902d10fb4435b13a6e89.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgamy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgamy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxxxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxxxf.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqqgqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqgqz.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmedx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmedx.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoihig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoihig.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrmvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrmvw.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrxtv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrxtv.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxletb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxletb.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgtto.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgtto.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemicfyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemicfyl.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvljln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvljln.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuelok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuelok.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfamgr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfamgr.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpuzy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpuzy.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqfbzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqfbzz.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwtwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwtwp.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzpqrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpqrz.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeckzs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeckzs.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoxkka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxkka.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcnqmv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnqmv.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmygct.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmygct.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgsict.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgsict.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqlfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqlfc.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqokfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqokfd.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkqmni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkqmni.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmamvv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmamvv.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorsls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorsls.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemogqik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogqik.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbttf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbttf.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemslkix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslkix.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckwgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckwgp.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqempjriy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjriy.exe"33⤵
- Executes dropped EXE
PID:620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwult.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwult.exe"34⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzeplf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzeplf.exe"35⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoxmyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxmyp.exe"36⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwylyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwylyd.exe"37⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgaajr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgaajr.exe"38⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiodlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiodlm.exe"39⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Sysqemavfqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavfqr.exe"40⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcutgo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcutgo.exe"41⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvbwtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbwtl.exe"42⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\Sysqempamoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempamoo.exe"43⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwtltl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtltl.exe"44⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjgcjr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgcjr.exe"45⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiupzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiupzi.exe"46⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvwvot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwvot.exe"47⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Sysqemajnez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajnez.exe"48⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnltut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnltut.exe"49⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfwgms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfwgms.exe"50⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjqomr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqomr.exe"51⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtpsrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpsrc.exe"52⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwvhur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvhur.exe"53⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Sysqemogumz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogumz.exe"54⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Sysqemddcul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddcul.exe"55⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqficx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqficx.exe"56⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\Sysqemssles.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssles.exe"57⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmizb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmizb.exe"58⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemixmrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixmrq.exe"59⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuddme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuddme.exe"60⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrskmf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrskmf.exe"61⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemerfpo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemerfpo.exe"62⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrllfz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrllfz.exe"63⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemavjpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavjpm.exe"64⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqpxcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpxcw.exe"65⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdfafe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfafe.exe"66⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemneecx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemneecx.exe"67⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Sysqemufbnl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemufbnl.exe"68⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhaskr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhaskr.exe"69⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemohgcd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohgcd.exe"70⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrvify.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvify.exe"71⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Sysqembqjxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqjxo.exe"72⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\Sysqemamvvl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamvvl.exe"73⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnlqxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlqxt.exe"74⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkmilp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkmilp.exe"75⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemprcsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprcsi.exe"76⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemctiau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctiau.exe"77⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrxivy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxivy.exe"78⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrfgff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfgff.exe"79⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyfegm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfegm.exe"80⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaifoy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaifoy.exe"81⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqbcji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbcji.exe"82⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaaggs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaaggs.exe"83⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeuwgr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeuwgr.exe"84⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuortp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuortp.exe"85⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwbudk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbudk.exe"86⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Sysqemscejg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscejg.exe"87⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdcroy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcroy.exe"88⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkgtti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkgtti.exe"89⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzdbtu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdbtu.exe"90⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfagji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfagji.exe"91⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrgpew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgpew.exe"92⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemryywq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryywq.exe"93⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemelhmw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemelhmw.exe"94⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgkwbu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkwbu.exe"95⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtjqec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjqec.exe"96⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqyxed.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyxed.exe"97⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdxahm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxahm.exe"98⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemprgox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprgox.exe"99⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemctmej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctmej.exe"100⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsbymq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbymq.exe"101⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzuwrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzuwrn.exe"102⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgyhew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyhew.exe"103⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlolrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlolrs.exe"104⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaaimc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaaimc.exe"105⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemthkrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthkrh.exe"106⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsexhx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsexhx.exe"107⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzlths.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlths.exe"108⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkhmsz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhmsz.exe"109⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzeusm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzeusm.exe"110⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmuouu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmuouu.exe"111⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuvnuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvnuj.exe"112⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemylspx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemylspx.exe"113⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoxpch.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxpch.exe"114⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdqmpq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqmpq.exe"115⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvbzpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbzpy.exe"116⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdjmik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjmik.exe"117⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsygqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsygqr.exe"118⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Sysqemisdcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemisdcb.exe"119⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkjjsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjjsy.exe"120⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrntfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrntfq.exe"121⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcjuqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjuqx.exe"122⤵PID:2744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-