Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
33b72c8f386d9b792b4e79b082a21ea0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
33b72c8f386d9b792b4e79b082a21ea0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
33b72c8f386d9b792b4e79b082a21ea0_NeikiAnalytics.exe
-
Size
564KB
-
MD5
33b72c8f386d9b792b4e79b082a21ea0
-
SHA1
84f40fe249d14ab362b2e7ca57deb3c542d58c62
-
SHA256
170c5228661837d98e8d8e0c999682d5166c2398323a925ff824c4f0be6f1eb3
-
SHA512
9e568aa6ed033328e7ae2b1dc69bafc5213f837626911e488fde8abcc3f0c6ebd2e498287953f91e407991711a33007600ebbb88188a1b17d803f6f48615ac7f
-
SSDEEP
3072:dCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxh:dqDAwl0xPTMiR9JSSxPUKYGdodHA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemdkuvp.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemqwyuj.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemjskhf.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemitegv.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemydghz.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemnijbd.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemffkmk.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemcyxlp.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemzyzik.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemlrona.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemoralk.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemonzyl.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemofehu.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemtyvcv.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemsutwh.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemcxywf.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemwndiq.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemoromu.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemqeloa.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemkasvr.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemzgwoq.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemhvpfh.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemgkyut.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemccnhd.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemhppci.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemqzuow.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemrfozz.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemgcgxr.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemnkvcx.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemnlxwk.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemnhszs.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemrqugt.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemezbfv.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemqvhnr.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemtcxmj.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemtdode.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemaxsyz.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemudvud.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqembeiao.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemfvtgs.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemqcrpo.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemxhyhr.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemxdlsi.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemfevvo.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemvowxa.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemlqine.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemdbaym.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemyxijd.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemrgzra.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemyxlgj.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemtwqqu.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemswaqx.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemktetg.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqempdsut.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemazedt.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemvcjbi.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemtmpda.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemlygiu.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemdzuro.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemghwvs.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemyifas.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemgrsme.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemnfgjz.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Sysqemqwzpt.exe -
Executes dropped EXE 64 IoCs
pid Process 4476 Sysqemtbsei.exe 1224 Sysqemrgzra.exe 2876 Sysqemtmncq.exe 2240 Sysqemeignx.exe 1272 Sysqemmbfnm.exe 3092 Sysqemtiany.exe 2012 Sysqembjznn.exe 464 Sysqemghwvs.exe 4584 Sysqemlqnqj.exe 4080 Sysqemtmpda.exe 4480 Sysqemysulg.exe 2600 Sysqemtjnod.exe 2184 Sysqemqzuow.exe 4592 Sysqemtcxmj.exe 2516 Sysqemydghz.exe 3464 Sysqemjvvme.exe 4756 Sysqemofehu.exe 2772 Sysqemyeqef.exe 1076 Sysqemjwfks.exe 3876 Sysqemwjpzx.exe 3840 Sysqemgibxi.exe 3188 Sysqemduxkg.exe 2376 Sysqemyifas.exe 1348 Sysqemdkuvp.exe 3528 Sysqemorzgt.exe 5016 Sysqemqeloa.exe 832 Sysqemyxlgj.exe 1272 Sysqemrfozz.exe 4708 Sysqemgcgxr.exe 4432 Sysqemnkvcx.exe 392 Sysqemtwqqu.exe 2608 Sysqemepoas.exe 3608 Sysqemvhaql.exe 964 Sysqemospof.exe 1908 Sysqemgrsme.exe 4380 Sysqemyosws.exe 1056 Sysqemqcrpo.exe 1900 Sysqemdqafi.exe 1508 Sysqemscfkm.exe 916 Sysqemtyvcv.exe 3020 Sysqemlygiu.exe 4808 Sysqemavpns.exe 4040 Sysqemvmjqp.exe 1628 Sysqemnijbd.exe 1432 Sysqemfmxlf.exe 2532 Sysqemxixwb.exe 2536 Sysqemnfgjz.exe 2792 Sysqemqwyuj.exe 212 Sysqemffkmk.exe 3136 Sysqemtdode.exe 4432 Sysqemlrona.exe 2144 Sysqemyfgva.exe 1880 Sysqemswaqx.exe 4904 Sysqemfctyx.exe 3048 Sysqemawhtj.exe 4924 Sysqemqnshq.exe 1696 Sysqemxjdet.exe 1756 Sysqemqrpxk.exe 112 Sysqemkpfan.exe 2008 Sysqemnoxlx.exe 2480 Sysqemaxsyz.exe 3020 Sysqemsusiv.exe 3604 Sysqemsutwh.exe 4040 Sysqemktetg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrrbxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvcjbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemysulg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtjnod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjpzx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemduxkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemktetg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgcgxr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeignx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyosws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsusiv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoralk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembofhv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgxfme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofehu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrfozz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqcrpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemudvud.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzyzik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrsme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnpcem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjyai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfvbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemazedt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemalack.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlhcal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoromu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvowxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyifas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtyvcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdnnvb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotvpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwndiq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfvtgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemswaqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemknbsq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemccnhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsiqyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmbpjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmiqq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitegv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnfgjz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemawhtj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdsut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtbsei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemebmkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembkquy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjskhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlqine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyeqef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjdet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaxsyz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnlxwk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjupmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemydghz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzyrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyclqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemictuy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvyulo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfctyx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqwzpt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemckljp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhtcfq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcxywf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 4476 4648 33b72c8f386d9b792b4e79b082a21ea0_NeikiAnalytics.exe 81 PID 4648 wrote to memory of 4476 4648 33b72c8f386d9b792b4e79b082a21ea0_NeikiAnalytics.exe 81 PID 4648 wrote to memory of 4476 4648 33b72c8f386d9b792b4e79b082a21ea0_NeikiAnalytics.exe 81 PID 4476 wrote to memory of 1224 4476 Sysqemtbsei.exe 85 PID 4476 wrote to memory of 1224 4476 Sysqemtbsei.exe 85 PID 4476 wrote to memory of 1224 4476 Sysqemtbsei.exe 85 PID 1224 wrote to memory of 2876 1224 Sysqemrgzra.exe 86 PID 1224 wrote to memory of 2876 1224 Sysqemrgzra.exe 86 PID 1224 wrote to memory of 2876 1224 Sysqemrgzra.exe 86 PID 2876 wrote to memory of 2240 2876 Sysqemtmncq.exe 87 PID 2876 wrote to memory of 2240 2876 Sysqemtmncq.exe 87 PID 2876 wrote to memory of 2240 2876 Sysqemtmncq.exe 87 PID 2240 wrote to memory of 1272 2240 Sysqemeignx.exe 88 PID 2240 wrote to memory of 1272 2240 Sysqemeignx.exe 88 PID 2240 wrote to memory of 1272 2240 Sysqemeignx.exe 88 PID 1272 wrote to memory of 3092 1272 Sysqemmbfnm.exe 89 PID 1272 wrote to memory of 3092 1272 Sysqemmbfnm.exe 89 PID 1272 wrote to memory of 3092 1272 Sysqemmbfnm.exe 89 PID 3092 wrote to memory of 2012 3092 Sysqemtiany.exe 90 PID 3092 wrote to memory of 2012 3092 Sysqemtiany.exe 90 PID 3092 wrote to memory of 2012 3092 Sysqemtiany.exe 90 PID 2012 wrote to memory of 464 2012 Sysqembjznn.exe 91 PID 2012 wrote to memory of 464 2012 Sysqembjznn.exe 91 PID 2012 wrote to memory of 464 2012 Sysqembjznn.exe 91 PID 464 wrote to memory of 4584 464 Sysqemghwvs.exe 92 PID 464 wrote to memory of 4584 464 Sysqemghwvs.exe 92 PID 464 wrote to memory of 4584 464 Sysqemghwvs.exe 92 PID 4584 wrote to memory of 4080 4584 Sysqemlqnqj.exe 93 PID 4584 wrote to memory of 4080 4584 Sysqemlqnqj.exe 93 PID 4584 wrote to memory of 4080 4584 Sysqemlqnqj.exe 93 PID 4080 wrote to memory of 4480 4080 Sysqemtmpda.exe 94 PID 4080 wrote to memory of 4480 4080 Sysqemtmpda.exe 94 PID 4080 wrote to memory of 4480 4080 Sysqemtmpda.exe 94 PID 4480 wrote to memory of 2600 4480 Sysqemysulg.exe 95 PID 4480 wrote to memory of 2600 4480 Sysqemysulg.exe 95 PID 4480 wrote to memory of 2600 4480 Sysqemysulg.exe 95 PID 2600 wrote to memory of 2184 2600 Sysqemtjnod.exe 97 PID 2600 wrote to memory of 2184 2600 Sysqemtjnod.exe 97 PID 2600 wrote to memory of 2184 2600 Sysqemtjnod.exe 97 PID 2184 wrote to memory of 4592 2184 Sysqemqzuow.exe 99 PID 2184 wrote to memory of 4592 2184 Sysqemqzuow.exe 99 PID 2184 wrote to memory of 4592 2184 Sysqemqzuow.exe 99 PID 4592 wrote to memory of 2516 4592 Sysqemtcxmj.exe 100 PID 4592 wrote to memory of 2516 4592 Sysqemtcxmj.exe 100 PID 4592 wrote to memory of 2516 4592 Sysqemtcxmj.exe 100 PID 2516 wrote to memory of 3464 2516 Sysqemydghz.exe 101 PID 2516 wrote to memory of 3464 2516 Sysqemydghz.exe 101 PID 2516 wrote to memory of 3464 2516 Sysqemydghz.exe 101 PID 3464 wrote to memory of 4756 3464 Sysqemjvvme.exe 103 PID 3464 wrote to memory of 4756 3464 Sysqemjvvme.exe 103 PID 3464 wrote to memory of 4756 3464 Sysqemjvvme.exe 103 PID 4756 wrote to memory of 2772 4756 Sysqemofehu.exe 104 PID 4756 wrote to memory of 2772 4756 Sysqemofehu.exe 104 PID 4756 wrote to memory of 2772 4756 Sysqemofehu.exe 104 PID 2772 wrote to memory of 1076 2772 Sysqemyeqef.exe 105 PID 2772 wrote to memory of 1076 2772 Sysqemyeqef.exe 105 PID 2772 wrote to memory of 1076 2772 Sysqemyeqef.exe 105 PID 1076 wrote to memory of 3876 1076 Sysqemjwfks.exe 106 PID 1076 wrote to memory of 3876 1076 Sysqemjwfks.exe 106 PID 1076 wrote to memory of 3876 1076 Sysqemjwfks.exe 106 PID 3876 wrote to memory of 3840 3876 Sysqemwjpzx.exe 107 PID 3876 wrote to memory of 3840 3876 Sysqemwjpzx.exe 107 PID 3876 wrote to memory of 3840 3876 Sysqemwjpzx.exe 107 PID 3840 wrote to memory of 3188 3840 Sysqemgibxi.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\33b72c8f386d9b792b4e79b082a21ea0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\33b72c8f386d9b792b4e79b082a21ea0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtbsei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbsei.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgzra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgzra.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmncq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmncq.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeignx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeignx.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbfnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbfnm.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtiany.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtiany.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\Sysqembjznn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembjznn.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghwvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghwvs.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqnqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqnqj.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmpda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmpda.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemysulg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemysulg.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjnod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjnod.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzuow.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzuow.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtcxmj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtcxmj.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemydghz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydghz.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjvvme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvvme.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofehu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofehu.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyeqef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyeqef.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwfks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwfks.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjpzx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjpzx.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgibxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgibxi.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemduxkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemduxkg.exe"23⤵
- Executes dropped EXE
- Modifies registry class
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyifas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyifas.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdkuvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkuvp.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"26⤵
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqeloa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqeloa.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyxlgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxlgj.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrfozz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfozz.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgcgxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcgxr.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkvcx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkvcx.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwqqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwqqu.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemepoas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemepoas.exe"33⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvhaql.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhaql.exe"34⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemospof.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemospof.exe"35⤵
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrsme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrsme.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyosws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyosws.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcrpo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcrpo.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqafi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqafi.exe"39⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscfkm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscfkm.exe"40⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtyvcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyvcv.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlygiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlygiu.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemavpns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavpns.exe"43⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvmjqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvmjqp.exe"44⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnijbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnijbd.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmxlf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmxlf.exe"46⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxixwb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxixwb.exe"47⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfgjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfgjz.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwyuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwyuj.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffkmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffkmk.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtdode.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtdode.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrona.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrona.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfgva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfgva.exe"53⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswaqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswaqx.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfctyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfctyx.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawhtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawhtj.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqnshq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqnshq.exe"57⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjdet.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjdet.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqrpxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrpxk.exe"59⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkpfan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpfan.exe"60⤵
- Executes dropped EXE
PID:112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnoxlx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnoxlx.exe"61⤵
- Executes dropped EXE
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaxsyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaxsyz.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsusiv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsusiv.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsutwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsutwh.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemktetg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemktetg.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemflywv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemflywv.exe"66⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnlxwk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlxwk.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhyhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhyhr.exe"68⤵
- Checks computer location settings
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfaxhg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfaxhg.exe"69⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"70⤵
- Checks computer location settings
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxdlsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdlsi.exe"71⤵
- Checks computer location settings
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwzpt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwzpt.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemknbsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemknbsq.exe"73⤵
- Modifies registry class
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfevvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfevvo.exe"74⤵
- Checks computer location settings
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdnnvb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdnnvb.exe"75⤵
- Modifies registry class
PID:332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidlvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidlvj.exe"76⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcyxlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyxlp.exe"77⤵
- Checks computer location settings
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"78⤵
- Modifies registry class
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemccnhd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccnhd.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhppci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhppci.exe"80⤵
- Checks computer location settings
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtcfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtcfq.exe"81⤵
- Modifies registry class
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkasvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkasvr.exe"82⤵
- Checks computer location settings
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnljl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnljl.exe"83⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsiqyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsiqyd.exe"84⤵
- Modifies registry class
PID:112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmzkba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmzkba.exe"85⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\Sysqemudvud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudvud.exe"86⤵
- Checks computer location settings
- Modifies registry class
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxckpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxckpm.exe"87⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhjyai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjyai.exe"88⤵
- Modifies registry class
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhcipw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhcipw.exe"89⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzyzik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzyzik.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgwoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgwoq.exe"91⤵
- Checks computer location settings
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbpjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbpjh.exe"92⤵
- Modifies registry class
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcxywf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxywf.exe"93⤵
- Checks computer location settings
- Modifies registry class
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemewnrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewnrx.exe"94⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Sysqempdsut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdsut.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkvvkb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvvkb.exe"96⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemebmkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebmkq.exe"97⤵
- Modifies registry class
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhwqax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwqax.exe"98⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtfvbl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfvbl.exe"99⤵
- Modifies registry class
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrguo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrguo.exe"100⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemotvpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotvpl.exe"101⤵
- Modifies registry class
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqxuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqxuj.exe"102⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Sysqembofhv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembofhv.exe"103⤵
- Modifies registry class
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmiqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmiqq.exe"104⤵
- Modifies registry class
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwndiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwndiq.exe"105⤵
- Checks computer location settings
- Modifies registry class
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemendnr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemendnr.exe"106⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemerqyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemerqyz.exe"107⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrqugt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqugt.exe"108⤵
- Checks computer location settings
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Sysqembakea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembakea.exe"109⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoromu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoromu.exe"110⤵
- Checks computer location settings
- Modifies registry class
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemezbfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemezbfv.exe"111⤵
- Checks computer location settings
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqembeiao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembeiao.exe"112⤵
- Checks computer location settings
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrbrnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbrnm.exe"113⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhvpfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvpfh.exe"114⤵
- Checks computer location settings
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoralk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoralk.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemelydg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemelydg.exe"116⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjupmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjupmi.exe"117⤵
- Modifies registry class
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzyrg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzyrg.exe"118⤵
- Modifies registry class
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrbxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrbxf.exe"119⤵
- Modifies registry class
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkquy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkquy.exe"120⤵
- Modifies registry class
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtyqfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyqfu.exe"121⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgptax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgptax.exe"122⤵PID:1888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-