Analysis
-
max time kernel
57s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe
Resource
win10v2004-20241007-en
General
-
Target
334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe
-
Size
91KB
-
MD5
338b4a473c27dd39d2944503ae724f4f
-
SHA1
0bf913deb52cb2ebd4eb602c913924e46839ce25
-
SHA256
334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385
-
SHA512
a3b5f3c7754186f37a8d8276c97b5c2e2df4c54cbb73bd7b6c847e6bd63ce4e91dbdd2af80fa3543bf49ea28d60293b2aa3c4f9280dd8286ee51407f256a1e1e
-
SSDEEP
1536:GzfMMkPZE1J7S6/PMj42VJEY4ujMepJtANuOAl0QQsIEySYndfcUF:EfMNE1JG6XMk27EbpOthl0ZUed0UF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemkuejq.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemxaerr.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemucumw.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemxjjcx.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemecati.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemgbhhh.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemfgpcz.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemxyddq.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemnptnm.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemcrkmu.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemuwvlm.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemzlhml.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemyfxsq.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemvxuds.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemamgcg.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemnmxrf.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemkterk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemzvvyb.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemuuzim.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemjrzwk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemgrvko.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemqgtbg.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemydqpd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemecjmx.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemvwrbo.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemfgpoz.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqempmseu.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqempkebu.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemcnyfw.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemqyivk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemfdyty.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemajqbn.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemcyylj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemcrzjd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemcvxxd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemzobyw.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemhanrr.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemlzgxe.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemnghmv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemizxfh.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemxsvgk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqembgsib.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemonrjp.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemvuefh.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemeoteq.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemcirkl.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemmtkfl.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemaezry.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemvsdlu.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemfgprv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemfguhf.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemvanrq.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemxcyld.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemrkiku.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemvjtai.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemseatc.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemfirli.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemkipgx.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemrtrah.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemjhrld.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemyandr.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemytzrk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemxwvmj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Sysqemmrzve.exe -
Executes dropped EXE 64 IoCs
pid Process 4620 Sysqemjrzwk.exe 1408 Sysqembgiza.exe 4276 Sysqemzlhml.exe 1604 Sysqemvqlrd.exe 2432 Sysqemwmbsm.exe 436 Sysqemlzgxe.exe 4320 Sysqemrtrah.exe 712 Sysqemjhrld.exe 3936 Sysqembhcic.exe 2912 Sysqemqeloa.exe 3084 Sysqemovwwn.exe 3948 Sysqemaezry.exe 428 Sysqemnghmv.exe 3196 Sysqemgrvko.exe 2316 Sysqemqyivk.exe 1848 Sysqemyfxsq.exe 4472 Sysqemgvtyw.exe 3608 Sysqemvsdlu.exe 4992 Sysqemqgtbg.exe 4336 Sysqemvwrbo.exe 4152 Sysqemfgprv.exe 4496 Sysqemvanrq.exe 2432 Sysqemydqpd.exe 2012 Sysqemdfxka.exe 552 Sysqemivdkh.exe 1512 Sysqembgsib.exe 4456 Sysqemyandr.exe 4568 Sysqemvxuds.exe 3812 Sysqemkuejq.exe 2400 Sysqemytzrk.exe 3976 Sysqemnmxrf.exe 4348 Sysqemyxwpe.exe 4164 Sysqemgbhhh.exe 1228 Sysqemvjtai.exe 3092 Sysqemiwmvz.exe 3964 Sysqemthltg.exe 3612 Sysqemdgqwc.exe 4844 Sysqemseatc.exe 4068 Sysqemfgpoz.exe 4524 Sysqemfgpcz.exe 3428 Sysqemamgcg.exe 2208 Sysqemxyddq.exe 5040 Sysqemcauqa.exe 3628 Sysqemfdyty.exe 3932 Sysqemajqbn.exe 1048 Sysqemcifww.exe 2124 Sysqemxwvmj.exe 4528 Sysqemnptnm.exe 4264 Sysqemvuefh.exe 4284 Sysqemizxfh.exe 2252 Sysqemxsvgk.exe 3656 Sysqemfirli.exe 2060 Sysqemcyylj.exe 3888 Sysqemsgjtw.exe 2348 Sysqemcrzjd.exe 2560 Sysqempmseu.exe 3624 Sysqemcrkmu.exe 3300 Sysqemcvxxd.exe 3516 Sysqemmrzve.exe 4308 Sysqemxcyld.exe 4844 Sysqemuwvlm.exe 3768 Sysqemkterk.exe 4560 Sysqemfguhf.exe 4792 Sysqemeoteq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembgiza.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnghmv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemyfxsq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvwrbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvjtai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcifww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmrzve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuuzim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfgpcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwmbsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembgsib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemyandr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvxuds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdgqwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxsvgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvqlrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemovwwn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemaezry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemdfxka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemthltg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcauqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxwvmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnptnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcvxxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemucumw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqyivk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfgprv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcrkmu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfguhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjansv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzobyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemecati.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqgtbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfdyty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempkebu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcnyfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhanrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlzgxe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgrvko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnmxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemajqbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcrzjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuwvlm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcirkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrugws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemwbxip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemonrjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemizxfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcyylj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvsdlu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzvvyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemivdkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkuejq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfirli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmtkfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjrzwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjhrld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgvtyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvanrq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfgpoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemamgcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempmseu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemeoteq.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvanrq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemajqbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempkebu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjjcx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwmbsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrtrah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqeloa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrvko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemecjmx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemecati.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvuefh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmrzve.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwbxip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytzrk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgbhhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdgqwc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgpcz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzgxe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvsdlu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgpoz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcauqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeoteq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjansv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkiku.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaezry.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgvtyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjtai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxyddq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsgjtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcrkmu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvxxd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcnyfw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzlhml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivdkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvxuds.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyxwpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuwvlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjhrld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemydqpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemizxfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempmseu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgprv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcirkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcifww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkterk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfvuss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkipgx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvqlrd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembgsib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnmxrf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwypaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvwrbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemthltg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemamgcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxsvgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjfsd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnghmv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkuejq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcyylj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemucumw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnptnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuuzim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqyivk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 620 wrote to memory of 4620 620 334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe 82 PID 620 wrote to memory of 4620 620 334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe 82 PID 620 wrote to memory of 4620 620 334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe 82 PID 4620 wrote to memory of 1408 4620 Sysqemjrzwk.exe 83 PID 4620 wrote to memory of 1408 4620 Sysqemjrzwk.exe 83 PID 4620 wrote to memory of 1408 4620 Sysqemjrzwk.exe 83 PID 1408 wrote to memory of 4276 1408 Sysqembgiza.exe 84 PID 1408 wrote to memory of 4276 1408 Sysqembgiza.exe 84 PID 1408 wrote to memory of 4276 1408 Sysqembgiza.exe 84 PID 4276 wrote to memory of 1604 4276 Sysqemzlhml.exe 87 PID 4276 wrote to memory of 1604 4276 Sysqemzlhml.exe 87 PID 4276 wrote to memory of 1604 4276 Sysqemzlhml.exe 87 PID 1604 wrote to memory of 2432 1604 Sysqemvqlrd.exe 88 PID 1604 wrote to memory of 2432 1604 Sysqemvqlrd.exe 88 PID 1604 wrote to memory of 2432 1604 Sysqemvqlrd.exe 88 PID 2432 wrote to memory of 436 2432 Sysqemwmbsm.exe 91 PID 2432 wrote to memory of 436 2432 Sysqemwmbsm.exe 91 PID 2432 wrote to memory of 436 2432 Sysqemwmbsm.exe 91 PID 436 wrote to memory of 4320 436 Sysqemlzgxe.exe 92 PID 436 wrote to memory of 4320 436 Sysqemlzgxe.exe 92 PID 436 wrote to memory of 4320 436 Sysqemlzgxe.exe 92 PID 4320 wrote to memory of 712 4320 Sysqemrtrah.exe 93 PID 4320 wrote to memory of 712 4320 Sysqemrtrah.exe 93 PID 4320 wrote to memory of 712 4320 Sysqemrtrah.exe 93 PID 712 wrote to memory of 3936 712 Sysqemjhrld.exe 94 PID 712 wrote to memory of 3936 712 Sysqemjhrld.exe 94 PID 712 wrote to memory of 3936 712 Sysqemjhrld.exe 94 PID 3936 wrote to memory of 2912 3936 Sysqembhcic.exe 95 PID 3936 wrote to memory of 2912 3936 Sysqembhcic.exe 95 PID 3936 wrote to memory of 2912 3936 Sysqembhcic.exe 95 PID 2912 wrote to memory of 3084 2912 Sysqemqeloa.exe 96 PID 2912 wrote to memory of 3084 2912 Sysqemqeloa.exe 96 PID 2912 wrote to memory of 3084 2912 Sysqemqeloa.exe 96 PID 3084 wrote to memory of 3948 3084 Sysqemovwwn.exe 98 PID 3084 wrote to memory of 3948 3084 Sysqemovwwn.exe 98 PID 3084 wrote to memory of 3948 3084 Sysqemovwwn.exe 98 PID 3948 wrote to memory of 428 3948 Sysqemaezry.exe 99 PID 3948 wrote to memory of 428 3948 Sysqemaezry.exe 99 PID 3948 wrote to memory of 428 3948 Sysqemaezry.exe 99 PID 428 wrote to memory of 3196 428 Sysqemnghmv.exe 100 PID 428 wrote to memory of 3196 428 Sysqemnghmv.exe 100 PID 428 wrote to memory of 3196 428 Sysqemnghmv.exe 100 PID 3196 wrote to memory of 2316 3196 Sysqemgrvko.exe 101 PID 3196 wrote to memory of 2316 3196 Sysqemgrvko.exe 101 PID 3196 wrote to memory of 2316 3196 Sysqemgrvko.exe 101 PID 2316 wrote to memory of 1848 2316 Sysqemqyivk.exe 103 PID 2316 wrote to memory of 1848 2316 Sysqemqyivk.exe 103 PID 2316 wrote to memory of 1848 2316 Sysqemqyivk.exe 103 PID 1848 wrote to memory of 4472 1848 Sysqemyfxsq.exe 105 PID 1848 wrote to memory of 4472 1848 Sysqemyfxsq.exe 105 PID 1848 wrote to memory of 4472 1848 Sysqemyfxsq.exe 105 PID 4472 wrote to memory of 3608 4472 Sysqemgvtyw.exe 106 PID 4472 wrote to memory of 3608 4472 Sysqemgvtyw.exe 106 PID 4472 wrote to memory of 3608 4472 Sysqemgvtyw.exe 106 PID 3608 wrote to memory of 4992 3608 Sysqemvsdlu.exe 107 PID 3608 wrote to memory of 4992 3608 Sysqemvsdlu.exe 107 PID 3608 wrote to memory of 4992 3608 Sysqemvsdlu.exe 107 PID 4992 wrote to memory of 4336 4992 Sysqemqgtbg.exe 108 PID 4992 wrote to memory of 4336 4992 Sysqemqgtbg.exe 108 PID 4992 wrote to memory of 4336 4992 Sysqemqgtbg.exe 108 PID 4336 wrote to memory of 4152 4336 Sysqemvwrbo.exe 109 PID 4336 wrote to memory of 4152 4336 Sysqemvwrbo.exe 109 PID 4336 wrote to memory of 4152 4336 Sysqemvwrbo.exe 109 PID 4152 wrote to memory of 4496 4152 Sysqemfgprv.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe"C:\Users\Admin\AppData\Local\Temp\334a1f04d1081348aafc79fc77335d69d1b9bb3361b7fea015efb101e302d385.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjrzwk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrzwk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgiza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgiza.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqlrd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqlrd.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmbsm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmbsm.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzgxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzgxe.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtrah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtrah.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhrld.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhrld.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhcic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhcic.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqeloa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqeloa.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemovwwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovwwn.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaezry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaezry.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnghmv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnghmv.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrvko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrvko.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqyivk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyivk.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfxsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfxsq.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvtyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvtyw.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvsdlu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvsdlu.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqgtbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgtbg.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvwrbo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwrbo.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgprv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgprv.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemydqpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydqpd.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfxka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfxka.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemivdkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivdkh.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:552 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgsib.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgsib.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyandr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyandr.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxuds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxuds.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkuejq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuejq.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytzrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytzrk.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnmxrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmxrf.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyxwpe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxwpe.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgbhhh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbhhh.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjtai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjtai.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwmvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwmvz.exe"36⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthltg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthltg.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgqwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgqwc.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemseatc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemseatc.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgpoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgpoz.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgpcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgpcz.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemamgcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamgcg.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcauqa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcauqa.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfdyty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfdyty.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajqbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajqbn.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcifww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcifww.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxwvmj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwvmj.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnptnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnptnm.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuefh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuefh.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizxfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizxfh.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxsvgk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxsvgk.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfirli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfirli.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcyylj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyylj.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsgjtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgjtw.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcrzjd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrzjd.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Sysqempmseu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempmseu.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcrkmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrkmu.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvxxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvxxd.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrzve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrzve.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxcyld.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcyld.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwvlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwvlm.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkterk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkterk.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeoteq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeoteq.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjansv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjansv.exe"66⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcirkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcirkl.exe"67⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfvuss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfvuss.exe"68⤵
- Modifies registry class
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkipgx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkipgx.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\Sysqempkebu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkebu.exe"70⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvvyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvvyb.exe"71⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrugws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrugws.exe"72⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxaerr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxaerr.exe"73⤵
- Checks computer location settings
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcnyfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnyfw.exe"74⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkiku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkiku.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuuzim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuuzim.exe"76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtkfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtkfl.exe"77⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbxip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbxip.exe"78⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzobyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzobyw.exe"79⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhanrr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhanrr.exe"80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucumw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucumw.exe"81⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjjcx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjjcx.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecjmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecjmx.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjfsd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjfsd.exe"84⤵
- Modifies registry class
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrijax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrijax.exe"85⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwypaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwypaf.exe"86⤵
- Modifies registry class
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecati.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecati.exe"87⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemonrjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemonrjp.exe"88⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemworwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemworwh.exe"89⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\Sysqemehzhp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehzhp.exe"90⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"91⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzcgpn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcgpn.exe"92⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"93⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzvsdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvsdg.exe"94⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjjcgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjcgi.exe"95⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwemjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwemjz.exe"96⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtiror.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtiror.exe"97⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjcppm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcppm.exe"98⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoewkj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoewkj.exe"99⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Sysqembcase.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembcase.exe"100⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgpufi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpufi.exe"101⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqzldp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzldp.exe"102⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtrlyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrlyt.exe"103⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqsxri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsxri.exe"104⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemefpua.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefpua.exe"105⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlcarl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcarl.exe"106⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\Sysqembwgsg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwgsg.exe"107⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdnzvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdnzvk.exe"108⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoyxlj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoyxlj.exe"109⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\Sysqembottd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembottd.exe"110⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtoeqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtoeqc.exe"111⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\Sysqembpeed.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembpeed.exe"112⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwgyza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgyza.exe"113⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdptzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdptzb.exe"114⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlwpxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwpxy.exe"115⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvduhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvduhc.exe"116⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaqpvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqpvh.exe"117⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Sysqemykuvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemykuvj.exe"118⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdedit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdedit.exe"119⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqgkey.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgkey.exe"120⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyhsjr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhsjr.exe"121⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaghea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaghea.exe"122⤵PID:3504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-