Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
ba2d1086b902c7dd020b6ef246ee36f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba2d1086b902c7dd020b6ef246ee36f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ba2d1086b902c7dd020b6ef246ee36f0_NeikiAnalytics.exe
-
Size
563KB
-
MD5
ba2d1086b902c7dd020b6ef246ee36f0
-
SHA1
efd53015ca9671fb821d3bfd809061d3cba06867
-
SHA256
4149d0428bc035f874909e31561537dd3041ec8114e888172a126a1239c65f7f
-
SHA512
8b1b1f6599d36256fc17622992deb29fdffbeea93c5ff84e7c34d31b57605660bf42a57c1a3554007c3195e455387382c837e78eb8a53fa0dd02bd9505bbdb7f
-
SSDEEP
3072:dCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxk:dqDAwl0xPTMiR9JSSxPUKYGdodH7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemexnus.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemdqqwd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhkych.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemybvem.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjsjaj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemeeios.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjpypq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemoynnd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkgrwm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkzxtt.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhdtle.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemseuij.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzrdko.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembwjvy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemytrgp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemdqpbi.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqfsuo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfjswz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempsiua.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvejbk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhswfu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzpcdm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzfxqm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuvkan.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtjbsx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemweepk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemlbjcb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempkebu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemylbdu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfpfdw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemowylx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwjiol.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemytjtg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemdlhmy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhjbgw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmyvcd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkpgqb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwukzp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkhwpb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemyydqj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsrggd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhfmsn.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzkdpn.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemltasi.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzrpgz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsrmlt.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfdsue.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembusjh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemacmts.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqqaxo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjqoih.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemeggyg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwpxmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnthdg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemukiyy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvjhec.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemijtht.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcvmym.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempxygp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjpwuy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfshnd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnxpin.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxyszx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkauba.exe -
Executes dropped EXE 64 IoCs
pid Process 2900 Sysqemxluxt.exe 2144 Sysqemnlgpu.exe 632 Sysqemnthdg.exe 2560 Sysqemsrmlt.exe 2904 Sysqemxsvgk.exe 3556 Sysqemxlwye.exe 3704 Sysqemarkbt.exe 3756 Sysqemfphqz.exe 3164 Sysqemcvmym.exe 224 Sysqemitjoa.exe 4556 Sysqemhigmr.exe 4432 Sysqemexnus.exe 2640 Sysqemkhwpb.exe 2560 Sysqemmnkrq.exe 2088 Sysqempecca.exe 3708 Sysqemptrhr.exe 2776 Sysqemsagsh.exe 5036 Sysqemugmvw.exe 1724 Sysqemuvkan.exe 2192 Sysqemifqlq.exe 4584 Sysqemseuij.exe 3132 Sysqemxczqw.exe 4512 Sysqemcoult.exe 1628 Sysqemxywzk.exe 4668 Sysqempuwjg.exe 2152 Sysqemaqyhi.exe 2676 Sysqemfdsue.exe 4652 Sysqemhcipw.exe 4784 Sysqempgtir.exe 1148 Sysqempkebu.exe 2964 Sysqemzrjlq.exe 1880 Sysqemehpmx.exe 4024 Sysqemjukzc.exe 1720 Sysqemosqzk.exe 3528 Sysqemzrdko.exe 232 Sysqemfxbxn.exe 4424 Sysqemmmudr.exe 1608 Sysqempxygp.exe 4436 Sysqemptlrf.exe 1216 Sysqemwjiol.exe 2748 Sysqemmyvcd.exe 4556 Sysqemoxkfn.exe 1840 Sysqemjezvo.exe 3156 Sysqemytjtg.exe 4668 Sysqemoytlp.exe 464 Sysqemjpwuy.exe 2676 Sysqemjtjeh.exe 2636 Sysqemhngxq.exe 1720 Sysqemelokd.exe 4756 Sysqemzgcgh.exe 4996 Sysqemyydqj.exe 772 Sysqemlaklg.exe 2872 Sysqemubsry.exe 3876 Sysqembusjh.exe 2788 Sysqemwlume.exe 2344 Sysqemyszpa.exe 4804 Sysqemtjbsx.exe 4412 Sysqemweepk.exe 4860 Sysqembdcqr.exe 4752 Sysqembvmox.exe 4168 Sysqemdqqwd.exe 3120 Sysqemboyjq.exe 4212 Sysqemjpypq.exe 2652 Sysqemnjpcb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjmjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuvkan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlbjcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemijtht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempuwjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemptlrf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdqqwd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzrpgz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwpxmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfphqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfdsue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoxkfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemioxmv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempxehm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhfmsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybvem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjpwuy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemweepk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkauba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvejbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuxvwe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwukzp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltasi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzrjlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfxbxn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyclqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembwjvy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemznsqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemifqlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjukzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjtjeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemelokd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnlkvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfzxj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytrgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemowylx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxlwye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjpypq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnxpin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdlhmy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjovs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkdpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembsrfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnthdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmnkrq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemboyjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxyszx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzpcdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeeios.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxsvgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmudr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemikuvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjhec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjbgw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgtir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmyvcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdqpbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemunpvk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnlgpu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxczqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembdcqr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemosqzk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtjbsx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqqaxo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 2900 3120 ba2d1086b902c7dd020b6ef246ee36f0_NeikiAnalytics.exe 88 PID 3120 wrote to memory of 2900 3120 ba2d1086b902c7dd020b6ef246ee36f0_NeikiAnalytics.exe 88 PID 3120 wrote to memory of 2900 3120 ba2d1086b902c7dd020b6ef246ee36f0_NeikiAnalytics.exe 88 PID 2900 wrote to memory of 2144 2900 Sysqemxluxt.exe 91 PID 2900 wrote to memory of 2144 2900 Sysqemxluxt.exe 91 PID 2900 wrote to memory of 2144 2900 Sysqemxluxt.exe 91 PID 2144 wrote to memory of 632 2144 Sysqemnlgpu.exe 93 PID 2144 wrote to memory of 632 2144 Sysqemnlgpu.exe 93 PID 2144 wrote to memory of 632 2144 Sysqemnlgpu.exe 93 PID 632 wrote to memory of 2560 632 Sysqemnthdg.exe 107 PID 632 wrote to memory of 2560 632 Sysqemnthdg.exe 107 PID 632 wrote to memory of 2560 632 Sysqemnthdg.exe 107 PID 2560 wrote to memory of 2904 2560 Sysqemsrmlt.exe 95 PID 2560 wrote to memory of 2904 2560 Sysqemsrmlt.exe 95 PID 2560 wrote to memory of 2904 2560 Sysqemsrmlt.exe 95 PID 2904 wrote to memory of 3556 2904 Sysqemxsvgk.exe 96 PID 2904 wrote to memory of 3556 2904 Sysqemxsvgk.exe 96 PID 2904 wrote to memory of 3556 2904 Sysqemxsvgk.exe 96 PID 3556 wrote to memory of 3704 3556 Sysqemxlwye.exe 97 PID 3556 wrote to memory of 3704 3556 Sysqemxlwye.exe 97 PID 3556 wrote to memory of 3704 3556 Sysqemxlwye.exe 97 PID 3704 wrote to memory of 3756 3704 Sysqemarkbt.exe 98 PID 3704 wrote to memory of 3756 3704 Sysqemarkbt.exe 98 PID 3704 wrote to memory of 3756 3704 Sysqemarkbt.exe 98 PID 3756 wrote to memory of 3164 3756 Sysqemfphqz.exe 99 PID 3756 wrote to memory of 3164 3756 Sysqemfphqz.exe 99 PID 3756 wrote to memory of 3164 3756 Sysqemfphqz.exe 99 PID 3164 wrote to memory of 224 3164 Sysqemcvmym.exe 101 PID 3164 wrote to memory of 224 3164 Sysqemcvmym.exe 101 PID 3164 wrote to memory of 224 3164 Sysqemcvmym.exe 101 PID 224 wrote to memory of 4556 224 Sysqemitjoa.exe 103 PID 224 wrote to memory of 4556 224 Sysqemitjoa.exe 103 PID 224 wrote to memory of 4556 224 Sysqemitjoa.exe 103 PID 4556 wrote to memory of 4432 4556 Sysqemhigmr.exe 104 PID 4556 wrote to memory of 4432 4556 Sysqemhigmr.exe 104 PID 4556 wrote to memory of 4432 4556 Sysqemhigmr.exe 104 PID 4432 wrote to memory of 2640 4432 Sysqemexnus.exe 105 PID 4432 wrote to memory of 2640 4432 Sysqemexnus.exe 105 PID 4432 wrote to memory of 2640 4432 Sysqemexnus.exe 105 PID 2640 wrote to memory of 2560 2640 Sysqemkhwpb.exe 107 PID 2640 wrote to memory of 2560 2640 Sysqemkhwpb.exe 107 PID 2640 wrote to memory of 2560 2640 Sysqemkhwpb.exe 107 PID 2560 wrote to memory of 2088 2560 Sysqemmnkrq.exe 108 PID 2560 wrote to memory of 2088 2560 Sysqemmnkrq.exe 108 PID 2560 wrote to memory of 2088 2560 Sysqemmnkrq.exe 108 PID 2088 wrote to memory of 3708 2088 Sysqempecca.exe 109 PID 2088 wrote to memory of 3708 2088 Sysqempecca.exe 109 PID 2088 wrote to memory of 3708 2088 Sysqempecca.exe 109 PID 3708 wrote to memory of 2776 3708 Sysqemptrhr.exe 111 PID 3708 wrote to memory of 2776 3708 Sysqemptrhr.exe 111 PID 3708 wrote to memory of 2776 3708 Sysqemptrhr.exe 111 PID 2776 wrote to memory of 5036 2776 Sysqemsagsh.exe 112 PID 2776 wrote to memory of 5036 2776 Sysqemsagsh.exe 112 PID 2776 wrote to memory of 5036 2776 Sysqemsagsh.exe 112 PID 5036 wrote to memory of 1724 5036 Sysqemugmvw.exe 113 PID 5036 wrote to memory of 1724 5036 Sysqemugmvw.exe 113 PID 5036 wrote to memory of 1724 5036 Sysqemugmvw.exe 113 PID 1724 wrote to memory of 2192 1724 Sysqemuvkan.exe 114 PID 1724 wrote to memory of 2192 1724 Sysqemuvkan.exe 114 PID 1724 wrote to memory of 2192 1724 Sysqemuvkan.exe 114 PID 2192 wrote to memory of 4584 2192 Sysqemifqlq.exe 115 PID 2192 wrote to memory of 4584 2192 Sysqemifqlq.exe 115 PID 2192 wrote to memory of 4584 2192 Sysqemifqlq.exe 115 PID 4584 wrote to memory of 3132 4584 Sysqemseuij.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba2d1086b902c7dd020b6ef246ee36f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ba2d1086b902c7dd020b6ef246ee36f0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxluxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxluxt.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnlgpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlgpu.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnthdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnthdg.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrmlt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrmlt.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxsvgk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxsvgk.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxlwye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxlwye.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemarkbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemarkbt.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfphqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfphqz.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvmym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvmym.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitjoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitjoa.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhigmr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhigmr.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexnus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexnus.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhwpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhwpb.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnkrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnkrq.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Sysqempecca.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempecca.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptrhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptrhr.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsagsh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsagsh.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugmvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugmvw.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvkan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvkan.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemifqlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemifqlq.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemseuij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemseuij.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxczqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxczqw.exe"23⤵
- Executes dropped EXE
- Modifies registry class
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcoult.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcoult.exe"24⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxywzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxywzk.exe"25⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Sysqempuwjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempuwjg.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqyhi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqyhi.exe"27⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfdsue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfdsue.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhcipw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhcipw.exe"29⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgtir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgtir.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\Sysqempkebu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkebu.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrjlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrjlq.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehpmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehpmx.exe"33⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjukzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjukzc.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosqzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosqzk.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrdko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrdko.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxbxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxbxn.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmudr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmudr.exe"38⤵
- Executes dropped EXE
- Modifies registry class
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Sysqempxygp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxygp.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptlrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptlrf.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjiol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjiol.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmyvcd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmyvcd.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoxkfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxkfn.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjezvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjezvo.exe"44⤵
- Executes dropped EXE
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytjtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytjtg.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoytlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoytlp.exe"46⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpwuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpwuy.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjtjeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtjeh.exe"48⤵
- Executes dropped EXE
- Modifies registry class
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhngxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhngxq.exe"49⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemelokd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemelokd.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgcgh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgcgh.exe"51⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyydqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyydqj.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlaklg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlaklg.exe"53⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubsry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubsry.exe"54⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Sysqembusjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembusjh.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlume.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlume.exe"56⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"57⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjbsx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjbsx.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemweepk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemweepk.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdcqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdcqr.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqembvmox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvmox.exe"61⤵
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqqwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqqwd.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemboyjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemboyjq.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpypq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpypq.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjpcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjpcb.exe"65⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoynnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoynnd.exe"66⤵
- Checks computer location settings
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwjvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwjvy.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqefbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqefbk.exe"68⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\Sysqemashdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemashdu.exe"69⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemllfok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllfok.exe"70⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdlhmy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlhmy.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemderkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemderkd.exe"72⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgzvsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgzvsk.exe"73⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyclqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyclqx.exe"74⤵
- Modifies registry class
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfshnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfshnd.exe"75⤵
- Checks computer location settings
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqpbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqpbi.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacmts.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacmts.exe"77⤵
- Checks computer location settings
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemioxmv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemioxmv.exe"78⤵
- Modifies registry class
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbjcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbjcb.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemikuvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikuvj.exe"80⤵
- Modifies registry class
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxpin.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxpin.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytrgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytrgp.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemylbdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemylbdu.exe"83⤵
- Checks computer location settings
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjhec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjhec.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkgrwm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkgrwm.exe"85⤵
- Checks computer location settings
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqqaxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqaxo.exe"86⤵
- Checks computer location settings
- Modifies registry class
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffscg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffscg.exe"87⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemixlyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixlyr.exe"88⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfriyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfriyt.exe"89⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfjswz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjswz.exe"90⤵
- Checks computer location settings
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyszx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyszx.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiqjkn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqjkn.exe"92⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemijtht.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijtht.exe"93⤵
- Checks computer location settings
- Modifies registry class
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnlkvd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlkvd.exe"94⤵
- Modifies registry class
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvpvng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvpvng.exe"95⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvejbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvejbk.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrggd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrggd.exe"97⤵
- Checks computer location settings
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuxvwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxvwe.exe"98⤵
- Modifies registry class
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxpwrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxpwrh.exe"99⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxhypv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhypv.exe"100⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhswfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhswfu.exe"101⤵
- Checks computer location settings
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkych.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkych.exe"102⤵
- Checks computer location settings
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemujctc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemujctc.exe"103⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\Sysqemunpvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunpvk.exe"104⤵
- Modifies registry class
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhdtle.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhdtle.exe"105⤵
- Checks computer location settings
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkzxtt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkzxtt.exe"106⤵
- Checks computer location settings
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemapkhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapkhl.exe"107⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\Sysqempxehm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxehm.exe"108⤵
- Modifies registry class
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhxhfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxhfl.exe"109⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkpgqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpgqb.exe"110⤵
- Checks computer location settings
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsusd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsusd.exe"111⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxjovs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjovs.exe"112⤵
- Modifies registry class
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjbgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjbgw.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkauba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkauba.exe"114⤵
- Checks computer location settings
- Modifies registry class
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjmjo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjmjo.exe"115⤵
- Modifies registry class
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemprbpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprbpu.exe"116⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuedcy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuedcy.exe"117⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcxduh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxduh.exe"118⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxkukt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkukt.exe"119⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfpfdw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpfdw.exe"120⤵
- Checks computer location settings
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqoih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqoih.exe"121⤵
- Checks computer location settings
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzyjwz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzyjwz.exe"122⤵PID:1244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-