Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 16:48
Behavioral task
behavioral1
Sample
9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe
-
Size
620KB
-
MD5
9610cacbd2795b4efcddf38b49ff88f0
-
SHA1
95b45f1b7ca8092142788bc8b6962283ef950a8f
-
SHA256
340d2ec969d047ccbcfd86213216159ed2c38ff5d3749ac685efe121d4cb0548
-
SHA512
fe89107210eacf2aaa041e2bdef5c0a39b241e6024bcc660bf9725fb6e8aca18e78f990258db1b8e2714dd88963543a0fce23187d6374f4ca6192c02eb231fea
-
SSDEEP
3072:uCaoAs101Pol0xPTM7mRCAdJSSxPUkl3Vn2ZMQTCk/dN92sdNhavtrVdewnAx3w4:uqDAwl0xPTMiR9JSSxPUKl0dodHBwS6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxnwgq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfypzc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsqrus.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnflcf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfaqjb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjplac.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwajrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemyurik.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembtukj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempeswx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemoynnd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemntlju.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcnmyl.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempbaal.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzjklw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemspedr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuovwg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemubwwv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuhlmr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemthxvf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqzlgf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqwjrx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemakbni.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemapufr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhqran.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrgkoo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtpkpw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemoralk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwttvb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembalhq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuphpb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjcpun.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnjgwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmmbez.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjnvka.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemteybz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxnvjv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrvtqq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemeousf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfbsjc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkdies.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzizac.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemlpnmv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemiplun.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxyngd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemafipy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcyzbx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkrqis.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemlonka.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemgqmlh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemystyo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemghrjf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvukyw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemujxnd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhqmxj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwyhpj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhinzh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemboslp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemprgtz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtbyec.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrfzst.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemibnmf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemdthpv.exe -
Executes dropped EXE 64 IoCs
pid Process 4880 Sysqempoiiv.exe 3956 Sysqemkuzxi.exe 1200 Sysqemnafix.exe 4556 Sysqemkrqis.exe 4708 Sysqemidlvj.exe 1976 Sysqempeswx.exe 4732 Sysqemzvvto.exe 672 Sysqemfbsjc.exe 3744 Sysqemkdies.exe 5048 Sysqemnflcf.exe 3424 Sysqemrwiob.exe 3008 Sysqemxqcre.exe 2732 Sysqemcozzr.exe 4204 Sysqemksjnj.exe 448 Sysqemraenv.exe 2036 Sysqemhqran.exe 1696 Sysqemspedr.exe 4856 Sysqemczvtq.exe 3004 Sysqemuovwg.exe 5028 Sysqemsaawq.exe 2988 Sysqemxnvjv.exe 3832 Sysqemzizac.exe 4660 Sysqemxcwsd.exe 1136 Sysqempcido.exe 3524 Sysqemfaqjb.exe 1736 Sysqemphdtx.exe 1088 Sysqemrgkoo.exe 648 Sysqemubwwv.exe 3876 Sysqemrkiku.exe 3124 Sysqemujxnd.exe 2904 Sysqemzsonf.exe 2576 Sysqemhadtl.exe 4740 Sysqemurhtz.exe 4272 Sysqemucvrh.exe 1668 Sysqemhinzh.exe 4580 Sysqemwbtac.exe 912 Sysqemjplac.exe 4432 Sysqemjwafi.exe 672 Sysqemrxili.exe 4688 Sysqemouqyn.exe 3944 Sysqemuhlmr.exe 2848 Sysqemegqwv.exe 4700 Sysqemtpkpw.exe 4072 Sysqemlpnmv.exe 2416 Sysqemupvsn.exe 4596 Sysqembavlw.exe 3744 Sysqemoccgt.exe 4296 Sysqemoralk.exe 4052 Sysqemtpfty.exe 5088 Sysqemyczgd.exe 3936 Sysqemjjfrh.exe 2668 Sysqemufhpa.exe 408 Sysqemwajrv.exe 1224 Sysqemjcpun.exe 1536 Sysqemgwkid.exe 4268 Sysqemwttvb.exe 4812 Sysqemtcmvo.exe 864 Sysqemlcptn.exe 4740 Sysqemrokos.exe 464 Sysqemyegly.exe 5028 Sysqemqwjrx.exe 2824 Sysqembalhq.exe 5096 Sysqemlonka.exe 2732 Sysqemoynnd.exe -
resource yara_rule behavioral2/memory/3544-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000023559-6.dat upx behavioral2/files/0x0008000000023556-41.dat upx behavioral2/memory/4880-42-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002355a-72.dat upx behavioral2/memory/3956-74-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002355b-108.dat upx behavioral2/files/0x0008000000023557-143.dat upx behavioral2/memory/4556-145-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000800000002355c-179.dat upx behavioral2/memory/3544-209-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a00000002355e-215.dat upx behavioral2/files/0x000900000002330c-250.dat upx behavioral2/memory/3956-284-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000023306-286.dat upx behavioral2/memory/672-288-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0008000000023322-322.dat upx behavioral2/memory/1200-328-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0005000000022975-358.dat upx behavioral2/memory/5048-360-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4556-365-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000023562-395.dat upx behavioral2/files/0x000a0000000232ff-430.dat upx behavioral2/memory/4708-431-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3008-433-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000900000002331b-467.dat upx behavioral2/memory/1976-469-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000900000002331d-503.dat upx behavioral2/memory/4732-509-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/672-534-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000023321-540.dat upx behavioral2/memory/3744-546-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5048-571-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000b000000023325-577.dat upx behavioral2/memory/3424-586-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3008-608-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000023326-614.dat upx behavioral2/memory/2732-616-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4204-645-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000023327-651.dat upx behavioral2/memory/448-680-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3004-686-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2036-692-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1696-747-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4856-780-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3832-786-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3004-814-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5028-823-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2988-874-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3832-913-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4660-946-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1136-979-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3524-1012-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1736-1045-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1088-1078-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2904-1084-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/648-1112-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3876-1121-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4740-1151-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3124-1155-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2904-1215-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2576-1253-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4740-1286-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4272-1316-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuovwg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuphpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemidlvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembalhq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkozpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcyzbx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlpnmv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchpyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfrccd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnjgwm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemomouk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempoiiv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempeswx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqodku.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemapufr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzvvto.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemegqwv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemupvsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsipmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemibnmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemystyo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiplun.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemajwfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxmhjz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcozzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqmlh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembjkrx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwbtac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuhlmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgwkid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyzgpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemghrjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemslcpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemikpkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrxili.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoccgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembfofk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzlgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemphkag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtadlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyurik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtphbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxyngd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmbez.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxwic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxqcre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemraenv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempcido.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjjfrh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlonka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemakbni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrvtqq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwttvb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemioqar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqbwqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzjklw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwyhpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemusxqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemenzta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrwiob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemksjnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczvtq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxnvjv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvbxxz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4880 3544 9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe 90 PID 3544 wrote to memory of 4880 3544 9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe 90 PID 3544 wrote to memory of 4880 3544 9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe 90 PID 4880 wrote to memory of 3956 4880 Sysqempoiiv.exe 92 PID 4880 wrote to memory of 3956 4880 Sysqempoiiv.exe 92 PID 4880 wrote to memory of 3956 4880 Sysqempoiiv.exe 92 PID 3956 wrote to memory of 1200 3956 Sysqemkuzxi.exe 93 PID 3956 wrote to memory of 1200 3956 Sysqemkuzxi.exe 93 PID 3956 wrote to memory of 1200 3956 Sysqemkuzxi.exe 93 PID 1200 wrote to memory of 4556 1200 Sysqemnafix.exe 94 PID 1200 wrote to memory of 4556 1200 Sysqemnafix.exe 94 PID 1200 wrote to memory of 4556 1200 Sysqemnafix.exe 94 PID 4556 wrote to memory of 4708 4556 Sysqemkrqis.exe 95 PID 4556 wrote to memory of 4708 4556 Sysqemkrqis.exe 95 PID 4556 wrote to memory of 4708 4556 Sysqemkrqis.exe 95 PID 4708 wrote to memory of 1976 4708 Sysqemidlvj.exe 97 PID 4708 wrote to memory of 1976 4708 Sysqemidlvj.exe 97 PID 4708 wrote to memory of 1976 4708 Sysqemidlvj.exe 97 PID 1976 wrote to memory of 4732 1976 Sysqempeswx.exe 98 PID 1976 wrote to memory of 4732 1976 Sysqempeswx.exe 98 PID 1976 wrote to memory of 4732 1976 Sysqempeswx.exe 98 PID 4732 wrote to memory of 672 4732 Sysqemzvvto.exe 99 PID 4732 wrote to memory of 672 4732 Sysqemzvvto.exe 99 PID 4732 wrote to memory of 672 4732 Sysqemzvvto.exe 99 PID 672 wrote to memory of 3744 672 Sysqemfbsjc.exe 100 PID 672 wrote to memory of 3744 672 Sysqemfbsjc.exe 100 PID 672 wrote to memory of 3744 672 Sysqemfbsjc.exe 100 PID 3744 wrote to memory of 5048 3744 Sysqemkdies.exe 101 PID 3744 wrote to memory of 5048 3744 Sysqemkdies.exe 101 PID 3744 wrote to memory of 5048 3744 Sysqemkdies.exe 101 PID 5048 wrote to memory of 3424 5048 Sysqemnflcf.exe 102 PID 5048 wrote to memory of 3424 5048 Sysqemnflcf.exe 102 PID 5048 wrote to memory of 3424 5048 Sysqemnflcf.exe 102 PID 3424 wrote to memory of 3008 3424 Sysqemrwiob.exe 103 PID 3424 wrote to memory of 3008 3424 Sysqemrwiob.exe 103 PID 3424 wrote to memory of 3008 3424 Sysqemrwiob.exe 103 PID 3008 wrote to memory of 2732 3008 Sysqemxqcre.exe 104 PID 3008 wrote to memory of 2732 3008 Sysqemxqcre.exe 104 PID 3008 wrote to memory of 2732 3008 Sysqemxqcre.exe 104 PID 2732 wrote to memory of 4204 2732 Sysqemcozzr.exe 106 PID 2732 wrote to memory of 4204 2732 Sysqemcozzr.exe 106 PID 2732 wrote to memory of 4204 2732 Sysqemcozzr.exe 106 PID 4204 wrote to memory of 448 4204 Sysqemksjnj.exe 107 PID 4204 wrote to memory of 448 4204 Sysqemksjnj.exe 107 PID 4204 wrote to memory of 448 4204 Sysqemksjnj.exe 107 PID 448 wrote to memory of 2036 448 Sysqemraenv.exe 108 PID 448 wrote to memory of 2036 448 Sysqemraenv.exe 108 PID 448 wrote to memory of 2036 448 Sysqemraenv.exe 108 PID 2036 wrote to memory of 1696 2036 Sysqemhqran.exe 109 PID 2036 wrote to memory of 1696 2036 Sysqemhqran.exe 109 PID 2036 wrote to memory of 1696 2036 Sysqemhqran.exe 109 PID 1696 wrote to memory of 4856 1696 Sysqemspedr.exe 110 PID 1696 wrote to memory of 4856 1696 Sysqemspedr.exe 110 PID 1696 wrote to memory of 4856 1696 Sysqemspedr.exe 110 PID 4856 wrote to memory of 3004 4856 Sysqemczvtq.exe 111 PID 4856 wrote to memory of 3004 4856 Sysqemczvtq.exe 111 PID 4856 wrote to memory of 3004 4856 Sysqemczvtq.exe 111 PID 3004 wrote to memory of 5028 3004 Sysqemuovwg.exe 112 PID 3004 wrote to memory of 5028 3004 Sysqemuovwg.exe 112 PID 3004 wrote to memory of 5028 3004 Sysqemuovwg.exe 112 PID 5028 wrote to memory of 2988 5028 Sysqemsaawq.exe 113 PID 5028 wrote to memory of 2988 5028 Sysqemsaawq.exe 113 PID 5028 wrote to memory of 2988 5028 Sysqemsaawq.exe 113 PID 2988 wrote to memory of 3832 2988 Sysqemxnvjv.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9610cacbd2795b4efcddf38b49ff88f0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\Sysqempoiiv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempoiiv.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnafix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnafix.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrqis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrqis.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidlvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidlvj.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\Sysqempeswx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempeswx.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvvto.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvvto.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfbsjc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfbsjc.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdies.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdies.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnflcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnflcf.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwiob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwiob.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxqcre.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqcre.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcozzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcozzr.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemraenv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemraenv.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhqran.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqran.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemspedr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspedr.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemczvtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczvtq.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuovwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuovwg.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsaawq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsaawq.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnvjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnvjv.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzizac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzizac.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxcwsd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcwsd.exe"24⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Sysqempcido.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempcido.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfaqjb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfaqjb.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphdtx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphdtx.exe"27⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgkoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgkoo.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubwwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubwwv.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkiku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkiku.exe"30⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemujxnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemujxnd.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzsonf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzsonf.exe"32⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhadtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhadtl.exe"33⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemurhtz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemurhtz.exe"34⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucvrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucvrh.exe"35⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhinzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhinzh.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbtac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbtac.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjplac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjplac.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwafi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwafi.exe"39⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxili.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxili.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemouqyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemouqyn.exe"41⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuhlmr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhlmr.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemegqwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemegqwv.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpkpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpkpw.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlpnmv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlpnmv.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemupvsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupvsn.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Sysqembavlw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembavlw.exe"47⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoccgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoccgt.exe"48⤵
- Executes dropped EXE
- Modifies registry class
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoralk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoralk.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpfty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpfty.exe"50⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyczgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyczgd.exe"51⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjjfrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjfrh.exe"52⤵
- Executes dropped EXE
- Modifies registry class
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemufhpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemufhpa.exe"53⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwajrv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwajrv.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcpun.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcpun.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgwkid.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgwkid.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwttvb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwttvb.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtcmvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtcmvo.exe"58⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcptn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcptn.exe"59⤵
- Executes dropped EXE
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrokos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrokos.exe"60⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyegly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyegly.exe"61⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwjrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwjrx.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\Sysqembalhq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembalhq.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlonka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlonka.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoynnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoynnd.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthxvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthxvf.exe"66⤵
- Checks computer location settings
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyurik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyurik.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwhdh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwhdh.exe"68⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgqmlh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqmlh.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtphbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtphbc.exe"70⤵
- Modifies registry class
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsipmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsipmk.exe"71⤵
- Modifies registry class
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemibnmf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemibnmf.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdthpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdthpv.exe"73⤵
- Checks computer location settings
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyzgpj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyzgpj.exe"74⤵
- Modifies registry class
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfofk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfofk.exe"75⤵
- Modifies registry class
PID:444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzlgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzlgf.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemystyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemystyo.exe"77⤵
- Checks computer location settings
- Modifies registry class
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghrjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghrjf.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtbyec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbyec.exe"79⤵
- Checks computer location settings
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqodku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqodku.exe"80⤵
- Modifies registry class
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbxxz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbxxz.exe"81⤵
- Modifies registry class
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemioqar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemioqar.exe"82⤵
- Modifies registry class
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqhqlr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqhqlr.exe"83⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvukyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvukyw.exe"84⤵
- Checks computer location settings
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalpzs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalpzs.exe"85⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfjvus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjvus.exe"86⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Sysqemslcpp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslcpp.exe"87⤵
- Modifies registry class
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiplun.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiplun.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilzfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilzfv.exe"89⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxnwgq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnwgq.exe"90⤵
- Checks computer location settings
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbwqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbwqm.exe"91⤵
- Modifies registry class
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchpyu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchpyu.exe"92⤵
- Modifies registry class
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkrwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkrwn.exe"93⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsxljs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsxljs.exe"94⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemafipy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafipy.exe"95⤵
- Checks computer location settings
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfrccd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrccd.exe"96⤵
- Modifies registry class
PID:332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajwfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajwfs.exe"97⤵
- Modifies registry class
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhanm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhanm.exe"98⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkikaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkikaq.exe"99⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhvnov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvnov.exe"100⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\Sysqemntlju.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntlju.exe"101⤵
- Checks computer location settings
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcyuos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyuos.exe"102⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemikpkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikpkx.exe"103⤵
- Modifies registry class
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakbni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakbni.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphkag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphkag.exe"105⤵
- Modifies registry class
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemplxdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplxdo.exe"106⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcnmyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnmyl.exe"107⤵
- Checks computer location settings
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjgwm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjgwm.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfypzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfypzc.exe"109⤵
- Checks computer location settings
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxmhjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmhjz.exe"110⤵
- Modifies registry class
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfvpk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfvpk.exe"111⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapufr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapufr.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkozpn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkozpn.exe"113⤵
- Modifies registry class
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkevnt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkevnt.exe"114⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Sysqemusxqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemusxqc.exe"115⤵
- Modifies registry class
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyngd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyngd.exe"116⤵
- Checks computer location settings
- Modifies registry class
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnnju.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnnju.exe"117⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsqrus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqrus.exe"118⤵
- Checks computer location settings
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuphpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuphpb.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeousf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeousf.exe"120⤵
- Checks computer location settings
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrfzst.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfzst.exe"121⤵
- Checks computer location settings
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzjklw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjklw.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:2748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-