Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 05:35
Behavioral task
behavioral1
Sample
89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe
-
Size
86KB
-
MD5
89aeda2b5ff11c6de9ca54eb250e9f20
-
SHA1
c54b301764ee6159812e80a8df181c7f1b122a05
-
SHA256
56ab50b1f56e2a71871ee855c07f4f720dd57855e2adaa3f4407c3fe32c50c9f
-
SHA512
58476b0b4bd0bec73290a80167606622e7781d63c051d7dac4d766fc900c77cb18f53d90e849f8356f336e89fc6c2c26b887efb695a4d29753a3556dc28c4f1a
-
SSDEEP
1536:TYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nxw:0dEUfKj8BYbDiC1ZTK7sxtLUIGP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemakftj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnrfgx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemayomq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemngieu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempummb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemcjuhm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemmlacf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemeehte.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlnwfl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemknltb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqodku.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembpslw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemddddo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemptrhr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemegayu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwldll.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemljctt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemavnax.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemigwhj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvrtpk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempbvlb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjnaur.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgltlu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtczru.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvjrcc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemedbwd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyaiyq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemaywye.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjauam.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxevkj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgxrkd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfqkrs.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembbpzr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnfgjz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjelme.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemryfnx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwaytf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqgemb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvukyw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemitmrq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnrtej.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemztvgv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemrttvw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjbbyt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlrjbv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtujeg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxckpm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjxhfy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxnbih.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkkihp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemoompm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemytjtg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemmtugi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhzqpj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlbzlc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembipne.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlayjg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemaqegu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembqzgh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembfecv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwbomm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkiczx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemibdps.exe -
Executes dropped EXE 64 IoCs
pid Process 2108 Sysqemrttvw.exe 1704 Sysqemjxhfy.exe 3904 Sysqemrudtb.exe 3156 Sysqemjbbyt.exe 1276 Sysqemohygg.exe 4208 Sysqemzrnll.exe 884 Sysqemeehte.exe 4248 Sysqemmtugi.exe 3640 Sysqemrgoob.exe 432 Sysqembbpzr.exe 3228 Sysqemjfzma.exe 4284 Sysqemtxorf.exe 4396 Sysqemzvlzt.exe 4588 Sysqemqzaku.exe 2996 Sysqemjnaur.exe 1688 Sysqemwldll.exe 3308 Sysqemdfdvt.exe 752 Sysqemgltlu.exe 3148 Sysqemlbzlc.exe 3520 Sysqemtczru.exe 4464 Sysqemwbomm.exe 3488 Sysqemenzfh.exe 388 Sysqemjauam.exe 3956 Sysqembpslw.exe 2516 Sysqemlrjbv.exe 1448 Sysqemlstyb.exe 3840 Sysqemitmrq.exe 4028 Sysqemvvtmn.exe 3788 Sysqemnrtej.exe 1972 Sysqembipne.exe 336 Sysqemixlsj.exe 2388 Sysqemltpaq.exe 3000 Sysqemndqdu.exe 516 Sysqemlayjg.exe 4200 Sysqemweaha.exe 3832 Sysqemgdfre.exe 3132 Sysqemtujeg.exe 1628 Sysqemvqlci.exe 3188 Sysqemfabsg.exe 2180 Sysqemlnwfl.exe 4336 Sysqemakftj.exe 2608 Sysqemlrswn.exe 2944 Sysqemljctt.exe 2184 Sysqemnfgjz.exe 1084 Sysqemvjrcc.exe 3628 Sysqemxevkj.exe 4740 Sysqemallak.exe 4588 Sysqemddddo.exe 3944 Sysqemnrfgx.exe 3436 Sysqemitkjh.exe 1588 Sysqemnrqjp.exe 4356 Sysqemnznpu.exe 1260 Sysqemuhjua.exe 688 Sysqemhjqpx.exe 2220 Sysqemsqest.exe 2228 Sysqemxnbih.exe 628 Sysqemaqegu.exe 2156 Sysqemfdyty.exe 396 Sysqemausww.exe 880 Sysqemkiczx.exe 4208 Sysqemayomq.exe 4016 Sysqemagncb.exe 4692 Sysqemntgfa.exe 3984 Sysqemavnax.exe -
resource yara_rule behavioral2/memory/4588-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0007000000023424-6.dat upx behavioral2/memory/2108-37-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0008000000023423-42.dat upx behavioral2/files/0x0007000000023425-72.dat upx behavioral2/memory/1704-74-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0007000000023426-108.dat upx behavioral2/files/0x000900000002341d-143.dat upx behavioral2/memory/3156-145-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0005000000022abf-179.dat upx behavioral2/files/0x0009000000023427-214.dat upx behavioral2/files/0x0004000000022ac0-250.dat upx behavioral2/memory/4588-256-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0009000000023399-287.dat upx behavioral2/memory/2108-292-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00080000000233a9-322.dat upx behavioral2/memory/1704-353-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023390-359.dat upx behavioral2/memory/3904-390-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000b000000022990-397.dat upx behavioral2/memory/3156-430-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a000000023393-432.dat upx behavioral2/memory/1276-463-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a0000000233a5-469.dat upx behavioral2/memory/4208-476-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/884-502-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00090000000233a6-508.dat upx behavioral2/memory/4248-515-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3640-541-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/432-547-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00090000000233a8-549.dat upx behavioral2/memory/3228-580-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00080000000233ab-586.dat upx behavioral2/memory/4284-593-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4396-619-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00080000000233ac-625.dat upx behavioral2/memory/4588-656-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00080000000233ae-662.dat upx behavioral2/memory/2996-693-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1688-727-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3520-733-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3308-762-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4464-768-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/752-797-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3148-831-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3520-865-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3956-871-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4464-900-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2516-906-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3488-935-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/388-969-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3956-1007-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2516-1069-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1448-1079-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3840-1106-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4028-1139-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3788-1173-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1972-1207-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/336-1241-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2388-1283-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3000-1314-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/516-1351-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4200-1377-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3832-1419-0x0000000000400000-0x0000000000492000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembbpzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwldll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemavnax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfltaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfqkrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemihhhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblsdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjfzma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtczru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembpslw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltpaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemakftj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemreiof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembqzgh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoompm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqgemb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdspsl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjnaur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempummb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjwafi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnrfgx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzqpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxqzej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmlkzs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqodku.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemssrmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemagncb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemunzur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemziafn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytjtg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztvgv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzrnll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtujeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfdyty.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvukyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfabsg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemegayu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjdavz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembqetn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnsusz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyhref.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxevkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmxcot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemonovu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltesw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemothbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaywye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempbvlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnfgjz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjrcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkkihp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembfecv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembzxba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemevlgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemihkpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjbbyt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlrjbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitmrq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemptrhr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemedbwd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnrtej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemknltb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcjuhm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2108 4588 89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe 84 PID 4588 wrote to memory of 2108 4588 89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe 84 PID 4588 wrote to memory of 2108 4588 89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe 84 PID 2108 wrote to memory of 1704 2108 Sysqemrttvw.exe 85 PID 2108 wrote to memory of 1704 2108 Sysqemrttvw.exe 85 PID 2108 wrote to memory of 1704 2108 Sysqemrttvw.exe 85 PID 1704 wrote to memory of 3904 1704 Sysqemjxhfy.exe 86 PID 1704 wrote to memory of 3904 1704 Sysqemjxhfy.exe 86 PID 1704 wrote to memory of 3904 1704 Sysqemjxhfy.exe 86 PID 3904 wrote to memory of 3156 3904 Sysqemrudtb.exe 87 PID 3904 wrote to memory of 3156 3904 Sysqemrudtb.exe 87 PID 3904 wrote to memory of 3156 3904 Sysqemrudtb.exe 87 PID 3156 wrote to memory of 1276 3156 Sysqemjbbyt.exe 88 PID 3156 wrote to memory of 1276 3156 Sysqemjbbyt.exe 88 PID 3156 wrote to memory of 1276 3156 Sysqemjbbyt.exe 88 PID 1276 wrote to memory of 4208 1276 Sysqemohygg.exe 90 PID 1276 wrote to memory of 4208 1276 Sysqemohygg.exe 90 PID 1276 wrote to memory of 4208 1276 Sysqemohygg.exe 90 PID 4208 wrote to memory of 884 4208 Sysqemzrnll.exe 91 PID 4208 wrote to memory of 884 4208 Sysqemzrnll.exe 91 PID 4208 wrote to memory of 884 4208 Sysqemzrnll.exe 91 PID 884 wrote to memory of 4248 884 Sysqemeehte.exe 92 PID 884 wrote to memory of 4248 884 Sysqemeehte.exe 92 PID 884 wrote to memory of 4248 884 Sysqemeehte.exe 92 PID 4248 wrote to memory of 3640 4248 Sysqemmtugi.exe 93 PID 4248 wrote to memory of 3640 4248 Sysqemmtugi.exe 93 PID 4248 wrote to memory of 3640 4248 Sysqemmtugi.exe 93 PID 3640 wrote to memory of 432 3640 Sysqemrgoob.exe 94 PID 3640 wrote to memory of 432 3640 Sysqemrgoob.exe 94 PID 3640 wrote to memory of 432 3640 Sysqemrgoob.exe 94 PID 432 wrote to memory of 3228 432 Sysqembbpzr.exe 95 PID 432 wrote to memory of 3228 432 Sysqembbpzr.exe 95 PID 432 wrote to memory of 3228 432 Sysqembbpzr.exe 95 PID 3228 wrote to memory of 4284 3228 Sysqemjfzma.exe 96 PID 3228 wrote to memory of 4284 3228 Sysqemjfzma.exe 96 PID 3228 wrote to memory of 4284 3228 Sysqemjfzma.exe 96 PID 4284 wrote to memory of 4396 4284 Sysqemtxorf.exe 97 PID 4284 wrote to memory of 4396 4284 Sysqemtxorf.exe 97 PID 4284 wrote to memory of 4396 4284 Sysqemtxorf.exe 97 PID 4396 wrote to memory of 4588 4396 Sysqemzvlzt.exe 98 PID 4396 wrote to memory of 4588 4396 Sysqemzvlzt.exe 98 PID 4396 wrote to memory of 4588 4396 Sysqemzvlzt.exe 98 PID 4588 wrote to memory of 2996 4588 Sysqemqzaku.exe 99 PID 4588 wrote to memory of 2996 4588 Sysqemqzaku.exe 99 PID 4588 wrote to memory of 2996 4588 Sysqemqzaku.exe 99 PID 2996 wrote to memory of 1688 2996 Sysqemjnaur.exe 100 PID 2996 wrote to memory of 1688 2996 Sysqemjnaur.exe 100 PID 2996 wrote to memory of 1688 2996 Sysqemjnaur.exe 100 PID 1688 wrote to memory of 3308 1688 Sysqemwldll.exe 101 PID 1688 wrote to memory of 3308 1688 Sysqemwldll.exe 101 PID 1688 wrote to memory of 3308 1688 Sysqemwldll.exe 101 PID 3308 wrote to memory of 752 3308 Sysqemdfdvt.exe 102 PID 3308 wrote to memory of 752 3308 Sysqemdfdvt.exe 102 PID 3308 wrote to memory of 752 3308 Sysqemdfdvt.exe 102 PID 752 wrote to memory of 3148 752 Sysqemgltlu.exe 103 PID 752 wrote to memory of 3148 752 Sysqemgltlu.exe 103 PID 752 wrote to memory of 3148 752 Sysqemgltlu.exe 103 PID 3148 wrote to memory of 3520 3148 Sysqemlbzlc.exe 104 PID 3148 wrote to memory of 3520 3148 Sysqemlbzlc.exe 104 PID 3148 wrote to memory of 3520 3148 Sysqemlbzlc.exe 104 PID 3520 wrote to memory of 4464 3520 Sysqemtczru.exe 105 PID 3520 wrote to memory of 4464 3520 Sysqemtczru.exe 105 PID 3520 wrote to memory of 4464 3520 Sysqemtczru.exe 105 PID 4464 wrote to memory of 3488 4464 Sysqemwbomm.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\89aeda2b5ff11c6de9ca54eb250e9f20_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrttvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrttvw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxhfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxhfy.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrudtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrudtb.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohygg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohygg.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrnll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrnll.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeehte.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeehte.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtugi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtugi.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgoob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgoob.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\Sysqembbpzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbpzr.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjfzma.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfzma.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxorf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxorf.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvlzt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvlzt.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzaku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzaku.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjnaur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnaur.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwldll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwldll.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfdvt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfdvt.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgltlu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgltlu.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbzlc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbzlc.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtczru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtczru.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbomm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbomm.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemenzfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemenzfh.exe"23⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjauam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjauam.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Sysqembpslw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembpslw.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrjbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrjbv.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlstyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlstyb.exe"27⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitmrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitmrq.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvvtmn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvvtmn.exe"29⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrtej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrtej.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\Sysqembipne.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembipne.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixlsj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixlsj.exe"32⤵
- Executes dropped EXE
PID:336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltpaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltpaq.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndqdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndqdu.exe"34⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlayjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlayjg.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemweaha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemweaha.exe"36⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgdfre.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgdfre.exe"37⤵
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtujeg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtujeg.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqlci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqlci.exe"39⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfabsg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfabsg.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnwfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnwfl.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakftj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakftj.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrswn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrswn.exe"43⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljctt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljctt.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfgjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfgjz.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjrcc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjrcc.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxevkj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxevkj.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemallak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemallak.exe"48⤵
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddddo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddddo.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrfgx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrfgx.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitkjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitkjh.exe"51⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrqjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrqjp.exe"52⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnznpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnznpu.exe"53⤵
- Executes dropped EXE
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuhjua.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhjua.exe"54⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjqpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjqpx.exe"55⤵
- Executes dropped EXE
PID:688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsqest.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqest.exe"56⤵
- Executes dropped EXE
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnbih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnbih.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqegu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqegu.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfdyty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfdyty.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemausww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemausww.exe"60⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkiczx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkiczx.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemayomq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayomq.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemagncb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagncb.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemntgfa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntgfa.exe"64⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemavnax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavnax.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfltaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfltaf.exe"66⤵
- Modifies registry class
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxlwye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxlwye.exe"67⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\Sysqemknltb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemknltb.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemujlex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemujlex.exe"69⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmxcot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxcot.exe"70⤵
- Modifies registry class
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunzur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunzur.exe"71⤵
- Modifies registry class
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkkihp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkkihp.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptrhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptrhr.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsvyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsvyt.exe"74⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\Sysqempbzlw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbzlw.exe"75⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Sysqemegayu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemegayu.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngieu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngieu.exe"77⤵
- Checks computer location settings
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Sysqempummb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempummb.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcheub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcheub.exe"79⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxckpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxckpm.exe"80⤵
- Checks computer location settings
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemziafn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemziafn.exe"81⤵
- Modifies registry class
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcaair.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcaair.exe"82⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxweqy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxweqy.exe"83⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemedbwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedbwd.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmimog.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmimog.exe"85⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\Sysqembqzgh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqzgh.exe"86⤵
- Checks computer location settings
- Modifies registry class
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzqpj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzqpj.exe"87⤵
- Checks computer location settings
- Modifies registry class
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemryvsf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryvsf.exe"88⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcjuhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjuhm.exe"89⤵
- Checks computer location settings
- Modifies registry class
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoompm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoompm.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzodac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzodac.exe"91⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhwzgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwzgi.exe"92⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\Sysqemucsoi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucsoi.exe"93⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxqzej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqzej.exe"94⤵
- Modifies registry class
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdlmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdlmq.exe"95⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhqwft.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqwft.exe"96⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjdavz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdavz.exe"97⤵
- Modifies registry class
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwafi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwafi.exe"98⤵
- Modifies registry class
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytjtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytjtg.exe"99⤵
- Checks computer location settings
- Modifies registry class
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"100⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\Sysqemreiof.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemreiof.exe"101⤵
- Modifies registry class
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjelme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjelme.exe"102⤵
- Checks computer location settings
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmlacf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlacf.exe"103⤵
- Checks computer location settings
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmlkzs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlkzs.exe"104⤵
- Modifies registry class
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemryfnx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryfnx.exe"105⤵
- Checks computer location settings
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwwve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwwve.exe"106⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwaytf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaytf.exe"107⤵
- Checks computer location settings
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqetn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqetn.exe"108⤵
- Modifies registry class
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtttja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtttja.exe"109⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Sysqembfecv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfecv.exe"110⤵
- Checks computer location settings
- Modifies registry class
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljcsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljcsi.exe"111⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyouaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyouaq.exe"112⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyaiyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyaiyq.exe"113⤵
- Checks computer location settings
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzxba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzxba.exe"114⤵
- Modifies registry class
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobewx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobewx.exe"115⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemztvgv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztvgv.exe"116⤵
- Checks computer location settings
- Modifies registry class
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgmdre.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgmdre.exe"117⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\Sysqemihhhk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihhhk.exe"118⤵
- Modifies registry class
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojqhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojqhm.exe"119⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgxrkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxrkd.exe"120⤵
- Checks computer location settings
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwnlyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwnlyv.exe"121⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemonovu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemonovu.exe"122⤵
- Modifies registry class
PID:2800
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-