Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe
Resource
win10v2004-20240802-en
General
-
Target
f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe
-
Size
4.3MB
-
MD5
4f18a87db482864083fb9efbe6cc38ca
-
SHA1
780c933ec9b5ba0ace75e0cf03c6a0eab4246585
-
SHA256
f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95
-
SHA512
51a47a41f411ec38f5151dfd4c8163147cacffb5f361ae754eb1f6e9245d4cbeee96d617504a8ef79612fb9b2f36717f3528fc82ccef42cb27b234b9fc4e9671
-
SSDEEP
24576:EZtM+M9NoZS/6oTNfRh3Qh3OXuaq4gPZrIbXEu8CkB7m8yWLth1Utl0uPD5DBX:E4+CoZKTh36dZ4gPZU8JUjItvUjFll
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemlsafk.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqembigrs.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxcvqb.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemhvbfi.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemjskhf.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemthwiu.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemdqehr.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemzfnvu.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemficqr.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemottpb.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemgrfqy.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemsadyf.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemvayip.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemcxsye.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemtukav.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxsikw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemjorou.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemtunnq.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemiliby.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemppttq.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemtnfzq.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemgycex.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemdlhot.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemitnji.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxhtme.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxjipw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxhypv.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemcfdfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemfpfdw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemotvut.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemwczfg.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemhznse.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemixfaj.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqembxkyt.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemfngjf.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemragak.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemkmqvk.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxdvwh.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqembradx.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemzzjot.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemjbdqw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemanvjp.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemwortg.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemdeupy.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqembdryd.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemogezq.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemijijb.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemtnpir.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqempgveu.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemjygde.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemagiku.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemztfsu.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxgvwm.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqembgsik.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemcbwdo.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemdfkoi.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemwxbai.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemjazog.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemmqjjh.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemcdyvx.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemdllpz.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemkuaco.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemruzgo.exe -
Executes dropped EXE 64 IoCs
pid Process 1016 Sysqemlsafk.exe 2316 Sysqembxkyt.exe 2740 Sysqemjbdqw.exe 4408 Sysqembigrs.exe 3044 Sysqemygowf.exe 2172 Sysqemottpb.exe 4852 Sysqemtnpir.exe 4364 Sysqemtunnq.exe 3940 Sysqemtgkjw.exe 1624 Sysqemjskhf.exe 3580 Sysqemthwiu.exe 2396 Sysqemwczfg.exe 4216 Sysqembdryd.exe 2180 Sysqemllwjz.exe 1068 Sysqemlwpxy.exe 1416 Sysqemgrfqy.exe 1412 Sysqemlmrta.exe 4768 Sysqemanvjp.exe 1104 Sysqemagiku.exe 3940 Sysqemtukav.exe 4944 Sysqemdfkoi.exe 1728 Sysqemlcvgs.exe 2808 Sysqemdoswf.exe 5092 Sysqemdguul.exe 3632 Sysqemxjipw.exe 3888 Sysqemsadyf.exe 1016 Sysqemiixqg.exe 4564 Sysqemxcvqb.exe 1104 Sysqemxyqbj.exe 1820 Sysqempgveu.exe 3252 Sysqemfoqkg.exe 2328 Sysqemvlzpe.exe 2232 Sysqemvayip.exe 3088 Sysqemvejbk.exe 1672 Sysqemcxsye.exe 4852 Sysqemfplui.exe 3032 Sysqemxsikw.exe 1800 Sysqemxhypv.exe 2044 Sysqemcfdfb.exe 1980 Sysqemfpuut.exe 1128 Sysqemhvbfi.exe 2608 Sysqemptwsu.exe 4156 Sysqemsslnd.exe 2520 Sysqemppttq.exe 4356 Sysqemaalwa.exe 4084 Sysqemfngjf.exe 4568 Sysqemztfsu.exe 4772 Sysqemcdyvx.exe 3192 Sysqemragak.exe 1556 Sysqemctfdu.exe 1560 Sysqemutjgf.exe 4384 Sysqemxgvwm.exe 2232 Sysqemhznse.exe 5108 Sysqemzfnvu.exe 4724 Sysqemfpfdw.exe 3240 Sysqemzzjot.exe 4492 Sysqemwortg.exe 3112 Sysqemzvgkn.exe 944 Sysqemzwqhb.exe 3192 Sysqemwxbai.exe 4380 Sysqembgsik.exe 5076 Sysqemmuvrg.exe 4376 Sysqemrlbrn.exe 4664 Sysqembdtug.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcxsye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemutjgf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwxbai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemycqvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmqjjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdqehr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembdryd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzvgkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkuaco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtunnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfngjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembdtug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemagiku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxgvwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjbdqw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemottpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemthwiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemppttq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjqoih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzwqhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjorou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemiliby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmbllp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemragak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhznse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwortg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdlhot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdeupy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxdvwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemctfdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemllzep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemixfaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxhtme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemanvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemaalwa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemllwjz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgrfqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfpuut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemttiie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemndgyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxhypv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemztfsu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrlbrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtnfzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemypzqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtgkjw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjskhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdfkoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdguul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhvbfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxjipw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfoqkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembradx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemixcnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxizcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlsafk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlcvgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvlzpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdllpz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgycex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemitnji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqcnfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjygde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemficqr.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembdryd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhvbfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztfsu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjazog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiihpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvejbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxcutl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfoqkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzfnvu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembradx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygowf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsadyf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemruzgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcfdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnemfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdoswf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqcnfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemogezq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmqjjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjipw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcdyvx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrlbrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfpuut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwxbai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemctfdu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemottpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemthwiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrfqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwortg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemijijb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmbllp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembigrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsslnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejroo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfplui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemppttq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitnji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdguul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvlzpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemptwsu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemldami.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvuzqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemixcnw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxcvqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemllzep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemutjgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembdtug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtqrhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxyqbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzjot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcbwdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhznse.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwqhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmuvrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemragak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiliby.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxhtme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjorou.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemllwjz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlwpxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaalwa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotvut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdlhot.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 1016 4120 f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe 94 PID 4120 wrote to memory of 1016 4120 f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe 94 PID 4120 wrote to memory of 1016 4120 f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe 94 PID 1016 wrote to memory of 2316 1016 Sysqemlsafk.exe 95 PID 1016 wrote to memory of 2316 1016 Sysqemlsafk.exe 95 PID 1016 wrote to memory of 2316 1016 Sysqemlsafk.exe 95 PID 2316 wrote to memory of 2740 2316 Sysqembxkyt.exe 96 PID 2316 wrote to memory of 2740 2316 Sysqembxkyt.exe 96 PID 2316 wrote to memory of 2740 2316 Sysqembxkyt.exe 96 PID 2740 wrote to memory of 4408 2740 Sysqemjbdqw.exe 97 PID 2740 wrote to memory of 4408 2740 Sysqemjbdqw.exe 97 PID 2740 wrote to memory of 4408 2740 Sysqemjbdqw.exe 97 PID 4408 wrote to memory of 3044 4408 Sysqembigrs.exe 101 PID 4408 wrote to memory of 3044 4408 Sysqembigrs.exe 101 PID 4408 wrote to memory of 3044 4408 Sysqembigrs.exe 101 PID 3044 wrote to memory of 2172 3044 Sysqemygowf.exe 102 PID 3044 wrote to memory of 2172 3044 Sysqemygowf.exe 102 PID 3044 wrote to memory of 2172 3044 Sysqemygowf.exe 102 PID 2172 wrote to memory of 4852 2172 Sysqemottpb.exe 104 PID 2172 wrote to memory of 4852 2172 Sysqemottpb.exe 104 PID 2172 wrote to memory of 4852 2172 Sysqemottpb.exe 104 PID 4852 wrote to memory of 4364 4852 Sysqemtnpir.exe 106 PID 4852 wrote to memory of 4364 4852 Sysqemtnpir.exe 106 PID 4852 wrote to memory of 4364 4852 Sysqemtnpir.exe 106 PID 4364 wrote to memory of 3940 4364 Sysqemtunnq.exe 121 PID 4364 wrote to memory of 3940 4364 Sysqemtunnq.exe 121 PID 4364 wrote to memory of 3940 4364 Sysqemtunnq.exe 121 PID 3940 wrote to memory of 1624 3940 Sysqemtgkjw.exe 109 PID 3940 wrote to memory of 1624 3940 Sysqemtgkjw.exe 109 PID 3940 wrote to memory of 1624 3940 Sysqemtgkjw.exe 109 PID 1624 wrote to memory of 3580 1624 Sysqemjskhf.exe 110 PID 1624 wrote to memory of 3580 1624 Sysqemjskhf.exe 110 PID 1624 wrote to memory of 3580 1624 Sysqemjskhf.exe 110 PID 3580 wrote to memory of 2396 3580 Sysqemthwiu.exe 111 PID 3580 wrote to memory of 2396 3580 Sysqemthwiu.exe 111 PID 3580 wrote to memory of 2396 3580 Sysqemthwiu.exe 111 PID 2396 wrote to memory of 4216 2396 Sysqemwczfg.exe 114 PID 2396 wrote to memory of 4216 2396 Sysqemwczfg.exe 114 PID 2396 wrote to memory of 4216 2396 Sysqemwczfg.exe 114 PID 4216 wrote to memory of 2180 4216 Sysqembdryd.exe 115 PID 4216 wrote to memory of 2180 4216 Sysqembdryd.exe 115 PID 4216 wrote to memory of 2180 4216 Sysqembdryd.exe 115 PID 2180 wrote to memory of 1068 2180 Sysqemllwjz.exe 116 PID 2180 wrote to memory of 1068 2180 Sysqemllwjz.exe 116 PID 2180 wrote to memory of 1068 2180 Sysqemllwjz.exe 116 PID 1068 wrote to memory of 1416 1068 Sysqemlwpxy.exe 117 PID 1068 wrote to memory of 1416 1068 Sysqemlwpxy.exe 117 PID 1068 wrote to memory of 1416 1068 Sysqemlwpxy.exe 117 PID 1416 wrote to memory of 1412 1416 Sysqemgrfqy.exe 118 PID 1416 wrote to memory of 1412 1416 Sysqemgrfqy.exe 118 PID 1416 wrote to memory of 1412 1416 Sysqemgrfqy.exe 118 PID 1412 wrote to memory of 4768 1412 Sysqemlmrta.exe 119 PID 1412 wrote to memory of 4768 1412 Sysqemlmrta.exe 119 PID 1412 wrote to memory of 4768 1412 Sysqemlmrta.exe 119 PID 4768 wrote to memory of 1104 4768 Sysqemanvjp.exe 131 PID 4768 wrote to memory of 1104 4768 Sysqemanvjp.exe 131 PID 4768 wrote to memory of 1104 4768 Sysqemanvjp.exe 131 PID 1104 wrote to memory of 3940 1104 Sysqemagiku.exe 121 PID 1104 wrote to memory of 3940 1104 Sysqemagiku.exe 121 PID 1104 wrote to memory of 3940 1104 Sysqemagiku.exe 121 PID 3940 wrote to memory of 4944 3940 Sysqemtukav.exe 122 PID 3940 wrote to memory of 4944 3940 Sysqemtukav.exe 122 PID 3940 wrote to memory of 4944 3940 Sysqemtukav.exe 122 PID 4944 wrote to memory of 1728 4944 Sysqemdfkoi.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe"C:\Users\Admin\AppData\Local\Temp\f25d315a391b60023fadf0ee9895d7cdc292d77b45ea17aab5db721f4ef59d95.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsafk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsafk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxkyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxkyt.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbdqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbdqw.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqembigrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembigrs.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygowf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygowf.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemottpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemottpb.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnpir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnpir.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtunnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtunnq.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtgkjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtgkjw.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjskhf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjskhf.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthwiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthwiu.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwczfg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwczfg.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdryd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdryd.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllwjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllwjz.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwpxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwpxy.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrfqy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrfqy.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmrta.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmrta.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemanvjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemanvjp.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemagiku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagiku.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtukav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtukav.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfkoi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfkoi.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcvgs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcvgs.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdoswf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdoswf.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdguul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdguul.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjipw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjipw.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsadyf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsadyf.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiixqg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiixqg.exe"28⤵
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxcvqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcvqb.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyqbj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyqbj.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgveu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgveu.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfoqkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfoqkg.exe"32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvlzpe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvlzpe.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvayip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvayip.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvejbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvejbk.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcxsye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxsye.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfplui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfplui.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxsikw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxsikw.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhypv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhypv.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcfdfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfdfb.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpuut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpuut.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhvbfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvbfi.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptwsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptwsu.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsslnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsslnd.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemppttq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppttq.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaalwa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaalwa.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfngjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfngjf.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztfsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztfsu.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcdyvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdyvx.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemragak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemragak.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemctfdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctfdu.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutjgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutjgf.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxgvwm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgvwm.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhznse.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhznse.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzfnvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzfnvu.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpfdw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpfdw.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqoih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqoih.exe"57⤵
- System Location Discovery: System Language Discovery
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzjot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzjot.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwortg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwortg.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvgkn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvgkn.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzwqhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwqhb.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwxbai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwxbai.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgsik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgsik.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmuvrg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmuvrg.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlbrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlbrn.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdtug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdtug.exe"66⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmcgxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmcgxc.exe"67⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwyivv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyivv.exe"68⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Sysqembwovd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwovd.exe"69⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjazog.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjazog.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemruzgo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemruzgo.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemogezq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogezq.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllzep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllzep.exe"73⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdllpz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdllpz.exe"74⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjygde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjygde.exe"75⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycqvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycqvw.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmqjjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqjjh.exe"77⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjorou.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjorou.exe"78⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnfzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnfzq.exe"79⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotvut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotvut.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqehr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqehr.exe"81⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemypzqa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemypzqa.exe"82⤵
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrglx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrglx.exe"83⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\Sysqembradx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembradx.exe"84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejroo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejroo.exe"85⤵
- Modifies registry class
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiliby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiliby.exe"86⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldami.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldami.exe"87⤵
- Modifies registry class
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaakka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaakka.exe"88⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiihpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiihpg.exe"89⤵
- Modifies registry class
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixfaj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixfaj.exe"90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttiie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttiie.exe"91⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgycex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgycex.exe"92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdlhot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlhot.exe"93⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqrhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqrhl.exe"94⤵
- Modifies registry class
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdeupy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdeupy.exe"95⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkmqvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkmqvk.exe"96⤵
- Checks computer location settings
PID:212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxdvwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdvwh.exe"97⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkuaco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuaco.exe"98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqbao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqbao.exe"99⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvuzqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuzqc.exe"100⤵
- Modifies registry class
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemficqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemficqr.exe"101⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitnji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitnji.exe"102⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixcnw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixcnw.exe"103⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcnfg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcnfg.exe"104⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndgyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndgyn.exe"105⤵
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxcutl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcutl.exe"106⤵
- Modifies registry class
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemijijb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijijb.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhtme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhtme.exe"108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnemfo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnemfo.exe"109⤵
- Modifies registry class
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcbwdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbwdo.exe"110⤵
- Checks computer location settings
- Modifies registry class
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbllp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbllp.exe"111⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxizcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxizcf.exe"112⤵
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscejf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscejf.exe"113⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Sysqempemen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempemen.exe"114⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzwcka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwcka.exe"115⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhamxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhamxk.exe"116⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Sysqemptlxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptlxy.exe"117⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuyqfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyqfe.exe"118⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxiivw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxiivw.exe"119⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzpofm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpofm.exe"120⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapxlf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapxlf.exe"121⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemugrou.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugrou.exe"122⤵PID:3328
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-