Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe
-
Size
87KB
-
MD5
da6d1b2bed0833317d04a44f3b1c49c0
-
SHA1
a13dcfc1d0a31f9eafee412321982320efebf4b1
-
SHA256
d7e9d88503306f8ee6017abffb1783a111fa7c86f3e705445ab013c630df9d1f
-
SHA512
a13d5ddf7ad2e78c9007c1c65c70ab7847ef8520cc9519aff23040df9514901665fae0bc07b2cedbab10e05b200bf0db69ea77248653dedf51fa89ac2130fcdb
-
SSDEEP
1536:gzfMMkPZE1J7S6/PMj42VJEY4ujMepJtANuOAl0QQsIEySYndfcu:mfMNE1JG6XMk27EbpOthl0ZUed0u
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemupbtd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfpwkd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemruhbd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxhbpi.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembnsvm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrjhpy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjyrya.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvhhar.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjrdtt.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxistx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcjqzn.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkovwh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzhcym.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemynbva.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwjnaf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwqlyw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuzgqp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxcwsd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsoqdv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemplsro.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemabcaw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqhsym.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsdoli.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempdxvs.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemgrfqy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqeminhyv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmyiox.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqementhg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqdcaj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzbdvf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmvwtb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempzvtd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkioal.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcizdc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuanjf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemdbbbc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrfcsp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemeyfqz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemgaqzh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempctsc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwylas.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuarkk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjhnim.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemdvkbg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfzqwu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemswagt.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhsjba.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemskxky.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempxujy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzwnhy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcpnno.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemymhco.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcumtu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhbnlm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemugnho.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemlbjcb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemaizdd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemigqwp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcyuos.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnxuvu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemadwhi.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkdlhj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemepasu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemccdas.exe -
Executes dropped EXE 64 IoCs
pid Process 2356 Sysqemfpumx.exe 716 Sysqemcjqzn.exe 4084 Sysqemfpwkd.exe 3068 Sysqempdxvs.exe 3784 Sysqemzkjsd.exe 1116 Sysqemkuzxi.exe 1580 Sysqemnxuvu.exe 4060 Sysqemsgkql.exe 5096 Sysqemccdas.exe 4648 Sysqemcumtu.exe 3492 Sysqemhsjba.exe 4964 Sysqemsoktp.exe 3920 Sysqemsdxgt.exe 4616 Sysqemadwhi.exe 2408 Sysqemffebq.exe 4056 Sysqemkovwh.exe 1360 Sysqemskxky.exe 4644 Sysqemzohph.exe 3724 Sysqemkdlhj.exe 4044 Sysqemucyfc.exe 4460 Sysqemfunkh.exe 3068 Sysqemmfndp.exe 1064 Sysqemzhcym.exe 2760 Sysqemegayu.exe 2580 Sysqemuzgqp.exe 3904 Sysqemhbnlm.exe 1468 Sysqemrmdjt.exe 4976 Sysqemwyywy.exe 4896 Sysqemabcaw.exe 1344 Sysqemxcwsd.exe 4804 Sysqemkioal.exe 4552 Sysqempdhdd.exe 3580 Sysqemcizdc.exe 1076 Sysqemjqwji.exe 388 Sysqemruhbd.exe 4676 Sysqemxhbpi.exe 3256 Sysqemhopam.exe 3212 Sysqemepasu.exe 4396 Sysqemubhdr.exe 536 Sysqembnsvm.exe 1384 Sysqemhpbeo.exe 3028 Sysqembrguo.exe 1652 Sysqemzwnhy.exe 3960 Sysqementhg.exe 4812 Sysqemhxmkk.exe 3792 Sysqemcpnno.exe 4788 Sysqemeyfqz.exe 2012 Sysqemojegy.exe 2252 Sysqemeccgt.exe 4964 Sysqemwcfes.exe 540 Sysqemuanjf.exe 4748 Sysqemhccec.exe 4024 Sysqemrjhpy.exe 536 Sysqemrfcsp.exe 5096 Sysqemjyrya.exe 3184 Sysqemgkmly.exe 4308 Sysqemynbva.exe 1852 Sysqemjrdtt.exe 1404 Sysqemodxhy.exe 2180 Sysqemjjows.exe 232 Sysqemtbsml.exe 4348 Sysqemgdhhi.exe 452 Sysqemglinu.exe 3164 Sysqembdcqr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzohph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmfndp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwnhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjjows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtbsml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnwnpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqeminhyv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemakbni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemffebq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjrdtt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlbjcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmlhfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkuzxi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkdlhj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxcwsd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyfqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemigqwp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzbdvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempzvtd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsgkql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcizdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlktyh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdxvs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemabcaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemruhbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqaaox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsoqdv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjzqvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsdxgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwyywy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtstge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhbnlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeccgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsndyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwqlyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcjqzn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemccdas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjqwji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqementhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrfqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbbbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemszpjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxiysr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaugab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfsmai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcypau.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkjsd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtdam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaizdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxistx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemghqac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemadwhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzgqp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrjhpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemynbva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemglinu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoqfen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemambff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcnhtg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvpvng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempnowf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmtgdu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnxuvu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2356 2408 da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe 90 PID 2408 wrote to memory of 2356 2408 da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe 90 PID 2408 wrote to memory of 2356 2408 da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe 90 PID 2356 wrote to memory of 716 2356 Sysqemfpumx.exe 93 PID 2356 wrote to memory of 716 2356 Sysqemfpumx.exe 93 PID 2356 wrote to memory of 716 2356 Sysqemfpumx.exe 93 PID 716 wrote to memory of 4084 716 Sysqemcjqzn.exe 94 PID 716 wrote to memory of 4084 716 Sysqemcjqzn.exe 94 PID 716 wrote to memory of 4084 716 Sysqemcjqzn.exe 94 PID 4084 wrote to memory of 3068 4084 Sysqemfpwkd.exe 95 PID 4084 wrote to memory of 3068 4084 Sysqemfpwkd.exe 95 PID 4084 wrote to memory of 3068 4084 Sysqemfpwkd.exe 95 PID 3068 wrote to memory of 3784 3068 Sysqempdxvs.exe 96 PID 3068 wrote to memory of 3784 3068 Sysqempdxvs.exe 96 PID 3068 wrote to memory of 3784 3068 Sysqempdxvs.exe 96 PID 3784 wrote to memory of 1116 3784 Sysqemzkjsd.exe 97 PID 3784 wrote to memory of 1116 3784 Sysqemzkjsd.exe 97 PID 3784 wrote to memory of 1116 3784 Sysqemzkjsd.exe 97 PID 1116 wrote to memory of 1580 1116 Sysqemkuzxi.exe 98 PID 1116 wrote to memory of 1580 1116 Sysqemkuzxi.exe 98 PID 1116 wrote to memory of 1580 1116 Sysqemkuzxi.exe 98 PID 1580 wrote to memory of 4060 1580 Sysqemnxuvu.exe 100 PID 1580 wrote to memory of 4060 1580 Sysqemnxuvu.exe 100 PID 1580 wrote to memory of 4060 1580 Sysqemnxuvu.exe 100 PID 4060 wrote to memory of 5096 4060 Sysqemsgkql.exe 101 PID 4060 wrote to memory of 5096 4060 Sysqemsgkql.exe 101 PID 4060 wrote to memory of 5096 4060 Sysqemsgkql.exe 101 PID 5096 wrote to memory of 4648 5096 Sysqemccdas.exe 102 PID 5096 wrote to memory of 4648 5096 Sysqemccdas.exe 102 PID 5096 wrote to memory of 4648 5096 Sysqemccdas.exe 102 PID 4648 wrote to memory of 3492 4648 Sysqemcumtu.exe 103 PID 4648 wrote to memory of 3492 4648 Sysqemcumtu.exe 103 PID 4648 wrote to memory of 3492 4648 Sysqemcumtu.exe 103 PID 3492 wrote to memory of 4964 3492 Sysqemhsjba.exe 104 PID 3492 wrote to memory of 4964 3492 Sysqemhsjba.exe 104 PID 3492 wrote to memory of 4964 3492 Sysqemhsjba.exe 104 PID 4964 wrote to memory of 3920 4964 Sysqemsoktp.exe 105 PID 4964 wrote to memory of 3920 4964 Sysqemsoktp.exe 105 PID 4964 wrote to memory of 3920 4964 Sysqemsoktp.exe 105 PID 3920 wrote to memory of 4616 3920 Sysqemsdxgt.exe 106 PID 3920 wrote to memory of 4616 3920 Sysqemsdxgt.exe 106 PID 3920 wrote to memory of 4616 3920 Sysqemsdxgt.exe 106 PID 4616 wrote to memory of 2408 4616 Sysqemadwhi.exe 107 PID 4616 wrote to memory of 2408 4616 Sysqemadwhi.exe 107 PID 4616 wrote to memory of 2408 4616 Sysqemadwhi.exe 107 PID 2408 wrote to memory of 4056 2408 Sysqemffebq.exe 108 PID 2408 wrote to memory of 4056 2408 Sysqemffebq.exe 108 PID 2408 wrote to memory of 4056 2408 Sysqemffebq.exe 108 PID 4056 wrote to memory of 1360 4056 Sysqemkovwh.exe 110 PID 4056 wrote to memory of 1360 4056 Sysqemkovwh.exe 110 PID 4056 wrote to memory of 1360 4056 Sysqemkovwh.exe 110 PID 1360 wrote to memory of 4644 1360 Sysqemskxky.exe 111 PID 1360 wrote to memory of 4644 1360 Sysqemskxky.exe 111 PID 1360 wrote to memory of 4644 1360 Sysqemskxky.exe 111 PID 4644 wrote to memory of 3724 4644 Sysqemzohph.exe 112 PID 4644 wrote to memory of 3724 4644 Sysqemzohph.exe 112 PID 4644 wrote to memory of 3724 4644 Sysqemzohph.exe 112 PID 3724 wrote to memory of 4044 3724 Sysqemkdlhj.exe 113 PID 3724 wrote to memory of 4044 3724 Sysqemkdlhj.exe 113 PID 3724 wrote to memory of 4044 3724 Sysqemkdlhj.exe 113 PID 4044 wrote to memory of 4460 4044 Sysqemucyfc.exe 114 PID 4044 wrote to memory of 4460 4044 Sysqemucyfc.exe 114 PID 4044 wrote to memory of 4460 4044 Sysqemucyfc.exe 114 PID 4460 wrote to memory of 3068 4460 Sysqemfunkh.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\da6d1b2bed0833317d04a44f3b1c49c0_NeikiAnalytics.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpumx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpumx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcjqzn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjqzn.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpwkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpwkd.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdxvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdxvs.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzkjsd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkjsd.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxuvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxuvu.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsgkql.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgkql.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemccdas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccdas.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcumtu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcumtu.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhsjba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhsjba.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsoktp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsoktp.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsdxgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdxgt.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemadwhi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemadwhi.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffebq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffebq.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkovwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkovwh.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemskxky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemskxky.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzohph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzohph.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdlhj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdlhj.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucyfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucyfc.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfunkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfunkh.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfndp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfndp.exe"23⤵
- Executes dropped EXE
- Modifies registry class
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhcym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhcym.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemegayu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemegayu.exe"25⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzgqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzgqp.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbnlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbnlm.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrmdjt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmdjt.exe"28⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwyywy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyywy.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemabcaw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabcaw.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxcwsd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcwsd.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkioal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkioal.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdhdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdhdd.exe"33⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcizdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcizdc.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemruhbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemruhbd.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhbpi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhbpi.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhopam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhopam.exe"38⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemepasu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemepasu.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubhdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubhdr.exe"40⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnsvm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnsvm.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhpbeo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhpbeo.exe"42⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrguo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrguo.exe"43⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzwnhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwnhy.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Sysqementhg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqementhg.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhxmkk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxmkk.exe"46⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpnno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpnno.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyfqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyfqz.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojegy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojegy.exe"49⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeccgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeccgt.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwcfes.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwcfes.exe"51⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuanjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuanjf.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhccec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhccec.exe"53⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrjhpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrjhpy.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrfcsp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfcsp.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjyrya.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjyrya.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkmly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkmly.exe"57⤵
- Executes dropped EXE
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemynbva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemynbva.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjrdtt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrdtt.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodxhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodxhy.exe"60⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjjows.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjows.exe"61⤵
- Executes dropped EXE
- Modifies registry class
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtbsml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbsml.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgdhhi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgdhhi.exe"63⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglinu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglinu.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdcqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdcqr.exe"65⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhnim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhnim.exe"66⤵
- Checks computer location settings
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqhsym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqhsym.exe"67⤵
- Checks computer location settings
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgaqzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgaqzh.exe"68⤵
- Checks computer location settings
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqfen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqfen.exe"69⤵
- Modifies registry class
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemymhco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemymhco.exe"70⤵
- Checks computer location settings
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtdam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtdam.exe"71⤵
- Modifies registry class
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxrkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxrkd.exe"72⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlktyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlktyh.exe"73⤵
- Modifies registry class
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwhdh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwhdh.exe"74⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdvkbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvkbg.exe"75⤵
- Checks computer location settings
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtstge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtstge.exe"76⤵
- Modifies registry class
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvdjed.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdjed.exe"77⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemambff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemambff.exe"78⤵
- Modifies registry class
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvhhar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhhar.exe"79⤵
- Checks computer location settings
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrfqy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrfqy.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrayy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrayy.exe"81⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdbbbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbbbc.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzqwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzqwu.exe"83⤵
- Checks computer location settings
PID:744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgldcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgldcu.exe"84⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlbjcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbjcb.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemikuvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikuvj.exe"86⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqdcaj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdcaj.exe"87⤵
- Checks computer location settings
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqxvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqxvo.exe"88⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcnhtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnhtg.exe"89⤵
- Modifies registry class
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqaaox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqaaox.exe"90⤵
- Modifies registry class
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszpjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszpjp.exe"91⤵
- Modifies registry class
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxiysr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxiysr.exe"92⤵
- Modifies registry class
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxmtcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmtcz.exe"93⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsdoli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdoli.exe"94⤵
- Checks computer location settings
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaizdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaizdd.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswagt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswagt.exe"96⤵
- Checks computer location settings
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndrgh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndrgh.exe"97⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsaych.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsaych.exe"98⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfcfxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfcfxe.exe"99⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaugab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaugab.exe"100⤵
- Modifies registry class
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnwnpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnwnpm.exe"101⤵
- Modifies registry class
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdankq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdankq.exe"102⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\Sysqempctsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempctsc.exe"103⤵
- Checks computer location settings
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfsmai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfsmai.exe"104⤵
- Modifies registry class
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvwnvm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwnvm.exe"105⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\Sysqeminhyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqeminhyv.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvpvng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvpvng.exe"107⤵
- Modifies registry class
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutysy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutysy.exe"108⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemigqwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemigqwp.exe"109⤵
- Checks computer location settings
- Modifies registry class
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsndyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsndyl.exe"110⤵
- Modifies registry class
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcyuos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyuos.exe"111⤵
- Checks computer location settings
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkcfhn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkcfhn.exe"112⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemakbni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakbni.exe"113⤵
- Modifies registry class
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsoqdv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsoqdv.exe"114⤵
- Checks computer location settings
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcypau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcypau.exe"115⤵
- Modifies registry class
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqempxlio.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxlio.exe"116⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxistx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxistx.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvnob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvnob.exe"118⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Sysqempxujy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxujy.exe"119⤵
- Checks computer location settings
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgnco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgnco.exe"120⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemugnho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugnho.exe"121⤵
- Checks computer location settings
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbdvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbdvf.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:4528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-