Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 23:48
Behavioral task
behavioral1
Sample
608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d.exe
Resource
win10v2004-20240426-en
General
-
Target
608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d.exe
-
Size
608KB
-
MD5
96237e6dbcc67d60c1a7686700f70886
-
SHA1
6826c412510a97bbf80e3ae3fbb7505552854193
-
SHA256
608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d
-
SHA512
3778644c46ed12d4ef98f9a3fff38a88b4545b535bac9d1bf78901c3d6d57d635e6e3215464ad8be63a3f87be497450e5ce43ca576d751886740a84befaf5a20
-
SSDEEP
3072:2CaoAs101Pol0xPTM7mRCAdJSSxPUkl3Vn2ZMQTCk/dN92sdNhavtrVdewnAx3wU:2qDAwl0xPTMiR9JSSxPUKl0dodH6/9
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/1888-0-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0008000000023382-6.dat UPX behavioral2/files/0x0006000000022f40-41.dat UPX behavioral2/files/0x0008000000023385-71.dat UPX behavioral2/files/0x0008000000023386-106.dat UPX behavioral2/memory/1424-112-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0008000000023389-142.dat UPX behavioral2/memory/1332-144-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000e00000002337b-178.dat UPX behavioral2/files/0x000a00000002338a-213.dat UPX behavioral2/files/0x000a00000002338c-248.dat UPX behavioral2/memory/1888-252-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3724-279-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000d000000023394-286.dat UPX behavioral2/memory/428-287-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1176-316-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0008000000023395-322.dat UPX behavioral2/files/0x0010000000009f7c-358.dat UPX behavioral2/memory/1332-387-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0008000000022976-394.dat UPX behavioral2/memory/2280-395-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3184-400-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2004-425-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000800000002297b-431.dat UPX behavioral2/files/0x0008000000023397-466.dat UPX behavioral2/memory/2148-472-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000800000002339b-503.dat UPX behavioral2/memory/428-509-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3560-538-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000800000002339c-540.dat UPX behavioral2/files/0x000800000002339d-575.dat UPX behavioral2/memory/3692-577-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000800000002296e-611.dat UPX behavioral2/memory/2280-641-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x00080000000233a3-647.dat UPX behavioral2/memory/3820-651-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4852-678-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/5084-684-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3908-712-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3288-713-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4764-746-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3496-752-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2852-780-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3736-813-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2260-819-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3820-855-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1404-885-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/5084-918-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2308-951-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4368-955-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3692-985-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3496-1013-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2404-1046-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2260-1079-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3908-1112-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1404-1117-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4744-1151-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2308-1179-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3692-1180-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1664-1185-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2156-1214-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/5036-1238-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2092-1248-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3216-1281-0x0000000000400000-0x0000000000493000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemuyfwv.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemgjwhk.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemqazbq.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemhplbb.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemgkdfn.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemwgyza.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemxjnef.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemqbzvm.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemnorsr.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqempgjpg.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemuxknp.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemwysji.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemodgkn.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemqswwn.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemundum.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemrlskk.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemcpqni.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemjmjoy.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemogzwv.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemvbeam.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqempfxze.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemtgmkg.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemdfrbq.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemrtxtw.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemiqbuj.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemmjcmi.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemryole.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqembqcgu.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemthakd.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqembficq.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemchpdy.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemsigqh.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemjqtvo.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemiggep.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemobpra.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemgrued.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemvbxvw.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemysecf.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemzaznx.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqembafsg.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemghwvs.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqembrmue.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemmhyhr.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemdmioa.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemcoonh.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemqcxti.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemqummm.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemwomsn.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemtxdgo.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemkvbyr.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemnxtij.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemotvpl.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqembupem.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemfwire.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemsibcc.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemrvsab.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemmobim.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemgeuyk.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemkhyji.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemkidej.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemucmbd.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemnubhw.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemtybvp.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Sysqemdizjs.exe -
Executes dropped EXE 64 IoCs
pid Process 3724 Sysqemuyfwv.exe 1176 Sysqemundum.exe 1424 Sysqemefszr.exe 1332 Sysqemmjcmi.exe 3184 Sysqempqjpy.exe 2004 Sysqemtucxr.exe 2148 Sysqemzaznx.exe 428 Sysqembhnpm.exe 3560 Sysqemchpdy.exe 3692 Sysqemcwmax.exe 2280 Sysqemhtjqc.exe 4852 Sysqemeffdb.exe 3908 Sysqemeyowv.exe 3288 Sysqemgeuyk.exe 4764 Sysqemgqgrz.exe 2852 Sysqemkhyji.exe 3736 Sysqemoydwe.exe 3820 Sysqemxjnef.exe 5084 Sysqemzquhv.exe 4368 Sysqemblwkq.exe 3496 Sysqemmhyhr.exe 2404 Sysqemredpx.exe 2260 Sysqemwomsn.exe 3908 Sysqembafsg.exe 1404 Sysqemgcnvx.exe 4744 Sysqemjiuym.exe 2308 Sysqemjxplq.exe 3692 Sysqemryole.exe 1664 Sysqembupem.exe 2156 Sysqemjmoeb.exe 5036 Sysqemtxdgo.exe 2092 Sysqembqcgu.exe 3216 Sysqemlxqry.exe 1020 Sysqemumdec.exe 4600 Sysqemzzysh.exe 1328 Sysqemdbpfr.exe 5104 Sysqemghwvs.exe 2160 Sysqemtybvp.exe 1948 Sysqemobpra.exe 4316 Sysqemqotzh.exe 3948 Sysqemrlskk.exe 2060 Sysqemgxrcz.exe 2052 Sysqemrpgim.exe 4852 Sysqemofmat.exe 2328 Sysqemdcvnr.exe 2452 Sysqemqbzvm.exe 2084 Sysqemezvmg.exe 1020 Sysqemgjwhk.exe 3348 Sysqemgrued.exe 4008 Sysqemtsbza.exe 3720 Sysqemthakd.exe 2324 Sysqemnorsr.exe 2464 Sysqemyjtik.exe 4276 Sysqemdizjs.exe 2496 Sysqemdabgf.exe 720 Sysqembficq.exe 4836 Sysqemlmnmu.exe 1612 Sysqemdijpd.exe 3624 Sysqemvbxvw.exe 2416 Sysqemqzpdk.exe 2544 Sysqemqazbq.exe 4712 Sysqemdfrbq.exe 4260 Sysqemljctt.exe 760 Sysqemljdhe.exe -
resource yara_rule behavioral2/memory/1888-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000023382-6.dat upx behavioral2/files/0x0006000000022f40-41.dat upx behavioral2/files/0x0008000000023385-71.dat upx behavioral2/files/0x0008000000023386-106.dat upx behavioral2/memory/1424-112-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000023389-142.dat upx behavioral2/memory/1332-144-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000e00000002337b-178.dat upx behavioral2/files/0x000a00000002338a-213.dat upx behavioral2/files/0x000a00000002338c-248.dat upx behavioral2/memory/1888-252-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3724-279-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000d000000023394-286.dat upx behavioral2/memory/428-287-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1176-316-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000023395-322.dat upx behavioral2/files/0x0010000000009f7c-358.dat upx behavioral2/memory/1332-387-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000022976-394.dat upx behavioral2/memory/2280-395-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3184-400-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2004-425-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000800000002297b-431.dat upx behavioral2/files/0x0008000000023397-466.dat upx behavioral2/memory/2148-472-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000800000002339b-503.dat upx behavioral2/memory/428-509-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3560-538-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000800000002339c-540.dat upx behavioral2/files/0x000800000002339d-575.dat upx behavioral2/memory/3692-577-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000800000002296e-611.dat upx behavioral2/memory/2280-641-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x00080000000233a3-647.dat upx behavioral2/memory/3820-651-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4852-678-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5084-684-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3908-712-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3288-713-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4764-746-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3496-752-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2852-780-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3736-813-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2260-819-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3820-855-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1404-885-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5084-918-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2308-951-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4368-955-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3692-985-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3496-1013-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2404-1046-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2260-1079-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3908-1112-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1404-1117-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4744-1151-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2308-1179-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3692-1180-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1664-1185-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2156-1214-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5036-1238-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2092-1248-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3216-1281-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeffdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjnef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvbxvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyowv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsibcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjkzbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiggep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchpdy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtxdgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkvbyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmrdux.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjmjoy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtgmkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxqry.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnorsr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxgmbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgkdfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemezvmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfxze.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgjpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrqjgy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembupem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbpfr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkidej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemysecf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjmoeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrlskk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqbzvm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiwamx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkyenz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybuzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuyfwv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrpgim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnfgjz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnxtij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemksjnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodgkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefszr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtsbza.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemklsay.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzyupy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmhyhr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembqcgu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotvpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmkfyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmobim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrtxtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwgyza.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqummm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblwkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzysh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiaxic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemplhbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuxknp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzpww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjqtvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjcmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwomsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemryole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjtik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzsqoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdslcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzaznx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqgrz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1888 wrote to memory of 3724 1888 608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d.exe 85 PID 1888 wrote to memory of 3724 1888 608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d.exe 85 PID 1888 wrote to memory of 3724 1888 608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d.exe 85 PID 3724 wrote to memory of 1176 3724 Sysqemuyfwv.exe 87 PID 3724 wrote to memory of 1176 3724 Sysqemuyfwv.exe 87 PID 3724 wrote to memory of 1176 3724 Sysqemuyfwv.exe 87 PID 1176 wrote to memory of 1424 1176 Sysqemundum.exe 88 PID 1176 wrote to memory of 1424 1176 Sysqemundum.exe 88 PID 1176 wrote to memory of 1424 1176 Sysqemundum.exe 88 PID 1424 wrote to memory of 1332 1424 Sysqemefszr.exe 89 PID 1424 wrote to memory of 1332 1424 Sysqemefszr.exe 89 PID 1424 wrote to memory of 1332 1424 Sysqemefszr.exe 89 PID 1332 wrote to memory of 3184 1332 Sysqemmjcmi.exe 90 PID 1332 wrote to memory of 3184 1332 Sysqemmjcmi.exe 90 PID 1332 wrote to memory of 3184 1332 Sysqemmjcmi.exe 90 PID 3184 wrote to memory of 2004 3184 Sysqempqjpy.exe 91 PID 3184 wrote to memory of 2004 3184 Sysqempqjpy.exe 91 PID 3184 wrote to memory of 2004 3184 Sysqempqjpy.exe 91 PID 2004 wrote to memory of 2148 2004 Sysqemtucxr.exe 92 PID 2004 wrote to memory of 2148 2004 Sysqemtucxr.exe 92 PID 2004 wrote to memory of 2148 2004 Sysqemtucxr.exe 92 PID 2148 wrote to memory of 428 2148 Sysqemzaznx.exe 95 PID 2148 wrote to memory of 428 2148 Sysqemzaznx.exe 95 PID 2148 wrote to memory of 428 2148 Sysqemzaznx.exe 95 PID 428 wrote to memory of 3560 428 Sysqembhnpm.exe 96 PID 428 wrote to memory of 3560 428 Sysqembhnpm.exe 96 PID 428 wrote to memory of 3560 428 Sysqembhnpm.exe 96 PID 3560 wrote to memory of 3692 3560 Sysqemchpdy.exe 122 PID 3560 wrote to memory of 3692 3560 Sysqemchpdy.exe 122 PID 3560 wrote to memory of 3692 3560 Sysqemchpdy.exe 122 PID 3692 wrote to memory of 2280 3692 Sysqemcwmax.exe 99 PID 3692 wrote to memory of 2280 3692 Sysqemcwmax.exe 99 PID 3692 wrote to memory of 2280 3692 Sysqemcwmax.exe 99 PID 2280 wrote to memory of 4852 2280 Sysqemhtjqc.exe 101 PID 2280 wrote to memory of 4852 2280 Sysqemhtjqc.exe 101 PID 2280 wrote to memory of 4852 2280 Sysqemhtjqc.exe 101 PID 4852 wrote to memory of 3908 4852 Sysqemeffdb.exe 115 PID 4852 wrote to memory of 3908 4852 Sysqemeffdb.exe 115 PID 4852 wrote to memory of 3908 4852 Sysqemeffdb.exe 115 PID 3908 wrote to memory of 3288 3908 Sysqemeyowv.exe 103 PID 3908 wrote to memory of 3288 3908 Sysqemeyowv.exe 103 PID 3908 wrote to memory of 3288 3908 Sysqemeyowv.exe 103 PID 3288 wrote to memory of 4764 3288 Sysqemgeuyk.exe 104 PID 3288 wrote to memory of 4764 3288 Sysqemgeuyk.exe 104 PID 3288 wrote to memory of 4764 3288 Sysqemgeuyk.exe 104 PID 4764 wrote to memory of 2852 4764 Sysqemgqgrz.exe 105 PID 4764 wrote to memory of 2852 4764 Sysqemgqgrz.exe 105 PID 4764 wrote to memory of 2852 4764 Sysqemgqgrz.exe 105 PID 2852 wrote to memory of 3736 2852 Sysqemkhyji.exe 120 PID 2852 wrote to memory of 3736 2852 Sysqemkhyji.exe 120 PID 2852 wrote to memory of 3736 2852 Sysqemkhyji.exe 120 PID 3736 wrote to memory of 3820 3736 Sysqemoydwe.exe 107 PID 3736 wrote to memory of 3820 3736 Sysqemoydwe.exe 107 PID 3736 wrote to memory of 3820 3736 Sysqemoydwe.exe 107 PID 3820 wrote to memory of 5084 3820 Sysqemxjnef.exe 109 PID 3820 wrote to memory of 5084 3820 Sysqemxjnef.exe 109 PID 3820 wrote to memory of 5084 3820 Sysqemxjnef.exe 109 PID 5084 wrote to memory of 4368 5084 Sysqemzquhv.exe 110 PID 5084 wrote to memory of 4368 5084 Sysqemzquhv.exe 110 PID 5084 wrote to memory of 4368 5084 Sysqemzquhv.exe 110 PID 4368 wrote to memory of 3496 4368 Sysqemblwkq.exe 112 PID 4368 wrote to memory of 3496 4368 Sysqemblwkq.exe 112 PID 4368 wrote to memory of 3496 4368 Sysqemblwkq.exe 112 PID 3496 wrote to memory of 2404 3496 Sysqemmhyhr.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d.exe"C:\Users\Admin\AppData\Local\Temp\608f2f5e74ee683493718056256cf464f3efd4479274e21bda3c2bdb61e98b7d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemundum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemundum.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefszr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefszr.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjcmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjcmi.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\Sysqempqjpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqjpy.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtucxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtucxr.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzaznx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzaznx.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhnpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhnpm.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchpdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchpdy.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcwmax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwmax.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtjqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtjqc.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeffdb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeffdb.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyowv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyowv.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgeuyk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgeuyk.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqgrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqgrz.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhyji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhyji.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoydwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoydwe.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjnef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjnef.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzquhv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzquhv.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblwkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblwkq.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmhyhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhyhr.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemredpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemredpx.exe"23⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwomsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwomsn.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Sysqembafsg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembafsg.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgcnvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcnvx.exe"26⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjiuym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjiuym.exe"27⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxplq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxplq.exe"28⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemryole.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryole.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\Sysqembupem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembupem.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmoeb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmoeb.exe"31⤵
- Executes dropped EXE
- Modifies registry class
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxdgo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxdgo.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqcgu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqcgu.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxqry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxqry.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemumdec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumdec.exe"35⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzysh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzysh.exe"36⤵
- Executes dropped EXE
- Modifies registry class
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbpfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbpfr.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghwvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghwvs.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtybvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtybvp.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobpra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobpra.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqotzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqotzh.exe"41⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlskk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlskk.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxrcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxrcz.exe"43⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrpgim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrpgim.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofmat.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofmat.exe"45⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcvnr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcvnr.exe"46⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbzvm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbzvm.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemezvmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemezvmg.exe"48⤵
- Executes dropped EXE
- Modifies registry class
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjwhk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjwhk.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrued.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrued.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsbza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsbza.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthakd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthakd.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnorsr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnorsr.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjtik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjtik.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdizjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdizjs.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdabgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdabgf.exe"56⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Sysqembficq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembficq.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmnmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmnmu.exe"58⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdijpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdijpd.exe"59⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbxvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbxvw.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzpdk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzpdk.exe"61⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqazbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqazbq.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfrbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfrbq.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljctt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljctt.exe"64⤵
- Executes dropped EXE
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljdhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljdhe.exe"65⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfgjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfgjz.exe"66⤵
- Modifies registry class
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwamx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwamx.exe"67⤵
- Modifies registry class
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfrnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfrnz.exe"68⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiaxic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiaxic.exe"69⤵
- Modifies registry class
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkvbyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvbyr.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhpwr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhpwr.exe"71⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfrrji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrrji.exe"72⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemamvzp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamvzp.exe"73⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyupno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyupno.exe"74⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Sysqemklsay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklsay.exe"75⤵
- Modifies registry class
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzbpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzbpl.exe"76⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsigqh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsigqh.exe"77⤵
- Checks computer location settings
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"78⤵
- Checks computer location settings
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfwire.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfwire.exe"79⤵
- Checks computer location settings
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkidej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkidej.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemisoxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemisoxy.exe"81⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkyenz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkyenz.exe"82⤵
- Modifies registry class
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxtij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxtij.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbeam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbeam.exe"84⤵
- Checks computer location settings
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxwiqs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwiqs.exe"85⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Sysqemplhbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplhbv.exe"86⤵
- Modifies registry class
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucmbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucmbd.exe"87⤵
- Checks computer location settings
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnubhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnubhw.exe"88⤵
- Checks computer location settings
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"89⤵
- Modifies registry class
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnckqn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnckqn.exe"90⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxqlso.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqlso.exe"91⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuotyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuotyb.exe"92⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxgmbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgmbf.exe"93⤵
- Modifies registry class
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfxze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfxze.exe"94⤵
- Checks computer location settings
- Modifies registry class
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsibcc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsibcc.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevtng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevtng.exe"97⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcpqni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpqni.exe"98⤵
- Checks computer location settings
PID:812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrqjgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqjgy.exe"99⤵
- Modifies registry class
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuicbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuicbb.exe"100⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmxcuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxcuy.exe"101⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrviuf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrviuf.exe"102⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcqksy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqksy.exe"103⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxknp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxknp.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvsab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvsab.exe"105⤵
- Checks computer location settings
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmqkvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqkvz.exe"106⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtfvbl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfvbl.exe"107⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzzpww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzpww.exe"108⤵
- Modifies registry class
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzsqoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzsqoq.exe"109⤵
- Modifies registry class
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhplbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhplbb.exe"110⤵
- Checks computer location settings
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotvpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotvpl.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwqyuc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqyuc.exe"112⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Sysqembvdki.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvdki.exe"113⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmrdux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrdux.exe"114⤵
- Modifies registry class
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrfaj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrfaj.exe"115⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemukdaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukdaq.exe"116⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcoonh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcoonh.exe"117⤵
- Checks computer location settings
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmkfyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkfyd.exe"118⤵
- Modifies registry class
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmobim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmobim.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmjoy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmjoy.exe"120⤵
- Checks computer location settings
- Modifies registry class
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtxtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtxtw.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybuzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybuzc.exe"122⤵
- Modifies registry class
PID:3240
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-