Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 03:20
Behavioral task
behavioral1
Sample
cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe
Resource
win10v2004-20240508-en
General
-
Target
cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe
-
Size
91KB
-
MD5
ae262d6bcdb455332db7604212b33bbb
-
SHA1
5d94dcd3178e71274ba3f914d354e8f3dfcec683
-
SHA256
cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e
-
SHA512
88504d38052907281a227adf38b1b68f2cf6e6344f56be7a03e0e4a9b635f3c57565f93faa5b13473c28f42b418139d944a2867d742f42dca7d6fa354f628840
-
SSDEEP
1536:IYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nW:xdEUfKj8BYbDiC1ZTK7sxtLUIGB
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/1836-0-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233f1-6.dat UPX behavioral2/memory/3800-37-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00090000000233ed-42.dat UPX behavioral2/files/0x00070000000233f3-72.dat UPX behavioral2/files/0x00070000000233f4-108.dat UPX behavioral2/files/0x00070000000233f5-142.dat UPX behavioral2/memory/4264-144-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233f6-178.dat UPX behavioral2/files/0x00070000000233f7-213.dat UPX behavioral2/memory/1836-244-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233f8-250.dat UPX behavioral2/memory/3800-281-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233f9-287.dat UPX behavioral2/memory/4788-322-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233fa-324.dat UPX behavioral2/memory/5096-355-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233fb-362.dat UPX behavioral2/files/0x00070000000233fc-396.dat UPX behavioral2/memory/4264-398-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2888-400-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2004-430-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233fd-436.dat UPX behavioral2/memory/3348-467-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000400000002296c-473.dat UPX behavioral2/memory/400-504-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000a00000002334e-510.dat UPX behavioral2/memory/4828-540-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x0011000000016964-546.dat UPX behavioral2/memory/1044-577-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x000d000000023355-583.dat UPX behavioral2/memory/1232-613-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233fe-620.dat UPX behavioral2/memory/2888-650-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/files/0x00070000000233ff-656.dat UPX behavioral2/memory/4920-691-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3852-728-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4896-758-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4176-791-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1640-793-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2692-822-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1652-850-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3912-862-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4788-867-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1512-897-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4312-898-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4356-927-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/64-961-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1640-1003-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3216-1029-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3912-1035-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3756-1037-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4312-1071-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2628-1072-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3392-1101-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1948-1111-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4136-1173-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3756-1211-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2628-1269-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/4864-1302-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/1516-1336-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/2924-1346-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3180-1403-0x0000000000400000-0x0000000000491000-memory.dmp UPX behavioral2/memory/3496-1413-0x0000000000400000-0x0000000000491000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnenlj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzoyif.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgzfnu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdmobq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemcypky.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemcsmbq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgouxn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempxtrn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdtdrm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwkzjw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqkryl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdgump.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvagtl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkxsja.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjhmtx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwupmc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemsrgtd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvxuds.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemirmzl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxxaxv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgudhb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzvbbn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqxjtz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempsxyp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemeavgb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdhgsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjqtnk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdqeec.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdcbfi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempmldk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhkyhl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjadgw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvjdfu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemcskke.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxibms.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfoukc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemoeqgp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjzjpu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemygclr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemiygwt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdlljo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemiuuex.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemcjqzn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxqrom.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdjged.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlsqlg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlwcte.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemopeex.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemybhxd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemseatc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjproi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembbzhm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfmcyk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxuneg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwncvh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhjedd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemmcpnn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjkyft.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqapyy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemguwqv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnonxl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempxnsi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemeivjg.exe -
Executes dropped EXE 64 IoCs
pid Process 3800 Sysqemmcpnn.exe 4788 Sysqemhtjqc.exe 5096 Sysqemjhmtx.exe 4264 Sysqemeyowv.exe 2004 Sysqemmznwj.exe 3348 Sysqempqegl.exe 400 Sysqemwupmc.exe 4828 Sysqemcsmbq.exe 1044 Sysqemeklri.exe 1232 Sysqemgudhb.exe 2888 Sysqemmsaxg.exe 4920 Sysqemoczmy.exe 3852 Sysqemwncvh.exe 4896 Sysqemzjexc.exe 4176 Sysqemwrpxq.exe 2692 Sysqemhjedd.exe 1652 Sysqemjqtnk.exe 4788 Sysqemorbia.exe 1512 Sysqemlevqu.exe 4356 Sysqemwkzjw.exe 64 Sysqemygclr.exe 1640 Sysqemeavgb.exe 3216 Sysqemeeizq.exe 3912 Sysqemzvbbn.exe 4312 Sysqemeivjg.exe 3392 Sysqemhkyhl.exe 1948 Sysqembjoco.exe 4136 Sysqemwaqfl.exe 3756 Sysqemgouxn.exe 2628 Sysqemjkyft.exe 4864 Sysqemgzfnu.exe 1516 Sysqemoeqgp.exe 2924 Sysqemmjqti.exe 3180 Sysqemopeex.exe 3496 Sysqemrhvtq.exe 2044 Sysqemdmobq.exe 332 Sysqemjktrd.exe 2336 Sysqemjzjpu.exe 4704 Sysqemeboae.exe 1196 Sysqembzvaf.exe 1728 Sysqemlvukb.exe 5048 Sysqemrtrah.exe 4184 Sysqemqapyy.exe 1648 Sysqemnywyz.exe 1832 Sysqemguwqv.exe 2628 Sysqemjproi.exe 4948 Sysqemjadgw.exe 3912 Sysqemdvioo.exe 4752 Sysqemddrci.exe 1584 Sysqemybhxd.exe 4376 Sysqembbzhm.exe 4480 Sysqemdhgsc.exe 2424 Sysqemdaocw.exe 3704 Sysqemycunn.exe 4544 Sysqemtwzvn.exe 4192 Sysqemlwcte.exe 1320 Sysqemledgy.exe 732 Sysqemdtdrm.exe 4020 Sysqemdlljo.exe 3480 Sysqemiuuex.exe 4076 Sysqemiygwt.exe 5036 Sysqemlemzb.exe 1108 Sysqemjjuut.exe 2336 Sysqemvqkxo.exe -
resource yara_rule behavioral2/memory/1836-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233f1-6.dat upx behavioral2/memory/3800-37-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00090000000233ed-42.dat upx behavioral2/files/0x00070000000233f3-72.dat upx behavioral2/files/0x00070000000233f4-108.dat upx behavioral2/files/0x00070000000233f5-142.dat upx behavioral2/memory/4264-144-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233f6-178.dat upx behavioral2/files/0x00070000000233f7-213.dat upx behavioral2/memory/1836-244-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233f8-250.dat upx behavioral2/memory/3800-281-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233f9-287.dat upx behavioral2/memory/4788-322-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233fa-324.dat upx behavioral2/memory/5096-355-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233fb-362.dat upx behavioral2/files/0x00070000000233fc-396.dat upx behavioral2/memory/4264-398-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2888-400-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2004-430-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233fd-436.dat upx behavioral2/memory/3348-467-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000400000002296c-473.dat upx behavioral2/memory/400-504-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000a00000002334e-510.dat upx behavioral2/memory/4828-540-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0011000000016964-546.dat upx behavioral2/memory/1044-577-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000d000000023355-583.dat upx behavioral2/memory/1232-613-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233fe-620.dat upx behavioral2/memory/2888-650-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00070000000233ff-656.dat upx behavioral2/memory/4920-691-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3852-728-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4896-758-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4176-791-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1640-793-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2692-822-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1652-850-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3912-862-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4788-867-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1512-897-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4312-898-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4356-927-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/64-961-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1640-1003-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3216-1029-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3912-1035-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3756-1037-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4312-1071-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2628-1072-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3392-1101-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1948-1111-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4136-1173-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3756-1211-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2628-1269-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4864-1302-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1516-1336-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2924-1346-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3180-1403-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3496-1413-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjktrd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwzvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmxlf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobwci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdqeec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfsfra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzvbbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjjuut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytbew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsejho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempcblx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeklri.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnonxl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhsjba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempqegl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqxasp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbgzd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsyblz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxxaxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeavgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgouxn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqapyy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiygwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnenlj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempxnsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwupmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemledgy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjdfu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnvldc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemirmzl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxibms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfoukc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzjexc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqenrk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsoqkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxxqws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemorbia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhkyhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqkryl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqpjkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcypky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygclr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempnmgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrhvtq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnywyz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyowv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembjoco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemopeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdhgsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcmcsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeivjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjkyft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembzvaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzoyif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcsmbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemddrci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembbzhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoczmy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjadgw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdtdrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjedd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcjqzn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdvioo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1836 wrote to memory of 3800 1836 cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe 82 PID 1836 wrote to memory of 3800 1836 cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe 82 PID 1836 wrote to memory of 3800 1836 cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe 82 PID 3800 wrote to memory of 4788 3800 Sysqemmcpnn.exe 83 PID 3800 wrote to memory of 4788 3800 Sysqemmcpnn.exe 83 PID 3800 wrote to memory of 4788 3800 Sysqemmcpnn.exe 83 PID 4788 wrote to memory of 5096 4788 Sysqemhtjqc.exe 84 PID 4788 wrote to memory of 5096 4788 Sysqemhtjqc.exe 84 PID 4788 wrote to memory of 5096 4788 Sysqemhtjqc.exe 84 PID 5096 wrote to memory of 4264 5096 Sysqemjhmtx.exe 86 PID 5096 wrote to memory of 4264 5096 Sysqemjhmtx.exe 86 PID 5096 wrote to memory of 4264 5096 Sysqemjhmtx.exe 86 PID 4264 wrote to memory of 2004 4264 Sysqemeyowv.exe 89 PID 4264 wrote to memory of 2004 4264 Sysqemeyowv.exe 89 PID 4264 wrote to memory of 2004 4264 Sysqemeyowv.exe 89 PID 2004 wrote to memory of 3348 2004 Sysqemmznwj.exe 90 PID 2004 wrote to memory of 3348 2004 Sysqemmznwj.exe 90 PID 2004 wrote to memory of 3348 2004 Sysqemmznwj.exe 90 PID 3348 wrote to memory of 400 3348 Sysqempqegl.exe 91 PID 3348 wrote to memory of 400 3348 Sysqempqegl.exe 91 PID 3348 wrote to memory of 400 3348 Sysqempqegl.exe 91 PID 400 wrote to memory of 4828 400 Sysqemwupmc.exe 94 PID 400 wrote to memory of 4828 400 Sysqemwupmc.exe 94 PID 400 wrote to memory of 4828 400 Sysqemwupmc.exe 94 PID 4828 wrote to memory of 1044 4828 Sysqemcsmbq.exe 95 PID 4828 wrote to memory of 1044 4828 Sysqemcsmbq.exe 95 PID 4828 wrote to memory of 1044 4828 Sysqemcsmbq.exe 95 PID 1044 wrote to memory of 1232 1044 Sysqemeklri.exe 96 PID 1044 wrote to memory of 1232 1044 Sysqemeklri.exe 96 PID 1044 wrote to memory of 1232 1044 Sysqemeklri.exe 96 PID 1232 wrote to memory of 2888 1232 Sysqemgudhb.exe 98 PID 1232 wrote to memory of 2888 1232 Sysqemgudhb.exe 98 PID 1232 wrote to memory of 2888 1232 Sysqemgudhb.exe 98 PID 2888 wrote to memory of 4920 2888 Sysqemmsaxg.exe 100 PID 2888 wrote to memory of 4920 2888 Sysqemmsaxg.exe 100 PID 2888 wrote to memory of 4920 2888 Sysqemmsaxg.exe 100 PID 4920 wrote to memory of 3852 4920 Sysqemoczmy.exe 101 PID 4920 wrote to memory of 3852 4920 Sysqemoczmy.exe 101 PID 4920 wrote to memory of 3852 4920 Sysqemoczmy.exe 101 PID 3852 wrote to memory of 4896 3852 Sysqemwncvh.exe 102 PID 3852 wrote to memory of 4896 3852 Sysqemwncvh.exe 102 PID 3852 wrote to memory of 4896 3852 Sysqemwncvh.exe 102 PID 4896 wrote to memory of 4176 4896 Sysqemzjexc.exe 103 PID 4896 wrote to memory of 4176 4896 Sysqemzjexc.exe 103 PID 4896 wrote to memory of 4176 4896 Sysqemzjexc.exe 103 PID 4176 wrote to memory of 2692 4176 Sysqemwrpxq.exe 104 PID 4176 wrote to memory of 2692 4176 Sysqemwrpxq.exe 104 PID 4176 wrote to memory of 2692 4176 Sysqemwrpxq.exe 104 PID 2692 wrote to memory of 1652 2692 Sysqemhjedd.exe 105 PID 2692 wrote to memory of 1652 2692 Sysqemhjedd.exe 105 PID 2692 wrote to memory of 1652 2692 Sysqemhjedd.exe 105 PID 1652 wrote to memory of 4788 1652 Sysqemjqtnk.exe 106 PID 1652 wrote to memory of 4788 1652 Sysqemjqtnk.exe 106 PID 1652 wrote to memory of 4788 1652 Sysqemjqtnk.exe 106 PID 4788 wrote to memory of 1512 4788 Sysqemorbia.exe 107 PID 4788 wrote to memory of 1512 4788 Sysqemorbia.exe 107 PID 4788 wrote to memory of 1512 4788 Sysqemorbia.exe 107 PID 1512 wrote to memory of 4356 1512 Sysqemlevqu.exe 109 PID 1512 wrote to memory of 4356 1512 Sysqemlevqu.exe 109 PID 1512 wrote to memory of 4356 1512 Sysqemlevqu.exe 109 PID 4356 wrote to memory of 64 4356 Sysqemwkzjw.exe 110 PID 4356 wrote to memory of 64 4356 Sysqemwkzjw.exe 110 PID 4356 wrote to memory of 64 4356 Sysqemwkzjw.exe 110 PID 64 wrote to memory of 1640 64 Sysqemygclr.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe"C:\Users\Admin\AppData\Local\Temp\cc2f82a1dd581db040c2c4ba6917aa2b42f5368b289406432ccdedde8f08394e.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmcpnn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmcpnn.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtjqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtjqc.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhmtx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhmtx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyowv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyowv.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmznwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmznwj.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Sysqempqegl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqegl.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwupmc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwupmc.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsmbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsmbq.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeklri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeklri.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgudhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgudhb.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmsaxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsaxg.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoczmy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoczmy.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwncvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwncvh.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzjexc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjexc.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrpxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrpxq.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjedd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjedd.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqtnk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqtnk.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorbia.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorbia.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlevqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlevqu.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkzjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkzjw.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygclr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygclr.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeavgb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeavgb.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeeizq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeeizq.exe"24⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvbbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvbbn.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeivjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeivjg.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkyhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkyhl.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Sysqembjoco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembjoco.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwaqfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaqfl.exe"29⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgouxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgouxn.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjkyft.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjkyft.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgzfnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgzfnu.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoeqgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoeqgp.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjqti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjqti.exe"34⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopeex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopeex.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrhvtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrhvtq.exe"36⤵
- Executes dropped EXE
- Modifies registry class
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmobq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmobq.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjktrd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjktrd.exe"38⤵
- Executes dropped EXE
- Modifies registry class
PID:332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzjpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzjpu.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeboae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeboae.exe"40⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzvaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzvaf.exe"41⤵
- Executes dropped EXE
- Modifies registry class
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvukb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvukb.exe"42⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtrah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtrah.exe"43⤵
- Executes dropped EXE
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqapyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqapyy.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnywyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnywyz.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguwqv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguwqv.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjproi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjproi.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjadgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjadgw.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddrci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddrci.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybhxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybhxd.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\Sysqembbzhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbzhm.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhgsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhgsc.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdaocw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdaocw.exe"54⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycunn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycunn.exe"55⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwzvn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwzvn.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwcte.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwcte.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemledgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemledgy.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtdrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtdrm.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdlljo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlljo.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiuuex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiuuex.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiygwt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiygwt.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlemzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlemzb.exe"63⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjjuut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjuut.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqkxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqkxo.exe"65⤵
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvtwpk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvtwpk.exe"66⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtyvcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyvcv.exe"67⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkryl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkryl.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnenlj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnenlj.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrgtd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrgtd.exe"70⤵
- Checks computer location settings
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxuds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxuds.exe"71⤵
- Checks computer location settings
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakoyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakoyv.exe"72⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"73⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfmxlf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmxlf.exe"74⤵
- Modifies registry class
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqenrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqenrk.exe"75⤵
- Modifies registry class
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytbew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytbew.exe"76⤵
- Modifies registry class
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgump.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgump.exe"77⤵
- Checks computer location settings
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdjged.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjged.exe"78⤵
- Checks computer location settings
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobwci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobwci.exe"79⤵
- Modifies registry class
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsoqkb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsoqkb.exe"80⤵
- Modifies registry class
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxasp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxasp.exe"81⤵
- Modifies registry class
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpjkr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpjkr.exe"82⤵
- Modifies registry class
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjdfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjdfu.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcbfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcbfi.exe"84⤵
- Checks computer location settings
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvcyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvcyc.exe"85⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlsqlg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsqlg.exe"86⤵
- Checks computer location settings
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxjtz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxjtz.exe"87⤵
- Checks computer location settings
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaskdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaskdp.exe"88⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlhpwr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhpwr.exe"89⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\Sysqempxtrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxtrn.exe"90⤵
- Checks computer location settings
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemseatc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemseatc.exe"91⤵
- Checks computer location settings
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsejho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsejho.exe"92⤵
- Modifies registry class
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemamvzp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamvzp.exe"93⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcskke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcskke.exe"94⤵
- Checks computer location settings
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzqmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzqmu.exe"95⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiqqxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqqxd.exe"96⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkihvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkihvw.exe"97⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnonxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnonxl.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnvldc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnvldc.exe"99⤵
- Modifies registry class
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhxvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhxvr.exe"100⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Sysqempnmgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnmgg.exe"101⤵
- Modifies registry class
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Sysqempcblx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempcblx.exe"102⤵
- Modifies registry class
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvagtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvagtl.exe"103⤵
- Checks computer location settings
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxgnea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgnea.exe"104⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdbgzd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbgzd.exe"105⤵
- Modifies registry class
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqeec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqeec.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemirmzl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemirmzl.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxsja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxsja.exe"108⤵
- Checks computer location settings
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfsfra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfsfra.exe"109⤵
- Modifies registry class
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcjqzn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjqzn.exe"110⤵
- Checks computer location settings
- Modifies registry class
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcmcsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmcsk.exe"111⤵
- Modifies registry class
PID:368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcypky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcypky.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsyblz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsyblz.exe"113⤵
- Modifies registry class
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqempsxyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsxyp.exe"114⤵
- Checks computer location settings
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzoyif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzoyif.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmcyk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmcyk.exe"116⤵
- Checks computer location settings
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhsjba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhsjba.exe"117⤵
- Modifies registry class
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxxqws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxxqws.exe"118⤵
- Modifies registry class
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxqrom.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqrom.exe"119⤵
- Checks computer location settings
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxtdhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtdhb.exe"120⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxibms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxibms.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuneg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuneg.exe"122⤵
- Checks computer location settings
PID:2176
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-