Analysis
-
max time kernel
92s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 02:07
Behavioral task
behavioral1
Sample
c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b.exe
Resource
win10v2004-20240226-en
General
-
Target
c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b.exe
-
Size
240KB
-
MD5
bc975ee36062c6ae9ea2966b0a019515
-
SHA1
55f490418c3d6e833e6bf7eeaf07455749062fda
-
SHA256
c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b
-
SHA512
64b28f63bfdb2f143909eaa76e41f0fea141169b09d43353fab603bfc9728b5a0ae060ce84af76ddc1cea1cd21cea92df7b8c6f0aa73b859005e0c7cb2f09671
-
SSDEEP
3072:ydEUfKj8BYbDiC1ZTK7sxtLUIGT9kXH0hga4PjBy2XiXV/mwTwyg4K+mpPNHdUpd:yUSiZTK40V2a4PdyoeV/Hwz4zmpPNipd
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023206-6.dat UPX behavioral2/files/0x0007000000023205-42.dat UPX behavioral2/files/0x0007000000023207-72.dat UPX behavioral2/files/0x0007000000023208-108.dat UPX behavioral2/files/0x0007000000023209-144.dat UPX behavioral2/files/0x000700000002320a-180.dat UPX behavioral2/files/0x000700000002320b-215.dat UPX behavioral2/memory/648-247-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000300000002276c-253.dat UPX behavioral2/files/0x000300000002276e-291.dat UPX behavioral2/memory/5008-292-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1452-293-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3932-327-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000b000000023121-329.dat UPX behavioral2/memory/4800-331-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000700000002320c-365.dat UPX behavioral2/memory/1460-370-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4948-398-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000b00000002311f-404.dat UPX behavioral2/memory/4036-405-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4028-436-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000700000002320e-442.dat UPX behavioral2/memory/2548-478-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000700000002320f-480.dat UPX behavioral2/memory/3364-481-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3672-488-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/5008-514-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000500000002270c-520.dat UPX behavioral2/memory/5080-522-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4800-552-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2432-554-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000b00000002311e-560.dat UPX behavioral2/memory/4036-591-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0007000000023210-597.dat UPX behavioral2/memory/4828-605-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3364-631-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0007000000023211-637.dat UPX behavioral2/memory/5080-669-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0007000000023213-675.dat UPX behavioral2/memory/3408-683-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1540-713-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/764-742-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4604-748-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2580-782-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4992-817-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1540-846-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4404-852-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4604-881-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3568-916-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3956-922-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2428-984-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2176-993-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4404-1019-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4200-1025-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2632-1031-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3956-1056-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4844-1062-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3188-1091-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2176-1102-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4200-1137-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4844-1163-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2252-1207-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2200-1237-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4728-1266-0x0000000000400000-0x000000000049E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemxuajq.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemiyfue.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemhgqvw.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemaszfr.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemsgkql.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemuilon.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemrzfpl.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemocvxi.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemqojlw.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqembeghd.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqembtbdq.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemekmnp.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemhryiz.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemmpiou.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemnqdik.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemuzwsk.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemqdhtj.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemthwcm.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemswduo.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemwdqju.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemqcqmh.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemosfdq.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgblao.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemwinng.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemotfsa.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemygvhb.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemyifas.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemfirli.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemkbydr.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemoiddd.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgqrhy.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemmewwf.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemlzhal.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemygidh.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemkwshm.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemwplqt.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemmuinm.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemzuuwf.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemlnlmm.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemzfrmm.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemdqeec.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemivdkh.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemmurix.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemtzqpx.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemygbfc.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemxdwvz.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemtwarj.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemzdlrc.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemwttnf.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemlcpcy.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemzbqjl.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemwnqul.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemdeqes.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemogspm.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemvcjdm.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemtxzie.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemscdxr.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemkhixl.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemkpsei.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemfdsue.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemywkcd.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemjqbgj.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemqzzdg.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Sysqemgolzg.exe -
Executes dropped EXE 64 IoCs
pid Process 1452 Sysqemwycwl.exe 3932 Sysqemzfrmm.exe 1460 Sysqemthwcm.exe 4948 Sysqembeghd.exe 4028 Sysqemlzhal.exe 2548 Sysqemwrpxq.exe 3672 Sysqemybovi.exe 5008 Sysqemwkzvd.exe 4800 Sysqemtthqm.exe 2432 Sysqembmgqa.exe 4036 Sysqemmewwf.exe 4828 Sysqemmpiou.exe 3364 Sysqemjfpov.exe 5080 Sysqemjqbgj.exe 3408 Sysqembnbzf.exe 764 Sysqemmmgcb.exe 2580 Sysqemwttnf.exe 4992 Sysqemoauqv.exe 1540 Sysqemmurix.exe 4604 Sysqemotgdh.exe 3568 Sysqemeibrz.exe 2428 Sysqemrkiue.exe 4404 Sysqemqovxn.exe 2632 Sysqembzvaf.exe 3956 Sysqemyifas.exe 3188 Sysqemgblao.exe 2176 Sysqemdcvnr.exe 4200 Sysqemtsibk.exe 4844 Sysqemvrxwt.exe 2252 Sysqemyjyzx.exe 4728 Sysqemybhxd.exe 3160 Sysqemogspm.exe 4348 Sysqemdpfvh.exe 2200 Sysqemygidh.exe 1056 Sysqemwdqju.exe 412 Sysqemtejbj.exe 664 Sysqemsixms.exe 2980 Sysqemanhfc.exe 2156 Sysqemivdkh.exe 2788 Sysqemiwnin.exe 3724 Sysqemlfgdr.exe 4332 Sysqemqppmt.exe 1340 Sysqemtzqpx.exe 4088 Sysqemaszfr.exe 4152 Sysqemlcpcy.exe 1532 Sysqemnytke.exe 3624 Sysqemnqdik.exe 2044 Sysqemncros.exe 3648 Sysqemyjero.exe 5116 Sysqemiyfue.exe 1356 Sysqemqcqmh.exe 2040 Sysqemygbfc.exe 3032 Sysqemkpfan.exe 3056 Sysqemcauqa.exe 1732 Sysqemqzzdg.exe 4348 Sysqemdqeec.exe 2736 Sysqemscdxr.exe 5100 Sysqemcmbmq.exe 2012 Sysqemxdwvz.exe 2780 Sysqemsgkql.exe 1444 Sysqemfirli.exe 620 Sysqemxbtjv.exe 392 Sysqemsdhez.exe 1844 Sysqempbpkl.exe -
resource yara_rule behavioral2/memory/648-0-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023206-6.dat upx behavioral2/memory/1452-37-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023205-42.dat upx behavioral2/files/0x0007000000023207-72.dat upx behavioral2/memory/3932-73-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023208-108.dat upx behavioral2/memory/1460-110-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023209-144.dat upx behavioral2/memory/4948-145-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000700000002320a-180.dat upx behavioral2/files/0x000700000002320b-215.dat upx behavioral2/memory/2548-217-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/648-247-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000300000002276c-253.dat upx behavioral2/memory/3672-255-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000300000002276e-291.dat upx behavioral2/memory/5008-292-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1452-293-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3932-327-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000b000000023121-329.dat upx behavioral2/memory/4800-331-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000700000002320c-365.dat upx behavioral2/memory/1460-370-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4948-398-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000b00000002311f-404.dat upx behavioral2/memory/4036-405-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4028-436-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000700000002320e-442.dat upx behavioral2/memory/4828-443-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2548-478-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000700000002320f-480.dat upx behavioral2/memory/3364-481-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3672-488-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5008-514-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000500000002270c-520.dat upx behavioral2/memory/5080-522-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4800-552-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2432-554-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000b00000002311e-560.dat upx behavioral2/memory/4036-591-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023210-597.dat upx behavioral2/memory/764-599-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4828-605-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3364-631-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023211-637.dat upx behavioral2/memory/2580-639-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5080-669-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023213-675.dat upx behavioral2/memory/4992-677-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3408-683-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1540-713-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/764-742-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4604-748-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2580-782-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2428-816-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4992-817-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1540-846-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4404-852-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4604-881-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2632-887-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3568-916-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3956-922-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3188-955-0x0000000000400000-0x000000000049E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmewwf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtsibk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemekmnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhywc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqojlw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtzqpx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqcqmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgpsso.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoauqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybhxd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkpfan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscdxr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoegix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkpsei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkqix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygvhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzfrmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzhal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqppmt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmpiou.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembzvaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempbpkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhryiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkosjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemswduo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdcvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlfgdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjero.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzwsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhajw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmuinm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqrhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemogspm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdqju.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuilon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembexxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdlrc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqialb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwkzvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcauqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzzdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzprmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwnqul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqswwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemthwcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiyfue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemocvxi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwarj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqovxn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjlpji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjsvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmgqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjyzx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyvwd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotfsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjqbgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemanhfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnytke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsdhez.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrzfpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhgqvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgblao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygbfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxbtjv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 648 wrote to memory of 1452 648 c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b.exe 86 PID 648 wrote to memory of 1452 648 c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b.exe 86 PID 648 wrote to memory of 1452 648 c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b.exe 86 PID 1452 wrote to memory of 3932 1452 Sysqemwycwl.exe 88 PID 1452 wrote to memory of 3932 1452 Sysqemwycwl.exe 88 PID 1452 wrote to memory of 3932 1452 Sysqemwycwl.exe 88 PID 3932 wrote to memory of 1460 3932 Sysqemzfrmm.exe 89 PID 3932 wrote to memory of 1460 3932 Sysqemzfrmm.exe 89 PID 3932 wrote to memory of 1460 3932 Sysqemzfrmm.exe 89 PID 1460 wrote to memory of 4948 1460 Sysqemthwcm.exe 90 PID 1460 wrote to memory of 4948 1460 Sysqemthwcm.exe 90 PID 1460 wrote to memory of 4948 1460 Sysqemthwcm.exe 90 PID 4948 wrote to memory of 4028 4948 Sysqembeghd.exe 91 PID 4948 wrote to memory of 4028 4948 Sysqembeghd.exe 91 PID 4948 wrote to memory of 4028 4948 Sysqembeghd.exe 91 PID 4028 wrote to memory of 2548 4028 Sysqemlzhal.exe 92 PID 4028 wrote to memory of 2548 4028 Sysqemlzhal.exe 92 PID 4028 wrote to memory of 2548 4028 Sysqemlzhal.exe 92 PID 2548 wrote to memory of 3672 2548 Sysqemwrpxq.exe 95 PID 2548 wrote to memory of 3672 2548 Sysqemwrpxq.exe 95 PID 2548 wrote to memory of 3672 2548 Sysqemwrpxq.exe 95 PID 3672 wrote to memory of 5008 3672 Sysqemybovi.exe 96 PID 3672 wrote to memory of 5008 3672 Sysqemybovi.exe 96 PID 3672 wrote to memory of 5008 3672 Sysqemybovi.exe 96 PID 5008 wrote to memory of 4800 5008 Sysqemwkzvd.exe 97 PID 5008 wrote to memory of 4800 5008 Sysqemwkzvd.exe 97 PID 5008 wrote to memory of 4800 5008 Sysqemwkzvd.exe 97 PID 4800 wrote to memory of 2432 4800 Sysqemtthqm.exe 98 PID 4800 wrote to memory of 2432 4800 Sysqemtthqm.exe 98 PID 4800 wrote to memory of 2432 4800 Sysqemtthqm.exe 98 PID 2432 wrote to memory of 4036 2432 Sysqembmgqa.exe 101 PID 2432 wrote to memory of 4036 2432 Sysqembmgqa.exe 101 PID 2432 wrote to memory of 4036 2432 Sysqembmgqa.exe 101 PID 4036 wrote to memory of 4828 4036 Sysqemmewwf.exe 102 PID 4036 wrote to memory of 4828 4036 Sysqemmewwf.exe 102 PID 4036 wrote to memory of 4828 4036 Sysqemmewwf.exe 102 PID 4828 wrote to memory of 3364 4828 Sysqemmpiou.exe 103 PID 4828 wrote to memory of 3364 4828 Sysqemmpiou.exe 103 PID 4828 wrote to memory of 3364 4828 Sysqemmpiou.exe 103 PID 3364 wrote to memory of 5080 3364 Sysqemjfpov.exe 104 PID 3364 wrote to memory of 5080 3364 Sysqemjfpov.exe 104 PID 3364 wrote to memory of 5080 3364 Sysqemjfpov.exe 104 PID 5080 wrote to memory of 3408 5080 Sysqemjqbgj.exe 105 PID 5080 wrote to memory of 3408 5080 Sysqemjqbgj.exe 105 PID 5080 wrote to memory of 3408 5080 Sysqemjqbgj.exe 105 PID 3408 wrote to memory of 764 3408 Sysqembnbzf.exe 106 PID 3408 wrote to memory of 764 3408 Sysqembnbzf.exe 106 PID 3408 wrote to memory of 764 3408 Sysqembnbzf.exe 106 PID 764 wrote to memory of 2580 764 Sysqemmmgcb.exe 108 PID 764 wrote to memory of 2580 764 Sysqemmmgcb.exe 108 PID 764 wrote to memory of 2580 764 Sysqemmmgcb.exe 108 PID 2580 wrote to memory of 4992 2580 Sysqemwttnf.exe 109 PID 2580 wrote to memory of 4992 2580 Sysqemwttnf.exe 109 PID 2580 wrote to memory of 4992 2580 Sysqemwttnf.exe 109 PID 4992 wrote to memory of 1540 4992 Sysqemoauqv.exe 110 PID 4992 wrote to memory of 1540 4992 Sysqemoauqv.exe 110 PID 4992 wrote to memory of 1540 4992 Sysqemoauqv.exe 110 PID 1540 wrote to memory of 4604 1540 Sysqemmurix.exe 113 PID 1540 wrote to memory of 4604 1540 Sysqemmurix.exe 113 PID 1540 wrote to memory of 4604 1540 Sysqemmurix.exe 113 PID 4604 wrote to memory of 3568 4604 Sysqemotgdh.exe 114 PID 4604 wrote to memory of 3568 4604 Sysqemotgdh.exe 114 PID 4604 wrote to memory of 3568 4604 Sysqemotgdh.exe 114 PID 3568 wrote to memory of 2428 3568 Sysqemeibrz.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b.exe"C:\Users\Admin\AppData\Local\Temp\c33b72cb2cc88670b97c2009abbfcdb10f8b4e10865f8c22ad8f4f16fdd2fb1b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwycwl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwycwl.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzfrmm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzfrmm.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthwcm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthwcm.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Sysqembeghd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembeghd.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzhal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzhal.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrpxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrpxq.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybovi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybovi.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkzvd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkzvd.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtthqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtthqm.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmgqa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmgqa.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmewwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmewwf.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmpiou.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmpiou.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjfpov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfpov.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqbgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqbgj.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnbzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnbzf.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmgcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmgcb.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwttnf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwttnf.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoauqv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoauqv.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmurix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmurix.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotgdh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotgdh.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeibrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeibrz.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkiue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkiue.exe"23⤵
- Executes dropped EXE
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqovxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqovxn.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzvaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzvaf.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyifas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyifas.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgblao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgblao.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcvnr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcvnr.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsibk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsibk.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvrxwt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrxwt.exe"30⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjyzx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjyzx.exe"31⤵
- Executes dropped EXE
- Modifies registry class
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybhxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybhxd.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemogspm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogspm.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpfvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpfvh.exe"34⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygidh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygidh.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdqju.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdqju.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtejbj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtejbj.exe"37⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsixms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsixms.exe"38⤵
- Executes dropped EXE
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemanhfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemanhfc.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemivdkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivdkh.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwnin.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwnin.exe"41⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlfgdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlfgdr.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqppmt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqppmt.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtzqpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtzqpx.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaszfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaszfr.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcpcy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcpcy.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnytke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnytke.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnqdik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnqdik.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemncros.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemncros.exe"49⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjero.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjero.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyfue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyfue.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcqmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcqmh.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygbfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygbfc.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkpfan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpfan.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcauqa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcauqa.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzzdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzzdg.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqeec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqeec.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscdxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscdxr.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcmbmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmbmq.exe"59⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxdwvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdwvz.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsgkql.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgkql.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfirli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfirli.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxbtjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxbtjv.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsdhez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdhez.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sysqempbpkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbpkl.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzprmn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzprmn.exe"66⤵
- Modifies registry class
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhixl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhixl.exe"67⤵
- Checks computer location settings
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzwsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzwsk.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuajq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuajq.exe"69⤵
- Checks computer location settings
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkpsei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpsei.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbqjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbqjl.exe"71⤵
- Checks computer location settings
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwshm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwshm.exe"72⤵
- Checks computer location settings
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuefsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuefsi.exe"73⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfdsue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfdsue.exe"74⤵
- Checks computer location settings
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehgfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehgfv.exe"75⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhryiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhryiz.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkbydr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbydr.exe"77⤵
- Checks computer location settings
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuilon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuilon.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhajw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhajw.exe"79⤵
- Modifies registry class
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwichk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwichk.exe"80⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrzfpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzfpl.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwplqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwplqt.exe"82⤵
- Checks computer location settings
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwinng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwinng.exe"83⤵
- Checks computer location settings
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkosjm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkosjm.exe"84⤵
- Modifies registry class
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyvwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyvwd.exe"85⤵
- Modifies registry class
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjlpji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjlpji.exe"86⤵
- Modifies registry class
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmuinm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmuinm.exe"87⤵
- Checks computer location settings
- Modifies registry class
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemocvxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemocvxi.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjsvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjsvo.exe"89⤵
- Modifies registry class
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtbdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtbdq.exe"90⤵
- Checks computer location settings
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzuuwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzuuwf.exe"91⤵
- Checks computer location settings
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwarj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwarj.exe"92⤵
- Checks computer location settings
- Modifies registry class
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\Sysqembexxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembexxo.exe"93⤵
- Modifies registry class
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemekmnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekmnp.exe"94⤵
- Checks computer location settings
- Modifies registry class
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhgqvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhgqvw.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrctlr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrctlr.exe"96⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzkqix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkqix.exe"97⤵
- Modifies registry class
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhywc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhywc.exe"98⤵
- Modifies registry class
PID:372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgolzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgolzg.exe"99⤵
- Checks computer location settings
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdlrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdlrc.exe"100⤵
- Checks computer location settings
- Modifies registry class
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywkcd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywkcd.exe"101⤵
- Checks computer location settings
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoegix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoegix.exe"102⤵
- Modifies registry class
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotfsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotfsa.exe"103⤵
- Checks computer location settings
- Modifies registry class
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoiddd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoiddd.exe"104⤵
- Checks computer location settings
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdhtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdhtj.exe"105⤵
- Checks computer location settings
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwnqul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwnqul.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnlmm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnlmm.exe"107⤵
- Checks computer location settings
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqrhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqrhy.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdnzvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdnzvk.exe"109⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgxaqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxaqo.exe"110⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvcjdm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcjdm.exe"111⤵
- Checks computer location settings
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqialb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqialb.exe"112⤵
- Modifies registry class
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswduo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswduo.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdeqes.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdeqes.exe"114⤵
- Checks computer location settings
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygvhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygvhb.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllopj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllopj.exe"116⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtxzie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxzie.exe"117⤵
- Checks computer location settings
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosfdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosfdq.exe"118⤵
- Checks computer location settings
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqojlw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqojlw.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqswwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqswwn.exe"120⤵
- Modifies registry class
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghrjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghrjf.exe"121⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvimhs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvimhs.exe"122⤵PID:1484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-