Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 22:47
Behavioral task
behavioral1
Sample
613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe
Resource
win10v2004-20240419-en
General
-
Target
613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe
-
Size
621KB
-
MD5
9297853bc93ab1a8f62762c6affdff9e
-
SHA1
41e40d15ea550c86daf39ce41faa08df3bb80324
-
SHA256
613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2
-
SHA512
ebefcfa23d5055cbd155b6441603d7099b4c745035cb97db9434f88c2790db7ea72ec712023afa56b8e195a8b840c793351bbba770faf848e2a7372eefa0d503
-
SSDEEP
3072:uCaoAs101Pol0xPTM7mRCAdJSSxPUkl3Vn2ZMQTCk/dN92sdNhavtrVdewnAx3wr:uqDAwl0xPTMiR9JSSxPUKl0dodHBwSV
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/3672-0-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b88-6.dat UPX behavioral2/memory/2484-37-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000c000000023b80-42.dat UPX behavioral2/files/0x000a000000023b89-72.dat UPX behavioral2/memory/1424-74-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b8b-109.dat UPX behavioral2/memory/1760-110-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000c000000023b85-144.dat UPX behavioral2/files/0x000b000000023b8c-179.dat UPX behavioral2/files/0x0010000000023a1a-214.dat UPX behavioral2/files/0x000b000000023b8e-249.dat UPX behavioral2/memory/3672-251-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b8f-285.dat UPX behavioral2/memory/4788-291-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2484-292-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b90-322.dat UPX behavioral2/memory/1424-328-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1760-353-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b91-359.dat UPX behavioral2/memory/4224-383-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4424-390-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b92-396.dat UPX behavioral2/memory/2952-405-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3444-427-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b93-433.dat UPX behavioral2/memory/3452-435-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b94-469.dat UPX behavioral2/memory/3044-499-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b95-505.dat UPX behavioral2/memory/1416-507-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1776-536-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b96-542.dat UPX behavioral2/memory/3144-544-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3452-573-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b97-579.dat UPX behavioral2/memory/4004-581-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1128-610-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b98-616.dat UPX behavioral2/memory/1288-618-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1416-651-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a000000023b99-653.dat UPX behavioral2/memory/4920-690-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4004-747-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4744-785-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1288-789-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/5056-819-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2952-847-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3164-869-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2220-881-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3464-914-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4744-947-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/5056-980-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/5108-1013-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2628-1046-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4384-1062-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4788-1088-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2936-1118-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/644-1122-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4824-1155-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4768-1188-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2968-1221-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2936-1250-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1724-1279-0x0000000000400000-0x0000000000493000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemblwkq.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemvcdyw.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemsokzi.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemxnljl.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqembuvxb.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemhjzfu.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemfhvjs.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemfpwkd.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemvjccy.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemtmugv.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemgfkek.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqembehxs.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemqmmep.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqembjasy.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemjpcrz.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemgrgng.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemlfwkg.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemqlmmp.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemlfagq.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemnlbkq.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemklsfd.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemrxaid.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemlzztw.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemcpyxb.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemgrmov.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemamcrg.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemhujyg.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemtvkvr.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqembskoe.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemnrtej.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemtvplw.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemoewkj.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemgnztl.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemrsgwq.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemjyxvj.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemtrhyo.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemphvja.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemmbwrt.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemtudhg.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemqcwnw.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemhnqqf.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemdbcjb.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemyektt.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemnjppi.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemwwpae.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemqjwoj.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemzmgjv.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemztepm.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemuhmeg.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemrxoge.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemltofg.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemzlhml.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemfndtg.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqempocpb.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemrrpdy.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemrddvj.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemlzysu.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemqdhrw.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemrzhfh.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqembdgsa.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemgeolv.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemmvqph.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Sysqemdxojo.exe -
Executes dropped EXE 64 IoCs
pid Process 2484 Sysqemcdnrf.exe 1424 Sysqembskoe.exe 1760 Sysqemzmgjv.exe 4224 Sysqemztepm.exe 4424 Sysqemjltmr.exe 2952 Sysqemuhmeg.exe 3444 Sysqemblwkq.exe 4788 Sysqemhfqnb.exe 3044 Sysqempypnh.exe 1776 Sysqempnnsg.exe 3144 Sysqemhnqqf.exe 3452 Sysqemrxoge.exe 1128 Sysqemznbtx.exe 1416 Sysqemrrpdy.exe 4920 Sysqemgnyjw.exe 4004 Sysqemgcxcz.exe 1288 Sysqemodxhz.exe 2952 Sysqembfmcw.exe 3164 Sysqemltofg.exe 2220 Sysqembjasy.exe 3464 Sysqemwacvo.exe 4744 Sysqemywfyj.exe 5056 Sysqemzwgdc.exe 5108 Sysqemrsgwq.exe 2628 Sysqemdbcjb.exe 4384 Sysqemzlhml.exe 4788 Sysqemrzhfh.exe 644 Sysqemdqksk.exe 4824 Sysqemrddvj.exe 4768 Sysqembdgsa.exe 2968 Sysqemiwodj.exe 2936 Sysqemtwton.exe 1724 Sysqemjlobf.exe 4744 Sysqemtwere.exe 1840 Sysqemjpcrz.exe 5108 Sysqemnrtej.exe 1876 Sysqemwstkk.exe 4400 Sysqemgrgng.exe 568 Sysqemwwpae.exe 1824 Sysqemjyxvj.exe 1520 Sysqemqjwoj.exe 4948 Sysqemdiawl.exe 2232 Sysqemtqnom.exe 3532 Sysqeminwck.exe 1928 Sysqemnlbkq.exe 1532 Sysqemwioxc.exe 4548 Sysqemsnifv.exe 1424 Sysqemanhfc.exe 4292 Sysqemlfwkg.exe 1128 Sysqemntznj.exe 2340 Sysqemgeolv.exe 628 Sysqemgpadj.exe 2908 Sysqemtrhyo.exe 1488 Sysqemnijbd.exe 4948 Sysqemyektt.exe 2436 Sysqemqsceh.exe 3192 Sysqemqeowe.exe 1648 Sysqemqlmmp.exe 2932 Sysqemssbxe.exe 2484 Sysqemqpjkr.exe 1236 Sysqemvcdyw.exe 1760 Sysqemnjhqe.exe 4528 Sysqemfndtg.exe 4380 Sysqemyjvlc.exe -
resource yara_rule behavioral2/memory/3672-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b88-6.dat upx behavioral2/memory/2484-37-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000c000000023b80-42.dat upx behavioral2/files/0x000a000000023b89-72.dat upx behavioral2/memory/1424-74-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b8b-109.dat upx behavioral2/memory/1760-110-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000c000000023b85-144.dat upx behavioral2/files/0x000b000000023b8c-179.dat upx behavioral2/files/0x0010000000023a1a-214.dat upx behavioral2/files/0x000b000000023b8e-249.dat upx behavioral2/memory/3672-251-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b8f-285.dat upx behavioral2/memory/4788-291-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2484-292-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b90-322.dat upx behavioral2/memory/1424-328-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1760-353-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b91-359.dat upx behavioral2/memory/4224-383-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4424-390-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b92-396.dat upx behavioral2/memory/2952-405-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3444-427-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b93-433.dat upx behavioral2/memory/3452-435-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b94-469.dat upx behavioral2/memory/3044-499-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b95-505.dat upx behavioral2/memory/1416-507-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1776-536-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b96-542.dat upx behavioral2/memory/3144-544-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3452-573-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b97-579.dat upx behavioral2/memory/4004-581-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1128-610-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b98-616.dat upx behavioral2/memory/1288-618-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1416-651-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b99-653.dat upx behavioral2/memory/4920-690-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4004-747-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4744-785-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1288-789-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5056-819-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2952-847-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3164-869-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2220-881-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3464-914-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4744-947-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5056-980-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5108-1013-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2628-1046-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4384-1062-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4788-1088-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2936-1118-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/644-1122-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4824-1155-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4768-1188-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2968-1221-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2936-1250-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1724-1279-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxkjuu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemphvja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxnljl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjlobf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqjwoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemimthb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemehpmx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzpww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempnnsg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwstkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdhdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfndtg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembuvxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyfqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvarua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgciky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuhmeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgeolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemslhhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrsgwq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnrtej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwwpae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzmcp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvccs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztepm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemznbtx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembfmcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfkek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfaqjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwacvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscdxr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsokzi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgnyjw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuhqfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjyxvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqpjkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitkjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdtssu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembskoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhnqqf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwgdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwezxe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlsafk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzysu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqcwnw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempypnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltofg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrddvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeqlvt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrmov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemibnmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfhvjs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempxygp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqeowe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemssbxe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemikeqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzohph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmruzf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjpcrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdiawl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqsceh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwfarz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnlbkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqlmmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 2484 3672 613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe 84 PID 3672 wrote to memory of 2484 3672 613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe 84 PID 3672 wrote to memory of 2484 3672 613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe 84 PID 2484 wrote to memory of 1424 2484 Sysqemcdnrf.exe 86 PID 2484 wrote to memory of 1424 2484 Sysqemcdnrf.exe 86 PID 2484 wrote to memory of 1424 2484 Sysqemcdnrf.exe 86 PID 1424 wrote to memory of 1760 1424 Sysqembskoe.exe 88 PID 1424 wrote to memory of 1760 1424 Sysqembskoe.exe 88 PID 1424 wrote to memory of 1760 1424 Sysqembskoe.exe 88 PID 1760 wrote to memory of 4224 1760 Sysqemzmgjv.exe 89 PID 1760 wrote to memory of 4224 1760 Sysqemzmgjv.exe 89 PID 1760 wrote to memory of 4224 1760 Sysqemzmgjv.exe 89 PID 4224 wrote to memory of 4424 4224 Sysqemztepm.exe 90 PID 4224 wrote to memory of 4424 4224 Sysqemztepm.exe 90 PID 4224 wrote to memory of 4424 4224 Sysqemztepm.exe 90 PID 4424 wrote to memory of 2952 4424 Sysqemjltmr.exe 91 PID 4424 wrote to memory of 2952 4424 Sysqemjltmr.exe 91 PID 4424 wrote to memory of 2952 4424 Sysqemjltmr.exe 91 PID 2952 wrote to memory of 3444 2952 Sysqemuhmeg.exe 92 PID 2952 wrote to memory of 3444 2952 Sysqemuhmeg.exe 92 PID 2952 wrote to memory of 3444 2952 Sysqemuhmeg.exe 92 PID 3444 wrote to memory of 4788 3444 Sysqemblwkq.exe 93 PID 3444 wrote to memory of 4788 3444 Sysqemblwkq.exe 93 PID 3444 wrote to memory of 4788 3444 Sysqemblwkq.exe 93 PID 4788 wrote to memory of 3044 4788 Sysqemhfqnb.exe 94 PID 4788 wrote to memory of 3044 4788 Sysqemhfqnb.exe 94 PID 4788 wrote to memory of 3044 4788 Sysqemhfqnb.exe 94 PID 3044 wrote to memory of 1776 3044 Sysqempypnh.exe 95 PID 3044 wrote to memory of 1776 3044 Sysqempypnh.exe 95 PID 3044 wrote to memory of 1776 3044 Sysqempypnh.exe 95 PID 1776 wrote to memory of 3144 1776 Sysqempnnsg.exe 96 PID 1776 wrote to memory of 3144 1776 Sysqempnnsg.exe 96 PID 1776 wrote to memory of 3144 1776 Sysqempnnsg.exe 96 PID 3144 wrote to memory of 3452 3144 Sysqemhnqqf.exe 97 PID 3144 wrote to memory of 3452 3144 Sysqemhnqqf.exe 97 PID 3144 wrote to memory of 3452 3144 Sysqemhnqqf.exe 97 PID 3452 wrote to memory of 1128 3452 Sysqemrxoge.exe 98 PID 3452 wrote to memory of 1128 3452 Sysqemrxoge.exe 98 PID 3452 wrote to memory of 1128 3452 Sysqemrxoge.exe 98 PID 1128 wrote to memory of 1416 1128 Sysqemznbtx.exe 99 PID 1128 wrote to memory of 1416 1128 Sysqemznbtx.exe 99 PID 1128 wrote to memory of 1416 1128 Sysqemznbtx.exe 99 PID 1416 wrote to memory of 4920 1416 Sysqemrrpdy.exe 100 PID 1416 wrote to memory of 4920 1416 Sysqemrrpdy.exe 100 PID 1416 wrote to memory of 4920 1416 Sysqemrrpdy.exe 100 PID 4920 wrote to memory of 4004 4920 Sysqemgnyjw.exe 101 PID 4920 wrote to memory of 4004 4920 Sysqemgnyjw.exe 101 PID 4920 wrote to memory of 4004 4920 Sysqemgnyjw.exe 101 PID 4004 wrote to memory of 1288 4004 Sysqemgcxcz.exe 102 PID 4004 wrote to memory of 1288 4004 Sysqemgcxcz.exe 102 PID 4004 wrote to memory of 1288 4004 Sysqemgcxcz.exe 102 PID 1288 wrote to memory of 2952 1288 Sysqemodxhz.exe 103 PID 1288 wrote to memory of 2952 1288 Sysqemodxhz.exe 103 PID 1288 wrote to memory of 2952 1288 Sysqemodxhz.exe 103 PID 2952 wrote to memory of 3164 2952 Sysqembfmcw.exe 104 PID 2952 wrote to memory of 3164 2952 Sysqembfmcw.exe 104 PID 2952 wrote to memory of 3164 2952 Sysqembfmcw.exe 104 PID 3164 wrote to memory of 2220 3164 Sysqemltofg.exe 105 PID 3164 wrote to memory of 2220 3164 Sysqemltofg.exe 105 PID 3164 wrote to memory of 2220 3164 Sysqemltofg.exe 105 PID 2220 wrote to memory of 3464 2220 Sysqembjasy.exe 106 PID 2220 wrote to memory of 3464 2220 Sysqembjasy.exe 106 PID 2220 wrote to memory of 3464 2220 Sysqembjasy.exe 106 PID 3464 wrote to memory of 4744 3464 Sysqemwacvo.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe"C:\Users\Admin\AppData\Local\Temp\613263a54db271e2775c3bf7ff97b4b4ed33cbdefd73d407411e52573412b9f2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcdnrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdnrf.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Sysqembskoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembskoe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmgjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmgjv.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztepm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztepm.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjltmr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjltmr.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuhmeg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhmeg.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblwkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblwkq.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfqnb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfqnb.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqempypnh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempypnh.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnnsg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnnsg.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhnqqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhnqqf.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxoge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxoge.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznbtx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznbtx.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrpdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrpdy.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnyjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnyjw.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgcxcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcxcz.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodxhz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodxhz.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfmcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfmcw.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltofg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltofg.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqembjasy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembjasy.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwacvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwacvo.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywfyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywfyj.exe"23⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzwgdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwgdc.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrsgwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrsgwq.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbcjb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbcjb.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzhfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzhfh.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqksk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqksk.exe"29⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrddvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrddvj.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdgsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdgsa.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwodj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwodj.exe"32⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwton.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwton.exe"33⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjlobf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjlobf.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwere.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwere.exe"35⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpcrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpcrz.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrtej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrtej.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwstkk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwstkk.exe"38⤵
- Executes dropped EXE
- Modifies registry class
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrgng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrgng.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwwpae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwpae.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjyxvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjyxvj.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqjwoj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqjwoj.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdiawl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdiawl.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqnom.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqnom.exe"44⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqeminwck.exe"C:\Users\Admin\AppData\Local\Temp\Sysqeminwck.exe"45⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnlbkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlbkq.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwioxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwioxc.exe"47⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsnifv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnifv.exe"48⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemanhfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemanhfc.exe"49⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlfwkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlfwkg.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemntznj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntznj.exe"51⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgeolv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgeolv.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgpadj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpadj.exe"53⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrhyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrhyo.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnijbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnijbd.exe"55⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyektt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyektt.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqsceh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsceh.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqeowe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqeowe.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqlmmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqlmmp.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemssbxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssbxe.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpjkr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpjkr.exe"61⤵
- Executes dropped EXE
- Modifies registry class
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcdyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcdyw.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjhqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjhqe.exe"63⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfndtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfndtg.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjvlc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjvlc.exe"65⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitkjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitkjh.exe"66⤵
- Modifies registry class
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzztw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzztw.exe"67⤵
- Checks computer location settings
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemimthb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemimthb.exe"68⤵
- Modifies registry class
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpyxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpyxb.exe"69⤵
- Checks computer location settings
PID:32 -
C:\Users\Admin\AppData\Local\Temp\Sysqemprfsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprfsy.exe"70⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaqtvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqtvu.exe"71⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkxgfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxgfy.exe"72⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuliii.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuliii.exe"73⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemikeqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikeqc.exe"74⤵
- Modifies registry class
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemprawa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprawa.exe"75⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfhvjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfhvjs.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxkjuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkjuu.exe"77⤵
- Modifies registry class
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscdxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscdxr.exe"78⤵
- Modifies registry class
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzmcp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzmcp.exe"79⤵
- Modifies registry class
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpwkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpwkd.exe"80⤵
- Checks computer location settings
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjccy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjccy.exe"81⤵
- Checks computer location settings
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkjodz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjodz.exe"82⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Sysqemacmdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacmdc.exe"83⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemphvja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphvja.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcyxlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyxlp.exe"85⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsokzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsokzi.exe"86⤵
- Checks computer location settings
- Modifies registry class
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjppi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjppi.exe"87⤵
- Checks computer location settings
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzohph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzohph.exe"88⤵
- Modifies registry class
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemslhhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslhhe.exe"89⤵
- Modifies registry class
PID:236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklsfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklsfd.exe"90⤵
- Checks computer location settings
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsvyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsvyt.exe"91⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemusyvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemusyvk.exe"92⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkstnl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkstnl.exe"93⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxnljl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnljl.exe"94⤵
- Checks computer location settings
- Modifies registry class
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwpen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwpen.exe"95⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\Sysqemamcrg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamcrg.exe"96⤵
- Checks computer location settings
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmruzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmruzf.exe"97⤵
- Modifies registry class
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuhqfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhqfl.exe"98⤵
- Modifies registry class
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmvqph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvqph.exe"99⤵
- Checks computer location settings
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjzfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjzfu.exe"100⤵
- Checks computer location settings
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxaid.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxaid.exe"101⤵
- Checks computer location settings
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdhdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdhdd.exe"102⤵
- Modifies registry class
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfaqjb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfaqjb.exe"103⤵
- Modifies registry class
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrted.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrted.exe"104⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Sysqemehpmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehpmx.exe"105⤵
- Modifies registry class
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Sysqempocpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempocpb.exe"106⤵
- Checks computer location settings
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqembuvxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembuvxb.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemowcsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowcsy.exe"108⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwezxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwezxe.exe"109⤵
- Modifies registry class
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfwyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfwyz.exe"110⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeqlvt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqlvt.exe"111⤵
- Modifies registry class
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\Sysqempxygp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxygp.exe"112⤵
- Modifies registry class
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzpww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzpww.exe"113⤵
- Modifies registry class
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbwrt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbwrt.exe"114⤵
- Checks computer location settings
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvekb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvekb.exe"115⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhxlfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxlfy.exe"116⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemreyhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemreyhc.exe"117⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwgfdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgfdz.exe"118⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeyfqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyfqz.exe"119⤵
- Modifies registry class
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhujyg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhujyg.exe"120⤵
- Checks computer location settings
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Sysqembllbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembllbv.exe"121⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"122⤵PID:4336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-