Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 19:42
Behavioral task
behavioral1
Sample
259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a.exe
Resource
win10v2004-20240508-en
General
-
Target
259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a.exe
-
Size
91KB
-
MD5
c46ed6cffca522310436173beebd9382
-
SHA1
65bfb6045b94baa10a349043bde25c9760818d80
-
SHA256
259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a
-
SHA512
f53562022c64e5b75a5a8408c46158c73034342e4e8452285e06bd4e40123c588bf6b208b5380d023545ddeb7fbe8484a61ecf80438ff9663ef89ba2b550ce32
-
SSDEEP
1536:IYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8n7:xdEUfKj8BYbDiC1ZTK7sxtLUIGI
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/3376-0-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000700000002344b-6.dat UPX behavioral2/memory/5104-37-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000800000002344a-42.dat UPX behavioral2/files/0x000700000002344c-72.dat UPX behavioral2/files/0x0008000000023448-107.dat UPX behavioral2/files/0x000700000002344d-142.dat UPX behavioral2/memory/4796-144-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000700000002344e-178.dat UPX behavioral2/files/0x000700000002344f-213.dat UPX behavioral2/memory/3376-219-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0006000000022ad6-250.dat UPX behavioral2/memory/5104-279-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000a0000000233bc-286.dat UPX behavioral2/memory/3732-292-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4360-318-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00090000000233be-324.dat UPX behavioral2/memory/4820-326-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4796-356-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000a0000000233d0-362.dat UPX behavioral2/memory/4084-393-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023452-399.dat UPX behavioral2/memory/4428-434-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023454-436.dat UPX behavioral2/files/0x0007000000023455-471.dat UPX behavioral2/memory/768-502-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0007000000023457-508.dat UPX behavioral2/files/0x000c000000022ae1-543.dat UPX behavioral2/memory/4116-550-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00060000000006cf-580.dat UPX behavioral2/memory/4820-611-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000c0000000233c2-617.dat UPX behavioral2/memory/628-619-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3480-649-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0008000000023450-655.dat UPX behavioral2/memory/4616-686-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/912-691-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2204-693-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1820-722-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2536-756-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2920-757-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1544-767-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/628-793-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2172-802-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2204-836-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3896-867-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4452-896-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4180-930-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1600-965-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4300-1002-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/528-1032-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4140-1066-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2540-1100-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3244-1109-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4940-1135-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4064-1141-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1332-1202-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3688-1209-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4156-1210-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4064-1280-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2056-1314-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4156-1347-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4952-1381-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4408-1411-0x0000000000400000-0x0000000000491000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjgllh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhpayc.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnywyz.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnbpgl.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemkhwjw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemfxeni.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzxxke.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemmnijh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjinli.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrifss.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnytke.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnnsvh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemyfqpe.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdklgt.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemyxijd.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemfgvvp.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemqkxjf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemffkmk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemqeowe.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemybkfg.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemlhxkb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemptcqv.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjdavz.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemyszpa.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdvioo.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemxuajq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjyxvj.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemkxsja.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemmfdzj.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdlrxf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdlcie.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnvldc.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemotgyl.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemqovxn.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqempurfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemlxmqs.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemxyhcj.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemubwwv.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemvxwje.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemxbtjv.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemckljp.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzzota.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemttshl.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwjpzx.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemaydby.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwzxqj.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemtnkxr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjvvme.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqembsvfe.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqempxoyt.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwogol.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemvcjoi.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemsguag.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwszlz.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzyrmz.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwlziu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemmbvmh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgumti.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhnuqk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqempoyki.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemmruzf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemempfr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemymaqb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemoyhjq.exe -
Executes dropped EXE 64 IoCs
pid Process 5104 Sysqemqkxjf.exe 3732 Sysqemlbzlc.exe 4360 Sysqemjgyhn.exe 4796 Sysqemjvvme.exe 4084 Sysqemofehu.exe 4428 Sysqemqovxn.exe 768 Sysqemwjpzx.exe 4116 Sysqemwmbsm.exe 4820 Sysqemoqpco.exe 3480 Sysqemvuzim.exe 4616 Sysqemybnsb.exe 912 Sysqemgumti.exe 1820 Sysqemnywyz.exe 2536 Sysqemymaqb.exe 2920 Sysqemaadtw.exe 1544 Sysqemgyajk.exe 628 Sysqemoyhjq.exe 2172 Sysqemvcjoi.exe 2204 Sysqemdvioo.exe 3896 Sysqembapjh.exe 4452 Sysqemteeuj.exe 4180 Sysqemdlrxf.exe 1600 Sysqemnvhvl.exe 4300 Sysqemdlcie.exe 528 Sysqemjyxvj.exe 4140 Sysqemlxmqs.exe 2540 Sysqembqkrn.exe 4940 Sysqemlmlpg.exe 1332 Sysqemlmnmu.exe 3688 Sysqemlxvxv.exe 3244 Sysqemivdkh.exe 4064 Sysqemsguag.exe 2056 Sysqemfeyii.exe 4156 Sysqemvxwje.exe 4952 Sysqemvmutg.exe 4408 Sysqemqeowe.exe 628 Sysqemdgdrb.exe 2780 Sysqemffkmk.exe 4372 Sysqemybkfg.exe 2600 Sysqemnytke.exe 1984 Sysqemnnsvh.exe 396 Sysqemalwlj.exe 3824 Sysqemdklgt.exe 2212 Sysqemvvaee.exe 4864 Sysqemkhwjw.exe 4592 Sysqempurfb.exe 4880 Sysqemiccps.exe 2460 Sysqemnvldc.exe 1116 Sysqemaxsyz.exe 2900 Sysqemhnpdf.exe 2516 Sysqemaydby.exe 4568 Sysqemfhvjs.exe 2364 Sysqemkxsja.exe 4952 Sysqemnehup.exe 4704 Sysqempoyki.exe 4380 Sysqemxluxt.exe 2324 Sysqempoiiv.exe 2116 Sysqemqlyae.exe 3700 Sysqemfxeni.exe 592 Sysqemnbpgl.exe 4408 Sysqemufrlu.exe 4864 Sysqemxbtjv.exe 4860 Sysqemckljp.exe 3164 Sysqemcgyug.exe -
resource yara_rule behavioral2/memory/3376-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002344b-6.dat upx behavioral2/memory/5104-37-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000800000002344a-42.dat upx behavioral2/files/0x000700000002344c-72.dat upx behavioral2/files/0x0008000000023448-107.dat upx behavioral2/files/0x000700000002344d-142.dat upx behavioral2/memory/4796-144-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002344e-178.dat upx behavioral2/files/0x000700000002344f-213.dat upx behavioral2/memory/3376-219-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0006000000022ad6-250.dat upx behavioral2/memory/5104-279-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000a0000000233bc-286.dat upx behavioral2/memory/3732-292-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4360-318-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00090000000233be-324.dat upx behavioral2/memory/4820-326-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4796-356-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000a0000000233d0-362.dat upx behavioral2/memory/4084-393-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023452-399.dat upx behavioral2/memory/4428-434-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023454-436.dat upx behavioral2/files/0x0007000000023455-471.dat upx behavioral2/memory/768-502-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023457-508.dat upx behavioral2/files/0x000c000000022ae1-543.dat upx behavioral2/memory/4116-550-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00060000000006cf-580.dat upx behavioral2/memory/4820-611-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000c0000000233c2-617.dat upx behavioral2/memory/628-619-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3480-649-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0008000000023450-655.dat upx behavioral2/memory/4616-686-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/912-691-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2204-693-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1820-722-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2536-756-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2920-757-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1544-767-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/628-793-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2172-802-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2204-836-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3896-867-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4452-896-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4180-930-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1600-965-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4300-1002-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/528-1032-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4140-1066-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2540-1100-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3244-1109-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4940-1135-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4064-1141-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1332-1202-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3688-1209-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4156-1210-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4064-1280-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2056-1314-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4156-1347-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4952-1381-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4408-1411-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdlcie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjinli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgllh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaqpvh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgyhn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembapjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvxwje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkhwjw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemptcqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembjqpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembsvfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnpcem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvuzim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfeyii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempurfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhnpdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcwkon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlpzy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyfqpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyszpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjvvme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjyxvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwogol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmfdzj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemabykw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybnsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzxxke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkiai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmnijh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzxei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlgxhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqgvhq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofehu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrvomw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnnsvh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotgyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemckljp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubwwv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzota.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyxijd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwgeo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnywyz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfxeni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoyhjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrokos.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybkfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjdavz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmzjoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcpfcr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemempfr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvmasa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivdkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqeowe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempoyki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrqqyo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnehup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuajq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwinng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmbvmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemymaqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemffkmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaxsyz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvtshp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqkxjf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 5104 3376 259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a.exe 81 PID 3376 wrote to memory of 5104 3376 259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a.exe 81 PID 3376 wrote to memory of 5104 3376 259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a.exe 81 PID 5104 wrote to memory of 3732 5104 Sysqemqkxjf.exe 82 PID 5104 wrote to memory of 3732 5104 Sysqemqkxjf.exe 82 PID 5104 wrote to memory of 3732 5104 Sysqemqkxjf.exe 82 PID 3732 wrote to memory of 4360 3732 Sysqemlbzlc.exe 86 PID 3732 wrote to memory of 4360 3732 Sysqemlbzlc.exe 86 PID 3732 wrote to memory of 4360 3732 Sysqemlbzlc.exe 86 PID 4360 wrote to memory of 4796 4360 Sysqemjgyhn.exe 87 PID 4360 wrote to memory of 4796 4360 Sysqemjgyhn.exe 87 PID 4360 wrote to memory of 4796 4360 Sysqemjgyhn.exe 87 PID 4796 wrote to memory of 4084 4796 Sysqemjvvme.exe 89 PID 4796 wrote to memory of 4084 4796 Sysqemjvvme.exe 89 PID 4796 wrote to memory of 4084 4796 Sysqemjvvme.exe 89 PID 4084 wrote to memory of 4428 4084 Sysqemofehu.exe 90 PID 4084 wrote to memory of 4428 4084 Sysqemofehu.exe 90 PID 4084 wrote to memory of 4428 4084 Sysqemofehu.exe 90 PID 4428 wrote to memory of 768 4428 Sysqemqovxn.exe 91 PID 4428 wrote to memory of 768 4428 Sysqemqovxn.exe 91 PID 4428 wrote to memory of 768 4428 Sysqemqovxn.exe 91 PID 768 wrote to memory of 4116 768 Sysqemwjpzx.exe 92 PID 768 wrote to memory of 4116 768 Sysqemwjpzx.exe 92 PID 768 wrote to memory of 4116 768 Sysqemwjpzx.exe 92 PID 4116 wrote to memory of 4820 4116 Sysqemwmbsm.exe 93 PID 4116 wrote to memory of 4820 4116 Sysqemwmbsm.exe 93 PID 4116 wrote to memory of 4820 4116 Sysqemwmbsm.exe 93 PID 4820 wrote to memory of 3480 4820 Sysqemoqpco.exe 95 PID 4820 wrote to memory of 3480 4820 Sysqemoqpco.exe 95 PID 4820 wrote to memory of 3480 4820 Sysqemoqpco.exe 95 PID 3480 wrote to memory of 4616 3480 Sysqemvuzim.exe 96 PID 3480 wrote to memory of 4616 3480 Sysqemvuzim.exe 96 PID 3480 wrote to memory of 4616 3480 Sysqemvuzim.exe 96 PID 4616 wrote to memory of 912 4616 Sysqemybnsb.exe 97 PID 4616 wrote to memory of 912 4616 Sysqemybnsb.exe 97 PID 4616 wrote to memory of 912 4616 Sysqemybnsb.exe 97 PID 912 wrote to memory of 1820 912 Sysqemgumti.exe 98 PID 912 wrote to memory of 1820 912 Sysqemgumti.exe 98 PID 912 wrote to memory of 1820 912 Sysqemgumti.exe 98 PID 1820 wrote to memory of 2536 1820 Sysqemnywyz.exe 99 PID 1820 wrote to memory of 2536 1820 Sysqemnywyz.exe 99 PID 1820 wrote to memory of 2536 1820 Sysqemnywyz.exe 99 PID 2536 wrote to memory of 2920 2536 Sysqemymaqb.exe 101 PID 2536 wrote to memory of 2920 2536 Sysqemymaqb.exe 101 PID 2536 wrote to memory of 2920 2536 Sysqemymaqb.exe 101 PID 2920 wrote to memory of 1544 2920 Sysqemaadtw.exe 102 PID 2920 wrote to memory of 1544 2920 Sysqemaadtw.exe 102 PID 2920 wrote to memory of 1544 2920 Sysqemaadtw.exe 102 PID 1544 wrote to memory of 628 1544 Sysqemgyajk.exe 123 PID 1544 wrote to memory of 628 1544 Sysqemgyajk.exe 123 PID 1544 wrote to memory of 628 1544 Sysqemgyajk.exe 123 PID 628 wrote to memory of 2172 628 Sysqemoyhjq.exe 104 PID 628 wrote to memory of 2172 628 Sysqemoyhjq.exe 104 PID 628 wrote to memory of 2172 628 Sysqemoyhjq.exe 104 PID 2172 wrote to memory of 2204 2172 Sysqemvcjoi.exe 105 PID 2172 wrote to memory of 2204 2172 Sysqemvcjoi.exe 105 PID 2172 wrote to memory of 2204 2172 Sysqemvcjoi.exe 105 PID 2204 wrote to memory of 3896 2204 Sysqemdvioo.exe 106 PID 2204 wrote to memory of 3896 2204 Sysqemdvioo.exe 106 PID 2204 wrote to memory of 3896 2204 Sysqemdvioo.exe 106 PID 3896 wrote to memory of 4452 3896 Sysqembapjh.exe 107 PID 3896 wrote to memory of 4452 3896 Sysqembapjh.exe 107 PID 3896 wrote to memory of 4452 3896 Sysqembapjh.exe 107 PID 4452 wrote to memory of 4180 4452 Sysqemteeuj.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a.exe"C:\Users\Admin\AppData\Local\Temp\259ca0b516a42737ec5e9be919e4a0ebe326c3a2af70065f49e99fb8feabcb3a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqkxjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkxjf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbzlc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbzlc.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgyhn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgyhn.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjvvme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvvme.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofehu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofehu.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqovxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqovxn.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjpzx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjpzx.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmbsm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmbsm.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqpco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqpco.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuzim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuzim.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgumti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgumti.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnywyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnywyz.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemymaqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemymaqb.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaadtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaadtw.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyajk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyajk.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoyhjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoyhjq.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcjoi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcjoi.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Sysqembapjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembapjh.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteeuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteeuj.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdlrxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlrxf.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnvhvl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnvhvl.exe"24⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdlcie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlcie.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjyxvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjyxvj.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxmqs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxmqs.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqkrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqkrn.exe"28⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmlpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmlpg.exe"29⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmnmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmnmu.exe"30⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxvxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxvxv.exe"31⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemivdkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivdkh.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsguag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsguag.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfeyii.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfeyii.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxwje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxwje.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvmutg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvmutg.exe"36⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqeowe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqeowe.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgdrb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgdrb.exe"38⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffkmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffkmk.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybkfg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybkfg.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnytke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnytke.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnnsvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnnsvh.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalwlj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalwlj.exe"43⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdklgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdklgt.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvvaee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvvaee.exe"45⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhwjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhwjw.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\Sysqempurfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempurfb.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiccps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiccps.exe"48⤵
- Executes dropped EXE
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnvldc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnvldc.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaxsyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaxsyz.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhnpdf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhnpdf.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaydby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaydby.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfhvjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfhvjs.exe"53⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxsja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxsja.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnehup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnehup.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Sysqempoyki.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempoyki.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxluxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxluxt.exe"57⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqempoiiv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempoiiv.exe"58⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqlyae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqlyae.exe"59⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxeni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxeni.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnbpgl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnbpgl.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemufrlu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemufrlu.exe"62⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxbtjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxbtjv.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcgyug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcgyug.exe"65⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhppci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhppci.exe"66⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkhixl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhixl.exe"67⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\Sysqempxoyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxoyt.exe"68⤵
- Checks computer location settings
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcwkon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwkon.exe"69⤵
- Modifies registry class
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuajq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuajq.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmzjoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmzjoo.exe"71⤵
- Modifies registry class
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxywzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxywzk.exe"72⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmruzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmruzf.exe"73⤵
- Checks computer location settings
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyhcj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyhcj.exe"74⤵
- Checks computer location settings
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpfcr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpfcr.exe"75⤵
- Modifies registry class
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzxxke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxxke.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhnuqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhnuqk.exe"77⤵
- Checks computer location settings
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjykgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjykgj.exe"78⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwogol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwogol.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeedtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeedtj.exe"80⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmfdzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfdzj.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubwwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubwwv.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlpzy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlpzy.exe"83⤵
- Modifies registry class
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemempfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemempfr.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptcqv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptcqv.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwinng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwinng.exe"86⤵
- Modifies registry class
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhpayc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhpayc.exe"87⤵
- Checks computer location settings
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbvmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbvmh.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnijh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnijh.exe"89⤵
- Checks computer location settings
- Modifies registry class
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtasv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtasv.exe"90⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjdavz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdavz.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbiam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbiam.exe"92⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"93⤵
- Checks computer location settings
- Modifies registry class
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwzsle.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzsle.exe"94⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"95⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzyrmz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzyrmz.exe"96⤵
- Checks computer location settings
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrifss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrifss.exe"97⤵
- Checks computer location settings
PID:376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfqpe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfqpe.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhxkb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhxkb.exe"99⤵
- Checks computer location settings
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"100⤵
- Checks computer location settings
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrqqyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqqyo.exe"101⤵
- Modifies registry class
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwszlz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwszlz.exe"102⤵
- Checks computer location settings
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzota.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzota.exe"103⤵
- Checks computer location settings
- Modifies registry class
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvomw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvomw.exe"104⤵
- Modifies registry class
PID:528 -
C:\Users\Admin\AppData\Local\Temp\Sysqembjqpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembjqpy.exe"105⤵
- Modifies registry class
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvtshp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvtshp.exe"107⤵
- Modifies registry class
PID:184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgllh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgllh.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotgyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotgyl.exe"109⤵
- Checks computer location settings
- Modifies registry class
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrokos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrokos.exe"110⤵
- Modifies registry class
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjowrd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjowrd.exe"111⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyxijd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxijd.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzxei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzxei.exe"113⤵
- Modifies registry class
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Sysqembsvfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembsvfe.exe"114⤵
- Checks computer location settings
- Modifies registry class
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgxhf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgxhf.exe"115⤵
- Modifies registry class
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkiai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkiai.exe"116⤵
- Modifies registry class
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwzxqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzxqj.exe"117⤵
- Checks computer location settings
PID:260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwgeo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwgeo.exe"118⤵
- Modifies registry class
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevlgs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevlgs.exe"119⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\Sysqemttshl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttshl.exe"120⤵
- Checks computer location settings
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlcez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlcez.exe"121⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemabykw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabykw.exe"122⤵
- Modifies registry class
PID:4476
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-