Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe
Resource
win10v2004-20240802-en
General
-
Target
af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe
-
Size
519KB
-
MD5
90c22099cf3775b2a1b7b2c500b6af40
-
SHA1
a6a4ffa617cdce17c08272543549c70e1aca4df5
-
SHA256
af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3cc
-
SHA512
2b89dbc2e5b68f6d0e8424306772f5f8b06d7e7f0a54da848779d3511e3bc3e5489ce0a52e1ed1f73e16787699ae512b975db9f52a3038f8547b57522372b0e9
-
SSDEEP
3072:dCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxY:dqDAwl0xPTMiR9JSSxPUKYGdodHX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemhfdvf.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemmecpj.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemjytrz.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemlbgjn.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxipai.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemaoecc.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemtjsix.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemznivf.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemfgoaw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemygtdq.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemgpcuy.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemeisis.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemodoxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemfskug.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemljrhn.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemdmoif.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxjzxw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxedzy.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemaczyi.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemhaqpb.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqememvyl.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemgkucq.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqembtsol.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemqobws.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemlgaoq.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemnmmjf.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemzdmjo.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemykgve.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemaimuh.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemhjouj.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemyqvde.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemqtixl.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemeegsu.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemexqqz.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemwpood.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemckvry.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemaycuu.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemqpusm.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemqeghr.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemvfmgb.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemqsdvw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemifcqp.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemvgiir.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemyuwpw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemsewut.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqempmdzw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemllbqk.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemvrllv.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqembrmna.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemvkzcj.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemxpeds.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemsgxzr.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemfjkjp.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqempqqon.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemlesdj.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemzkhue.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemgfqhp.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemsatpx.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemfsrhw.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemgjeby.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemuhori.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqempdzoj.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemshbmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Sysqemomipa.exe -
Executes dropped EXE 64 IoCs
pid Process 3748 Sysqememvyl.exe 1204 Sysqemydyzo.exe 3624 Sysqemljrhn.exe 2004 Sysqembrmna.exe 3416 Sysqemqpusm.exe 5048 Sysqemyfsdw.exe 404 Sysqemfqswe.exe 1620 Sysqemgfqhp.exe 1036 Sysqemnyyrq.exe 3316 Sysqemqeghr.exe 4500 Sysqemtwgkv.exe 4492 Sysqemifcqp.exe 3192 Sysqemairgd.exe 5032 Sysqemdpquj.exe 3140 Sysqemgkucq.exe 1988 Sysqemfsrhw.exe 3688 Sysqemdmoif.exe 2296 Sysqemueaqy.exe 4596 Sysqemdfadr.exe 4816 Sysqemvfmgb.exe 224 Sysqemsgxzr.exe 4796 Sysqemxedzy.exe 1708 Sysqemaoecc.exe 1628 Sysqemazrac.exe 2996 Sysqemvgiir.exe 1776 Sysqemnmjlh.exe 2532 Sysqemfjkjp.exe 1480 Sysqemvgspb.exe 2284 Sysqemchrpi.exe 2488 Sysqemhukxb.exe 664 Sysqemcpysn.exe 4860 Sysqemamgyr.exe 1684 Sysqemznivf.exe 3140 Sysqemuhori.exe 2056 Sysqemmtmhw.exe 4140 Sysqemcelzt.exe 3780 Sysqemfhxdr.exe 1692 Sysqemhdbly.exe 4880 Sysqemkntoc.exe 2316 Sysqempdzoj.exe 2444 Sysqemshbmd.exe 396 Sysqemzdmjo.exe 4404 Sysqemomipa.exe 1036 Sysqemeisis.exe 3360 Sysqemkhznl.exe 5052 Sysqempqqon.exe 2376 Sysqempmdzw.exe 4300 Sysqemsatpx.exe 1444 Sysqemhjouj.exe 864 Sysqemfgoaw.exe 220 Sysqemhfdvf.exe 3328 Sysqemgnaal.exe 2232 Sysqemewkjy.exe 4288 Sysqembtsol.exe 880 Sysqempdjxu.exe 396 Sysqemmecpj.exe 3564 Sysqemeegsu.exe 1424 Sysqemexqqz.exe 3200 Sysqemygtdq.exe 2220 Sysqembvitr.exe 412 Sysqemwpood.exe 2756 Sysqemglrfy.exe 4980 Sysqemhaqpb.exe 4092 Sysqemmgjdm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnyyrq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemairgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemueaqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfhxdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzdmjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemexqqz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemazrac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhaqpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxbpra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkntoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgfqhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdpquj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxedzy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgjeby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgpcuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqememvyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvfmgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemznivf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemljrhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemiwhle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnmmjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqpusm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembvitr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemydyzo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuhori.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkhznl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqejfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemsgxzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmgjdm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlbgjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemckvry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlesdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemaycuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgnaal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemygtdq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgkucq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvgspb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhdbly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemomipa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempmdzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemyuwpw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemivchb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdmoif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempqqon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemaimuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemllbqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemodoxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvrllv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxqkms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemyfsdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmtmhw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemaczyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzkhue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqtixl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxipai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtwgkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhukxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempdzoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemshbmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfsrhw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemyqvde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqeghr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjytrz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtjsix.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwgkv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqobws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsewut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqpusm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxbpra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlesdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhfdvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemifcqp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhaqpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemairgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdpquj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqejfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemamgyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiwhle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempqqon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdffwo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvkzcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnyyrq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmtmhw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdmjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsatpx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwpood.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembdbbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodoxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchrpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemckvry.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemazrac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaycuu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdzoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrzzj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyqvde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemydyzo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdmoif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemexqqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmgjdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemykgve.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemljrhn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfsrhw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshbmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfqhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjytrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxpeds.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqememvyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnmmjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvrllv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkhznl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaimuh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvgspb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcelzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjwczz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnmjlh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkntoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeegsu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemewkjy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhdbly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgoaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjeby.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlbgjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivchb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdjxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgpcuy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeisis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemomipa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 3748 4496 af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe 89 PID 4496 wrote to memory of 3748 4496 af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe 89 PID 4496 wrote to memory of 3748 4496 af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe 89 PID 3748 wrote to memory of 1204 3748 Sysqememvyl.exe 90 PID 3748 wrote to memory of 1204 3748 Sysqememvyl.exe 90 PID 3748 wrote to memory of 1204 3748 Sysqememvyl.exe 90 PID 1204 wrote to memory of 3624 1204 Sysqemydyzo.exe 91 PID 1204 wrote to memory of 3624 1204 Sysqemydyzo.exe 91 PID 1204 wrote to memory of 3624 1204 Sysqemydyzo.exe 91 PID 3624 wrote to memory of 2004 3624 Sysqemljrhn.exe 92 PID 3624 wrote to memory of 2004 3624 Sysqemljrhn.exe 92 PID 3624 wrote to memory of 2004 3624 Sysqemljrhn.exe 92 PID 2004 wrote to memory of 3416 2004 Sysqembrmna.exe 93 PID 2004 wrote to memory of 3416 2004 Sysqembrmna.exe 93 PID 2004 wrote to memory of 3416 2004 Sysqembrmna.exe 93 PID 3416 wrote to memory of 5048 3416 Sysqemqpusm.exe 95 PID 3416 wrote to memory of 5048 3416 Sysqemqpusm.exe 95 PID 3416 wrote to memory of 5048 3416 Sysqemqpusm.exe 95 PID 5048 wrote to memory of 404 5048 Sysqemyfsdw.exe 98 PID 5048 wrote to memory of 404 5048 Sysqemyfsdw.exe 98 PID 5048 wrote to memory of 404 5048 Sysqemyfsdw.exe 98 PID 404 wrote to memory of 1620 404 Sysqemfqswe.exe 101 PID 404 wrote to memory of 1620 404 Sysqemfqswe.exe 101 PID 404 wrote to memory of 1620 404 Sysqemfqswe.exe 101 PID 1620 wrote to memory of 1036 1620 Sysqemgfqhp.exe 102 PID 1620 wrote to memory of 1036 1620 Sysqemgfqhp.exe 102 PID 1620 wrote to memory of 1036 1620 Sysqemgfqhp.exe 102 PID 1036 wrote to memory of 3316 1036 Sysqemnyyrq.exe 103 PID 1036 wrote to memory of 3316 1036 Sysqemnyyrq.exe 103 PID 1036 wrote to memory of 3316 1036 Sysqemnyyrq.exe 103 PID 3316 wrote to memory of 4500 3316 Sysqemqeghr.exe 104 PID 3316 wrote to memory of 4500 3316 Sysqemqeghr.exe 104 PID 3316 wrote to memory of 4500 3316 Sysqemqeghr.exe 104 PID 4500 wrote to memory of 4492 4500 Sysqemtwgkv.exe 106 PID 4500 wrote to memory of 4492 4500 Sysqemtwgkv.exe 106 PID 4500 wrote to memory of 4492 4500 Sysqemtwgkv.exe 106 PID 4492 wrote to memory of 3192 4492 Sysqemifcqp.exe 107 PID 4492 wrote to memory of 3192 4492 Sysqemifcqp.exe 107 PID 4492 wrote to memory of 3192 4492 Sysqemifcqp.exe 107 PID 3192 wrote to memory of 5032 3192 Sysqemairgd.exe 110 PID 3192 wrote to memory of 5032 3192 Sysqemairgd.exe 110 PID 3192 wrote to memory of 5032 3192 Sysqemairgd.exe 110 PID 5032 wrote to memory of 3140 5032 Sysqemdpquj.exe 111 PID 5032 wrote to memory of 3140 5032 Sysqemdpquj.exe 111 PID 5032 wrote to memory of 3140 5032 Sysqemdpquj.exe 111 PID 3140 wrote to memory of 1988 3140 Sysqemgkucq.exe 112 PID 3140 wrote to memory of 1988 3140 Sysqemgkucq.exe 112 PID 3140 wrote to memory of 1988 3140 Sysqemgkucq.exe 112 PID 1988 wrote to memory of 3688 1988 Sysqemfsrhw.exe 113 PID 1988 wrote to memory of 3688 1988 Sysqemfsrhw.exe 113 PID 1988 wrote to memory of 3688 1988 Sysqemfsrhw.exe 113 PID 3688 wrote to memory of 2296 3688 Sysqemdmoif.exe 114 PID 3688 wrote to memory of 2296 3688 Sysqemdmoif.exe 114 PID 3688 wrote to memory of 2296 3688 Sysqemdmoif.exe 114 PID 2296 wrote to memory of 4596 2296 Sysqemueaqy.exe 115 PID 2296 wrote to memory of 4596 2296 Sysqemueaqy.exe 115 PID 2296 wrote to memory of 4596 2296 Sysqemueaqy.exe 115 PID 4596 wrote to memory of 4816 4596 Sysqemdfadr.exe 116 PID 4596 wrote to memory of 4816 4596 Sysqemdfadr.exe 116 PID 4596 wrote to memory of 4816 4596 Sysqemdfadr.exe 116 PID 4816 wrote to memory of 224 4816 Sysqemvfmgb.exe 117 PID 4816 wrote to memory of 224 4816 Sysqemvfmgb.exe 117 PID 4816 wrote to memory of 224 4816 Sysqemvfmgb.exe 117 PID 224 wrote to memory of 4796 224 Sysqemsgxzr.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe"C:\Users\Admin\AppData\Local\Temp\af12692a68de7a9e9b06b4ef4f250059d343d9f4448eb7b34d84d9224cd1a3ccN.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqememvyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqememvyl.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemydyzo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydyzo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljrhn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljrhn.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrmna.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrmna.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpusm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpusm.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfsdw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfsdw.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfqswe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfqswe.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfqhp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfqhp.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnyyrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnyyrq.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqeghr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqeghr.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwgkv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwgkv.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemifcqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemifcqp.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemairgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemairgd.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpquj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpquj.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkucq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkucq.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfsrhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfsrhw.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmoif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmoif.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemueaqy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemueaqy.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfadr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfadr.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfmgb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfmgb.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsgxzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgxzr.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxedzy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxedzy.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaoecc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaoecc.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemazrac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemazrac.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgiir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgiir.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnmjlh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmjlh.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfjkjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjkjp.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgspb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgspb.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchrpi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchrpi.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhukxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhukxb.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpysn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpysn.exe"32⤵
- Executes dropped EXE
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemamgyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamgyr.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznivf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznivf.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuhori.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhori.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtmhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtmhw.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcelzt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcelzt.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfhxdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfhxdr.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhdbly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhdbly.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkntoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkntoc.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdzoj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdzoj.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemshbmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshbmd.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdmjo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdmjo.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemomipa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemomipa.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeisis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeisis.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhznl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhznl.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Sysqempqqon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqqon.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\Sysqempmdzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempmdzw.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsatpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsatpx.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjouj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjouj.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgoaw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgoaw.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfdvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfdvf.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnaal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnaal.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemewkjy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewkjy.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtsol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtsol.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdjxu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdjxu.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmecpj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmecpj.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeegsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeegsu.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexqqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexqqz.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygtdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygtdq.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Sysqembvitr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvitr.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwpood.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwpood.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglrfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglrfy.exe"63⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhaqpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhaqpb.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgjdm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgjdm.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdbbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdbbn.exe"66⤵
- Modifies registry class
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwczz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwczz.exe"67⤵
- Modifies registry class
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrzzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrzzj.exe"68⤵
- Modifies registry class
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyuwpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyuwpw.exe"69⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllbqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllbqk.exe"70⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyqvde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyqvde.exe"71⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjeby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjeby.exe"72⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjytrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjytrz.exe"73⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodoxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodoxy.exe"74⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgpcuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpcuy.exe"75⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjsix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjsix.exe"76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqsdvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsdvw.exe"77⤵
- Checks computer location settings
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbgjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbgjn.exe"78⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqobws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqobws.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdffwo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdffwo.exe"80⤵
- Modifies registry class
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqejfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqejfi.exe"81⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqtixl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqtixl.exe"82⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqqdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqqdy.exe"83⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiwhle.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwhle.exe"84⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgaoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgaoq.exe"85⤵
- Checks computer location settings
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckvry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckvry.exe"86⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvkzcj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvkzcj.exe"87⤵
- Checks computer location settings
- Modifies registry class
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsewut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsewut.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsirfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsirfb.exe"89⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlesdj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlesdj.exe"90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemigmwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemigmwq.exe"91⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemivchb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivchb.exe"92⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfskug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfskug.exe"93⤵
- Checks computer location settings
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaycuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaycuu.exe"94⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemykgve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemykgve.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaczyi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaczyi.exe"96⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxpeds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxpeds.exe"97⤵
- Checks computer location settings
- Modifies registry class
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnmmjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmmjf.exe"98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxbpra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxbpra.exe"99⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzkhue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkhue.exe"100⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxipai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxipai.exe"101⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjzxw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjzxw.exe"102⤵
- Checks computer location settings
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvrllv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrllv.exe"103⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxqkms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqkms.exe"104⤵
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaimuh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaimuh.exe"105⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfkend.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkend.exe"106⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\Sysqemafkip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafkip.exe"107⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkfwla.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfwla.exe"108⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhrtrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhrtrs.exe"109⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemedpru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedpru.exe"110⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxpnhh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxpnhh.exe"111⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhkpfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkpfi.exe"112⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmxjsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxjsn.exe"113⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxtmba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtmba.exe"114⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwpzlr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwpzlr.exe"115⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjdbzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdbzc.exe"116⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhxyzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxyzm.exe"117⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhtlcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtlcu.exe"118⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhxwvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxwvx.exe"119⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjpxyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpxyb.exe"120⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzuhql.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzuhql.exe"121⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzbgow.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbgow.exe"122⤵PID:2376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-