Analysis
-
max time kernel
83s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe
Resource
win10v2004-20240802-en
General
-
Target
3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe
-
Size
89KB
-
MD5
7aca3fb79b80c626d0aea2fc2dc5d580
-
SHA1
c1c038c4706590bc580ddbb35d3e62363b3cc2fd
-
SHA256
3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47
-
SHA512
8758668822aabeb723865384357679b14eb75dc229524a10fe7e3046af7c59c8b49a91a0fa83916c983179faafa4c70f51f931d1494d57ec325b124d33c1d7e4
-
SSDEEP
1536:ozfMMkPZE1J7S6/PMj42VJEY4ujMepJtANuOAl0QQsIEySYndfc6QkAbt7:+fMNE1JG6XMk27EbpOthl0ZUed06QTx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemjmztg.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemogrok.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemtqsud.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemjzxga.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemesyoe.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemfofbl.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemvjijo.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemxqyvn.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemwlfmo.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemjxvjj.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemztrha.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqempkgyz.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemcpnno.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemgydbf.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemkkcjo.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemstivl.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemehljp.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemoapxl.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemlgnpv.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemllopj.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemstkxa.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemrhbtv.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemplmoa.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemnpnpd.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemufcct.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemzyzik.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemuzsad.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemmlrgt.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemekcjx.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemjpwuy.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqembrayy.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemqvtpx.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemebhps.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemekqvc.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemxzknb.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemlhjyq.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemlgjvu.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemylbdu.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemfcgcr.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemkulmu.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemmchkn.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemzacxa.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemznhxc.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemjuggw.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemswjmn.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemuxqan.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqempsrnv.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemngcgl.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemuiqnh.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemtyozj.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemgesli.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemeunzr.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemhznse.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemynvkg.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemegftv.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemxtohe.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemfqkrs.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemnutob.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqempdqwn.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemzgcvr.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemyfvlu.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemjbdqw.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemrvysz.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Sysqemltdek.exe -
Executes dropped EXE 64 IoCs
pid Process 3932 Sysqemxzknb.exe 4844 Sysqemzyzik.exe 4272 Sysqemjmztg.exe 2872 Sysqemokfto.exe 856 Sysqempkgyz.exe 1392 Sysqempdqwn.exe 3828 Sysqemzzrpv.exe 3468 Sysqemwtncl.exe 4204 Sysqemxtohe.exe 3568 Sysqempsrnv.exe 1148 Sysqemjnwvw.exe 4908 Sysqemzgcvr.exe 2736 Sysqemubhdr.exe 3396 Sysqemplmoa.exe 4540 Sysqemzwceh.exe 4452 Sysqemukttu.exe 4360 Sysqempbnwr.exe 2908 Sysqemebhps.exe 3344 Sysqemglymk.exe 1768 Sysqemzacxa.exe 2168 Sysqemuzsad.exe 1304 Sysqemcpnno.exe 4832 Sysqemekqvc.exe 4456 Sysqemogrok.exe 5116 Sysqemyfvlu.exe 3776 Sysqemmocox.exe 2112 Sysqembwwoy.exe 2852 Sysqemjpwuy.exe 4408 Sysqemjxvjj.exe 4520 Sysqemznhxc.exe 1568 Sysqemznrup.exe 2340 Sysqemwlziu.exe 4228 Sysqemjbdqw.exe 60 Sysqemwszlz.exe 2176 Sysqemjuggw.exe 3480 Sysqemewljo.exe 1752 Sysqembxdwj.exe 4756 Sysqemtqsud.exe 2324 Sysqemtyozj.exe 1732 Sysqemwqhcm.exe 3768 Sysqemrvysz.exe 3520 Sysqemgesli.exe 3260 Sysqemzpgqt.exe 4296 Sysqemjzxga.exe 1932 Sysqemqsxri.exe 3140 Sysqemlgnpv.exe 664 Sysqemeunzr.exe 2588 Sysqemnjpcb.exe 2348 Sysqemgtdam.exe 1208 Sysqemwymnk.exe 1940 Sysqemlsknf.exe 1212 Sysqemlhjyq.exe 3064 Sysqemgydbf.exe 2652 Sysqemesyoe.exe 804 Sysqemouxec.exe 2852 Sysqemltdek.exe 3060 Sysqemvofcl.exe 3224 Sysqemllopj.exe 4560 Sysqemynvkg.exe 972 Sysqemafnay.exe 2348 Sysqembrayy.exe 2228 Sysqemgdvtd.exe 3280 Sysqemtfkoa.exe 4844 Sysqemfofbl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemewljo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkkcjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemscrgx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfpfdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmlrgt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwszlz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembwwoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjuggw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxqyvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhceqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmelly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcqemy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkvmgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcpnno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemchkyu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemogrok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemltdek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjmztg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemylbdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemitalp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemehljp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemoapxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkofng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgdvtd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvjijo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemchpyu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhzbep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuaggl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuiqnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrvysz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemebhps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemyjezj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempdqwn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjpwuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfofbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzyzik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemeiryq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtyozj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembxdwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmocox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlgnpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqtmkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzwceh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgesli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlhjyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuzsad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmvmnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemstivl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlgjvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemeunzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemswjmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhznse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcvwpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzzrpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwqhcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemngcgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuxqan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnutob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmkwzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemukttu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqsxri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnmiif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemugcep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemplmoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqtmkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemswjmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztrha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzgcvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembrayy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempsrnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvofcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvwpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtchqp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwtncl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkvmgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzrpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfvopg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfpfdw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmkwzw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjnwvw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempbnwr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjezj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlygdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemouxec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgdvtd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxtohe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemebhps.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzacxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemllopj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvxmko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemstkxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemznhxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrvysz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqsxri.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhceqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxzknb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvesx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemclgox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembxdwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtyozj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlgjvu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmlrgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjuggw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlsknf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscrgx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnmiif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrhbtv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemugcep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqemy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchkyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuiqnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubhdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzsad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmocox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitalp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjmasf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlsqgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemekqvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjpwuy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnjpcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemegftv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwruqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlziu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnpnpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyaefk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemehljp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 3932 4796 3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe 81 PID 4796 wrote to memory of 3932 4796 3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe 81 PID 4796 wrote to memory of 3932 4796 3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe 81 PID 3932 wrote to memory of 4844 3932 Sysqemxzknb.exe 82 PID 3932 wrote to memory of 4844 3932 Sysqemxzknb.exe 82 PID 3932 wrote to memory of 4844 3932 Sysqemxzknb.exe 82 PID 4844 wrote to memory of 4272 4844 Sysqemzyzik.exe 83 PID 4844 wrote to memory of 4272 4844 Sysqemzyzik.exe 83 PID 4844 wrote to memory of 4272 4844 Sysqemzyzik.exe 83 PID 4272 wrote to memory of 2872 4272 Sysqemjmztg.exe 86 PID 4272 wrote to memory of 2872 4272 Sysqemjmztg.exe 86 PID 4272 wrote to memory of 2872 4272 Sysqemjmztg.exe 86 PID 2872 wrote to memory of 856 2872 Sysqemokfto.exe 87 PID 2872 wrote to memory of 856 2872 Sysqemokfto.exe 87 PID 2872 wrote to memory of 856 2872 Sysqemokfto.exe 87 PID 856 wrote to memory of 1392 856 Sysqempkgyz.exe 90 PID 856 wrote to memory of 1392 856 Sysqempkgyz.exe 90 PID 856 wrote to memory of 1392 856 Sysqempkgyz.exe 90 PID 1392 wrote to memory of 3828 1392 Sysqempdqwn.exe 91 PID 1392 wrote to memory of 3828 1392 Sysqempdqwn.exe 91 PID 1392 wrote to memory of 3828 1392 Sysqempdqwn.exe 91 PID 3828 wrote to memory of 3468 3828 Sysqemzzrpv.exe 92 PID 3828 wrote to memory of 3468 3828 Sysqemzzrpv.exe 92 PID 3828 wrote to memory of 3468 3828 Sysqemzzrpv.exe 92 PID 3468 wrote to memory of 4204 3468 Sysqemwtncl.exe 93 PID 3468 wrote to memory of 4204 3468 Sysqemwtncl.exe 93 PID 3468 wrote to memory of 4204 3468 Sysqemwtncl.exe 93 PID 4204 wrote to memory of 3568 4204 Sysqemxtohe.exe 94 PID 4204 wrote to memory of 3568 4204 Sysqemxtohe.exe 94 PID 4204 wrote to memory of 3568 4204 Sysqemxtohe.exe 94 PID 3568 wrote to memory of 1148 3568 Sysqempsrnv.exe 95 PID 3568 wrote to memory of 1148 3568 Sysqempsrnv.exe 95 PID 3568 wrote to memory of 1148 3568 Sysqempsrnv.exe 95 PID 1148 wrote to memory of 4908 1148 Sysqemjnwvw.exe 97 PID 1148 wrote to memory of 4908 1148 Sysqemjnwvw.exe 97 PID 1148 wrote to memory of 4908 1148 Sysqemjnwvw.exe 97 PID 4908 wrote to memory of 2736 4908 Sysqemzgcvr.exe 98 PID 4908 wrote to memory of 2736 4908 Sysqemzgcvr.exe 98 PID 4908 wrote to memory of 2736 4908 Sysqemzgcvr.exe 98 PID 2736 wrote to memory of 3396 2736 Sysqemubhdr.exe 99 PID 2736 wrote to memory of 3396 2736 Sysqemubhdr.exe 99 PID 2736 wrote to memory of 3396 2736 Sysqemubhdr.exe 99 PID 3396 wrote to memory of 4540 3396 Sysqemplmoa.exe 100 PID 3396 wrote to memory of 4540 3396 Sysqemplmoa.exe 100 PID 3396 wrote to memory of 4540 3396 Sysqemplmoa.exe 100 PID 4540 wrote to memory of 4452 4540 Sysqemzwceh.exe 101 PID 4540 wrote to memory of 4452 4540 Sysqemzwceh.exe 101 PID 4540 wrote to memory of 4452 4540 Sysqemzwceh.exe 101 PID 4452 wrote to memory of 4360 4452 Sysqemukttu.exe 102 PID 4452 wrote to memory of 4360 4452 Sysqemukttu.exe 102 PID 4452 wrote to memory of 4360 4452 Sysqemukttu.exe 102 PID 4360 wrote to memory of 2908 4360 Sysqempbnwr.exe 105 PID 4360 wrote to memory of 2908 4360 Sysqempbnwr.exe 105 PID 4360 wrote to memory of 2908 4360 Sysqempbnwr.exe 105 PID 2908 wrote to memory of 3344 2908 Sysqemebhps.exe 106 PID 2908 wrote to memory of 3344 2908 Sysqemebhps.exe 106 PID 2908 wrote to memory of 3344 2908 Sysqemebhps.exe 106 PID 3344 wrote to memory of 1768 3344 Sysqemglymk.exe 107 PID 3344 wrote to memory of 1768 3344 Sysqemglymk.exe 107 PID 3344 wrote to memory of 1768 3344 Sysqemglymk.exe 107 PID 1768 wrote to memory of 2168 1768 Sysqemzacxa.exe 108 PID 1768 wrote to memory of 2168 1768 Sysqemzacxa.exe 108 PID 1768 wrote to memory of 2168 1768 Sysqemzacxa.exe 108 PID 2168 wrote to memory of 1304 2168 Sysqemuzsad.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe"C:\Users\Admin\AppData\Local\Temp\3a197db39a7b1ab803901b188d9c75982b04ec6f8dfe2b4f53eab8dcee1aef47N.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxzknb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxzknb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzyzik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzyzik.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmztg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmztg.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokfto.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokfto.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Sysqempkgyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkgyz.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdqwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdqwn.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzrpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzrpv.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwtncl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtncl.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxtohe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtohe.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\Sysqempsrnv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsrnv.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjnwvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnwvw.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgcvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgcvr.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubhdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubhdr.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemplmoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplmoa.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzwceh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwceh.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemukttu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukttu.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Sysqempbnwr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbnwr.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebhps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebhps.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglymk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglymk.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzacxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzacxa.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzsad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzsad.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpnno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpnno.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemekqvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekqvc.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemogrok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogrok.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfvlu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfvlu.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwwoy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwwoy.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpwuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpwuy.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxvjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxvjj.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznhxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznhxc.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznrup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznrup.exe"32⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbdqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbdqw.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwszlz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwszlz.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:60 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjuggw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjuggw.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemewljo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewljo.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxdwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxdwj.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqsud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqsud.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtyozj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyozj.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwqhcm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqhcm.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvysz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvysz.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgesli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgesli.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzpgqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpgqt.exe"44⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzxga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzxga.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqsxri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsxri.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgnpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgnpv.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeunzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeunzr.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjpcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjpcb.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtdam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtdam.exe"50⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwymnk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwymnk.exe"51⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsknf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsknf.exe"52⤵
- Executes dropped EXE
- Modifies registry class
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhjyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhjyq.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgydbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgydbf.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemesyoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemesyoe.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemouxec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemouxec.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltdek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltdek.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvofcl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvofcl.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllopj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllopj.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemynvkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemynvkg.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafnay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafnay.exe"61⤵
- Executes dropped EXE
PID:972 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrayy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrayy.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgdvtd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgdvtd.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtfkoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfkoa.exe"64⤵
- Executes dropped EXE
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfofbl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfofbl.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnpnpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnpnpd.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyaefk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyaefk.exe"67⤵
- Modifies registry class
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxmko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxmko.exe"68⤵
- Modifies registry class
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtoiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtoiq.exe"69⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlgjvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgjvu.exe"70⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemylbdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemylbdu.exe"71⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfqkrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfqkrs.exe"72⤵
- Checks computer location settings
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjijo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjijo.exe"73⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkkcjo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkkcjo.exe"74⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqtmkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqtmkq.exe"75⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfcgcr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfcgcr.exe"76⤵
- Checks computer location settings
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxqyvn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqyvn.exe"77⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitalp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitalp.exe"78⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngcgl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngcgl.exe"79⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchpyu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchpyu.exe"80⤵
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswjmn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswjmn.exe"81⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjezj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjezj.exe"82⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvtpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvtpx.exe"83⤵
- Checks computer location settings
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfvopg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfvopg.exe"84⤵
- Modifies registry class
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemstkxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemstkxa.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhceqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhceqb.exe"86⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmelly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmelly.exe"87⤵
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscrgx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscrgx.exe"88⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzbep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzbep.exe"89⤵
- System Location Discovery: System Language Discovery
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqemy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqemy.exe"90⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcfdfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfdfb.exe"91⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnmiif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmiif.exe"92⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuxqan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxqan.exe"93⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrhbtv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrhbtv.exe"94⤵
- Checks computer location settings
- Modifies registry class
PID:60 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnutob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnutob.exe"95⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkvmgq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvmgq.exe"96⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugcep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugcep.exe"97⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhegmj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhegmj.exe"98⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmvmnr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvmnr.exe"99⤵
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemstivl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemstivl.exe"100⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchkyu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchkyu.exe"101⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsxeln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsxeln.exe"102⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemclgox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemclgox.exe"103⤵
- Modifies registry class
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuaggl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuaggl.exe"104⤵
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehljp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehljp.exe"105⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmczb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmczb.exe"106⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhznse.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhznse.exe"107⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuiqnh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuiqnh.exe"108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmasf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmasf.exe"109⤵
- Modifies registry class
PID:456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpfdw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpfdw.exe"110⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuxrvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxrvx.exe"111⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmlrgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlrgt.exe"112⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeiryq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeiryq.exe"113⤵
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkulmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkulmu.exe"114⤵
- Checks computer location settings
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemufcct.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemufcct.exe"115⤵
- Checks computer location settings
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvwpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvwpm.exe"116⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoapxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoapxl.exe"117⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkofng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkofng.exe"118⤵
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtchqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtchqp.exe"119⤵
- Modifies registry class
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmyiox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmyiox.exe"120⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlygdj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlygdj.exe"121⤵
- Modifies registry class
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztrha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztrha.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:3576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-