Analysis
-
max time kernel
112s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 18:25
Behavioral task
behavioral1
Sample
078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe
Resource
win10v2004-20240508-en
General
-
Target
078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe
-
Size
334KB
-
MD5
6711c785b54e24a59d8ccbf25869da2d
-
SHA1
ac0bfc5ca6bf4686d2c2ea080b87c5ad7ae3cf46
-
SHA256
078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0
-
SHA512
3eeb8cda8c27219ca9b9501e71224097f6c759f7694a48805c2db2eaaca8ceb1f97e02b7e0dee14cd7965203c2b8b27dc4ec5c5160c9112ee4af9932e9a4d740
-
SSDEEP
3072:1dEUfKj8BYbDiC1ZTK7sxtLUIGcJLUIWdEUfKj8BYbDiC1ZJtA9V3E/GbT6hnyOH:1USiZTK40p7USiZI9xEFh9qi
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/files/0x00070000000233da-6.dat UPX behavioral2/files/0x00070000000233d9-42.dat UPX behavioral2/files/0x00070000000233db-72.dat UPX behavioral2/files/0x00080000000233d6-108.dat UPX behavioral2/files/0x00070000000233dd-144.dat UPX behavioral2/memory/1388-176-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233de-182.dat UPX behavioral2/memory/4160-214-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233df-220.dat UPX behavioral2/memory/3768-252-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233e1-258.dat UPX behavioral2/memory/1948-260-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3928-291-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233e2-297.dat UPX behavioral2/memory/4064-299-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4108-329-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233e3-335.dat UPX behavioral2/memory/4812-367-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233e4-373.dat UPX behavioral2/memory/3268-381-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233e5-411.dat UPX behavioral2/memory/5096-412-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1948-419-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233e7-449.dat UPX behavioral2/memory/1108-451-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4064-457-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233e8-488.dat UPX behavioral2/memory/4456-492-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1884-522-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233e9-528.dat UPX behavioral2/memory/4320-530-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/5096-560-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233ea-566.dat UPX behavioral2/memory/3600-568-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233eb-603.dat UPX behavioral2/memory/1108-610-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233ef-640.dat UPX behavioral2/memory/3888-672-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/files/0x00070000000233f0-678.dat UPX behavioral2/memory/4320-708-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3600-710-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2152-716-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/5104-745-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4376-780-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1020-786-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2488-847-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4532-853-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2152-882-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4432-917-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1020-923-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3488-925-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3924-954-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4460-960-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4532-965-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1884-995-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2324-1024-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/3488-1063-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/5004-1065-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4460-1094-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/4904-1100-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/1884-1129-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2584-1140-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/2740-1170-0x0000000000400000-0x00000000004C9000-memory.dmp UPX behavioral2/memory/5004-1178-0x0000000000400000-0x00000000004C9000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfkrlj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdigaf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlsueu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyknnb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemahzvh.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmqzsi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxuvul.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdpwrn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemobewx.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemoqodu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhcnbq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjgxbb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgofth.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempnjsl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdizzv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdeowj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemcamxf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlubgl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqememoaf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrqehe.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtmtak.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhzntp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvsprz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemliolb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnqtco.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemivbpn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemkwvfx.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembuhmt.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembdlrc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemosqzk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembiusc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhttpj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemziafn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfrlyo.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmeawk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqwthc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqaaox.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemzolmz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembdwmx.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemivdkh.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgjhex.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnzdqn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdpkih.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemscrgx.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyerky.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgtdam.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmucpl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemctbgl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemalptk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlzepv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemsxuuo.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemuilon.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlqine.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvdoji.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrdhdo.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemzoyif.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempfxze.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemeklze.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemiygwt.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemkjfcw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempdhsy.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemffdwf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmmudr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemofrlo.exe -
Executes dropped EXE 64 IoCs
pid Process 4160 Sysqemopiuc.exe 3768 Sysqemeignx.exe 3928 Sysqemzzipv.exe 4108 Sysqemmbpls.exe 4812 Sysqemjnlgi.exe 3268 Sysqemrdhdo.exe 1948 Sysqemlubgl.exe 4064 Sysqemjgxbb.exe 4456 Sysqembdwmx.exe 1884 Sysqemoipux.exe 5096 Sysqemyerky.exe 1108 Sysqemgxrcz.exe 3888 Sysqemoqodu.exe 4320 Sysqemybnsb.exe 3600 Sysqemyqmde.exe 5104 Sysqemalptk.exe 4376 Sysqemlsueu.exe 2488 Sysqemorjhe.exe 2152 Sysqemwvuzz.exe 4432 Sysqemogspm.exe 1020 Sysqemgrgng.exe 3924 Sysqemdedsy.exe 4532 Sysqemiflvo.exe 2324 Sysqemliolb.exe 3488 Sysqemgofth.exe 4460 Sysqemiygwt.exe 1884 Sysqembuhmt.exe 2584 Sysqemyknnb.exe 5004 Sysqemivdkh.exe 4904 Sysqemtrfab.exe 3060 Sysqemxsonl.exe 2740 Sysqemlufwc.exe 2676 Sysqemljdhe.exe 944 Sysqemnqtco.exe 4428 Sysqemlzepv.exe 4752 Sysqemahzvh.exe 372 Sysqemddddo.exe 560 Sysqemipyqt.exe 4108 Sysqemqujjw.exe 5084 Sysqemimthb.exe 4524 Sysqemiqgss.exe 5096 Sysqemsxuuo.exe 468 Sysqemxnavv.exe 1584 Sysqemsbqtq.exe 4828 Sysqemuliii.exe 1528 Sysqemfknle.exe 2660 Sysqemlqtgd.exe 2080 Sysqemhvxmn.exe 2740 Sysqemkjfcw.exe 1868 Sysqemivbpn.exe 3352 Sysqemknbsq.exe 1956 Sysqempdhsy.exe 4520 Sysqemzoyif.exe 752 Sysqemfmedw.exe 4708 Sysqemffdwf.exe 4448 Sysqemshlrc.exe 4360 Sysqemkvkcy.exe 3360 Sysqemxxaxv.exe 3252 Sysqemkwvfx.exe 4364 Sysqemxnzaa.exe 3968 Sysqemusyvk.exe 3660 Sysqemfrlyo.exe 1480 Sysqempyzjk.exe 1572 Sysqempfxze.exe -
resource yara_rule behavioral2/memory/1388-0-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233da-6.dat upx behavioral2/memory/4160-37-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233d9-42.dat upx behavioral2/files/0x00070000000233db-72.dat upx behavioral2/memory/3768-74-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00080000000233d6-108.dat upx behavioral2/memory/3928-110-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233dd-144.dat upx behavioral2/memory/4108-146-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1388-176-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233de-182.dat upx behavioral2/memory/4812-183-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4160-214-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233df-220.dat upx behavioral2/memory/3268-222-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3768-252-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233e1-258.dat upx behavioral2/memory/1948-260-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3928-291-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233e2-297.dat upx behavioral2/memory/4064-299-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4108-329-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233e3-335.dat upx behavioral2/memory/4456-337-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4812-367-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233e4-373.dat upx behavioral2/memory/1884-374-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3268-381-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233e5-411.dat upx behavioral2/memory/5096-412-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1948-419-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233e7-449.dat upx behavioral2/memory/1108-451-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4064-457-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233e8-488.dat upx behavioral2/memory/4456-492-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3888-489-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1884-522-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233e9-528.dat upx behavioral2/memory/4320-530-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/5096-560-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233ea-566.dat upx behavioral2/memory/3600-568-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233eb-603.dat upx behavioral2/memory/5104-604-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1108-610-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233ef-640.dat upx behavioral2/memory/4376-642-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3888-672-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/files/0x00070000000233f0-678.dat upx behavioral2/memory/2488-680-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4320-708-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/3600-710-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2152-716-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/5104-745-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4432-751-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4376-780-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/1020-786-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2488-847-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4532-853-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2152-882-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/2324-888-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral2/memory/4432-917-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrviuf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuydbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemegjlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemalptk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwvuzz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemipyqt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiflvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdizzv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqdsun.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcamxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmedw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdkhgy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvdoji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwvfx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzmwvh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembtaye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeklze.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembiusc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyerky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhvxmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxxaxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdpwrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgpgeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkvkcy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvigpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlckfx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsarhu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdlbne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzipv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiqgss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivbpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhttpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqwthc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzolmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzepv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemozynf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzntp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqdhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnqtco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnzdqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvsprz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfeybu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxsonl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqememoaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemioqar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdhvxg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvcvss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsnsvu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdeowj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembuhmt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzoyif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjhex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjelme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrqehe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyqmde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemclrmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgbnax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdigaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyzhdv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtrfab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembgutz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobewx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfmnt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 4160 1388 078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe 82 PID 1388 wrote to memory of 4160 1388 078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe 82 PID 1388 wrote to memory of 4160 1388 078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe 82 PID 4160 wrote to memory of 3768 4160 Sysqemopiuc.exe 83 PID 4160 wrote to memory of 3768 4160 Sysqemopiuc.exe 83 PID 4160 wrote to memory of 3768 4160 Sysqemopiuc.exe 83 PID 3768 wrote to memory of 3928 3768 Sysqemeignx.exe 84 PID 3768 wrote to memory of 3928 3768 Sysqemeignx.exe 84 PID 3768 wrote to memory of 3928 3768 Sysqemeignx.exe 84 PID 3928 wrote to memory of 4108 3928 Sysqemzzipv.exe 85 PID 3928 wrote to memory of 4108 3928 Sysqemzzipv.exe 85 PID 3928 wrote to memory of 4108 3928 Sysqemzzipv.exe 85 PID 4108 wrote to memory of 4812 4108 Sysqemmbpls.exe 88 PID 4108 wrote to memory of 4812 4108 Sysqemmbpls.exe 88 PID 4108 wrote to memory of 4812 4108 Sysqemmbpls.exe 88 PID 4812 wrote to memory of 3268 4812 Sysqemjnlgi.exe 90 PID 4812 wrote to memory of 3268 4812 Sysqemjnlgi.exe 90 PID 4812 wrote to memory of 3268 4812 Sysqemjnlgi.exe 90 PID 3268 wrote to memory of 1948 3268 Sysqemrdhdo.exe 92 PID 3268 wrote to memory of 1948 3268 Sysqemrdhdo.exe 92 PID 3268 wrote to memory of 1948 3268 Sysqemrdhdo.exe 92 PID 1948 wrote to memory of 4064 1948 Sysqemlubgl.exe 93 PID 1948 wrote to memory of 4064 1948 Sysqemlubgl.exe 93 PID 1948 wrote to memory of 4064 1948 Sysqemlubgl.exe 93 PID 4064 wrote to memory of 4456 4064 Sysqemjgxbb.exe 94 PID 4064 wrote to memory of 4456 4064 Sysqemjgxbb.exe 94 PID 4064 wrote to memory of 4456 4064 Sysqemjgxbb.exe 94 PID 4456 wrote to memory of 1884 4456 Sysqembdwmx.exe 95 PID 4456 wrote to memory of 1884 4456 Sysqembdwmx.exe 95 PID 4456 wrote to memory of 1884 4456 Sysqembdwmx.exe 95 PID 1884 wrote to memory of 5096 1884 Sysqemoipux.exe 97 PID 1884 wrote to memory of 5096 1884 Sysqemoipux.exe 97 PID 1884 wrote to memory of 5096 1884 Sysqemoipux.exe 97 PID 5096 wrote to memory of 1108 5096 Sysqemyerky.exe 98 PID 5096 wrote to memory of 1108 5096 Sysqemyerky.exe 98 PID 5096 wrote to memory of 1108 5096 Sysqemyerky.exe 98 PID 1108 wrote to memory of 3888 1108 Sysqemgxrcz.exe 99 PID 1108 wrote to memory of 3888 1108 Sysqemgxrcz.exe 99 PID 1108 wrote to memory of 3888 1108 Sysqemgxrcz.exe 99 PID 3888 wrote to memory of 4320 3888 Sysqemoqodu.exe 100 PID 3888 wrote to memory of 4320 3888 Sysqemoqodu.exe 100 PID 3888 wrote to memory of 4320 3888 Sysqemoqodu.exe 100 PID 4320 wrote to memory of 3600 4320 Sysqemybnsb.exe 101 PID 4320 wrote to memory of 3600 4320 Sysqemybnsb.exe 101 PID 4320 wrote to memory of 3600 4320 Sysqemybnsb.exe 101 PID 3600 wrote to memory of 5104 3600 Sysqemyqmde.exe 104 PID 3600 wrote to memory of 5104 3600 Sysqemyqmde.exe 104 PID 3600 wrote to memory of 5104 3600 Sysqemyqmde.exe 104 PID 5104 wrote to memory of 4376 5104 Sysqemalptk.exe 105 PID 5104 wrote to memory of 4376 5104 Sysqemalptk.exe 105 PID 5104 wrote to memory of 4376 5104 Sysqemalptk.exe 105 PID 4376 wrote to memory of 2488 4376 Sysqemlsueu.exe 106 PID 4376 wrote to memory of 2488 4376 Sysqemlsueu.exe 106 PID 4376 wrote to memory of 2488 4376 Sysqemlsueu.exe 106 PID 2488 wrote to memory of 2152 2488 Sysqemorjhe.exe 107 PID 2488 wrote to memory of 2152 2488 Sysqemorjhe.exe 107 PID 2488 wrote to memory of 2152 2488 Sysqemorjhe.exe 107 PID 2152 wrote to memory of 4432 2152 Sysqemwvuzz.exe 108 PID 2152 wrote to memory of 4432 2152 Sysqemwvuzz.exe 108 PID 2152 wrote to memory of 4432 2152 Sysqemwvuzz.exe 108 PID 4432 wrote to memory of 1020 4432 Sysqemogspm.exe 109 PID 4432 wrote to memory of 1020 4432 Sysqemogspm.exe 109 PID 4432 wrote to memory of 1020 4432 Sysqemogspm.exe 109 PID 1020 wrote to memory of 3924 1020 Sysqemgrgng.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe"C:\Users\Admin\AppData\Local\Temp\078931f845fde3a23dc4154cd595ebac686345c00b318d11de53933a31975ff0.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopiuc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopiuc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeignx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeignx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzipv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzipv.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbpls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbpls.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjnlgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnlgi.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrdhdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdhdo.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlubgl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlubgl.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgxbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgxbb.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdwmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdwmx.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoipux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoipux.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyerky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyerky.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxrcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxrcz.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqodu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqodu.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyqmde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyqmde.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalptk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalptk.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsueu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsueu.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorjhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorjhe.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwvuzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvuzz.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemogspm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogspm.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrgng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrgng.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdedsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdedsy.exe"23⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiflvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiflvo.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemliolb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemliolb.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgofth.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgofth.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiygwt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiygwt.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\Sysqembuhmt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembuhmt.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyknnb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyknnb.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemivdkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivdkh.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrfab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrfab.exe"31⤵
- Executes dropped EXE
- Modifies registry class
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxsonl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxsonl.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlufwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlufwc.exe"33⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljdhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljdhe.exe"34⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnqtco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnqtco.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzepv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzepv.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemahzvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemahzvh.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddddo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddddo.exe"38⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemipyqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemipyqt.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqujjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqujjw.exe"40⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemimthb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemimthb.exe"41⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiqgss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqgss.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsxuuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsxuuo.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnavv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnavv.exe"44⤵
- Executes dropped EXE
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsbqtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbqtq.exe"45⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuliii.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuliii.exe"46⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfknle.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfknle.exe"47⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqtgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqtgd.exe"48⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhvxmn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvxmn.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkjfcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjfcw.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemivbpn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivbpn.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemknbsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemknbsq.exe"52⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdhsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdhsy.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzoyif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzoyif.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmedw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmedw.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffdwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffdwf.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemshlrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshlrc.exe"57⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkvkcy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvkcy.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxxaxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxxaxv.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwvfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwvfx.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnzaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnzaa.exe"61⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemusyvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemusyvk.exe"62⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfrlyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrlyo.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\Sysqempyzjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempyzjk.exe"64⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfxze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfxze.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemclrmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemclrmp.exe"66⤵
- Modifies registry class
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmotkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmotkq.exe"67⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Sysqemziafn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemziafn.exe"68⤵
- Checks computer location settings
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnjsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnjsl.exe"69⤵
- Checks computer location settings
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmwvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmwvh.exe"70⤵
- Modifies registry class
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemctbgl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctbgl.exe"71⤵
- Checks computer location settings
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmeawk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmeawk.exe"72⤵
- Checks computer location settings
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuilon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuilon.exe"73⤵
- Checks computer location settings
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrviuf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrviuf.exe"74⤵
- Modifies registry class
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosqzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosqzk.exe"75⤵
- Checks computer location settings
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Sysqememoaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqememoaf.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmqzsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqzsi.exe"77⤵
- Checks computer location settings
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmudr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmudr.exe"78⤵
- Checks computer location settings
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwu.exe"79⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Sysqembgutz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgutz.exe"80⤵
- Modifies registry class
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnhev.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnhev.exe"81⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeywkp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeywkp.exe"82⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxuvul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuvul.exe"83⤵
- Checks computer location settings
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"84⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwgfdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgfdz.exe"85⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Sysqembtaye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtaye.exe"86⤵
- Modifies registry class
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemraulw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemraulw.exe"87⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgjhex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjhex.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjelme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjelme.exe"89⤵
- Modifies registry class
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrdpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrdpv.exe"90⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeklze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeklze.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrqehe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqehe.exe"92⤵
- Checks computer location settings
- Modifies registry class
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Sysqembiusc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembiusc.exe"93⤵
- Checks computer location settings
- Modifies registry class
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemozynf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozynf.exe"94⤵
- Modifies registry class
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmtak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmtak.exe"95⤵
- Checks computer location settings
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmtgk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmtgk.exe"96⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhzntp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzntp.exe"97⤵
- Checks computer location settings
- Modifies registry class
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwaiup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaiup.exe"98⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdpwrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpwrn.exe"99⤵
- Checks computer location settings
- Modifies registry class
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvigpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvigpb.exe"100⤵
- Modifies registry class
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\Sysqembvbkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvbkg.exe"101⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemofrlo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofrlo.exe"102⤵
- Checks computer location settings
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobewx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobewx.exe"103⤵
- Checks computer location settings
- Modifies registry class
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdlrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdlrc.exe"104⤵
- Checks computer location settings
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgpgeg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpgeg.exe"105⤵
- Modifies registry class
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwthc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwthc.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlckfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlckfx.exe"107⤵
- Modifies registry class
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtdam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtdam.exe"108⤵
- Checks computer location settings
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojafs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojafs.exe"109⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtwusx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwusx.exe"110⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgbnax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbnax.exe"111⤵
- Modifies registry class
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwgeo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwgeo.exe"112⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdkhgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkhgy.exe"113⤵
- Modifies registry class
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaxcuc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaxcuc.exe"114⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdhvxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhvxg.exe"115⤵
- Modifies registry class
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtaapb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtaapb.exe"116⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdigaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdigaf.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyzhdv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyzhdv.exe"118⤵
- Modifies registry class
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaullb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaullb.exe"119⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfkrlj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkrlj.exe"120⤵
- Checks computer location settings
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdizzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdizzv.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdsun.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdsun.exe"122⤵
- Modifies registry class
PID:5012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-