Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 23:58
Behavioral task
behavioral1
Sample
5b1ec19280c49b98ecab126e710c9020_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
5b1ec19280c49b98ecab126e710c9020_NeikiAnalytics.exe
-
Size
239KB
-
MD5
5b1ec19280c49b98ecab126e710c9020
-
SHA1
b6d94c39ce6d90c68c9c07bb75304ef4743efad9
-
SHA256
a1a7535eda9c517751d8d1195d74160f6c85eb48069c13a783b708846197120a
-
SHA512
c42d02ea865286698fc82a3b41716336bc691d2caeba8f0ca4948b6720937296469f32240bbd43cae47c8a721a3ae11bd47b275ae8314f2df493ae8a8c4ebb0b
-
SSDEEP
3072:ydEUfKj8BYbDiC1ZTK7sxtLUIGT9kXH0hga4PjBy2XiXV/mwTwyg4K+mpPNHdUpj:yUSiZTK40V2a4PdyoeV/Hwz4zmpPNipj
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 19 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x00070000000233c8-6.dat family_berbew behavioral2/files/0x00070000000233c7-42.dat family_berbew behavioral2/files/0x00070000000233c9-72.dat family_berbew behavioral2/files/0x00080000000233c4-108.dat family_berbew behavioral2/files/0x00070000000233ca-146.dat family_berbew behavioral2/files/0x00070000000233cb-182.dat family_berbew behavioral2/files/0x00070000000233cd-220.dat family_berbew behavioral2/files/0x00070000000233ce-258.dat family_berbew behavioral2/files/0x00070000000233cf-298.dat family_berbew behavioral2/files/0x00070000000233d0-337.dat family_berbew behavioral2/files/0x00070000000233d1-374.dat family_berbew behavioral2/files/0x00070000000233d2-410.dat family_berbew behavioral2/files/0x00070000000233d3-449.dat family_berbew behavioral2/files/0x00070000000233d4-487.dat family_berbew behavioral2/files/0x00070000000233d5-527.dat family_berbew behavioral2/files/0x00070000000233d6-565.dat family_berbew behavioral2/files/0x00070000000233d7-603.dat family_berbew behavioral2/files/0x00070000000233d8-641.dat family_berbew behavioral2/files/0x00070000000233d9-679.dat family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjpypq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemalwxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtwgeo.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqematlqg.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlweoz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyerky.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlduny.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemabbix.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemozfqr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyhnyw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfkahc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnzysm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhwvgd.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdgjsq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemijdfh.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemucwzq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqamkl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemcqrie.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemiosqw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemibibx.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtkcht.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhxpxf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempgtir.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdwtij.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemixgux.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqnnls.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembqtlj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgxfme.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyrift.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlygiu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemkfanf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdtnwv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemajvmh.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemiudim.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembqlwz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdklqe.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdofsl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemsgasf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtttja.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemggwia.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrwums.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemaodwv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembdgni.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempvdut.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwnpzb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtlywi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmitzr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjycwy.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemudjre.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjvobs.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembhplb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnnlsv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemablzw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgyqzg.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnyick.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwmpwg.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhksjk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemkhchs.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemehgfv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyspib.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemoxifd.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdqqgb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemihbor.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqndnk.exe -
Executes dropped EXE 64 IoCs
pid Process 3652 Sysqemudjre.exe 3608 Sysqempvdut.exe 3852 Sysqemtouad.exe 4564 Sysqemhnqqf.exe 4712 Sysqemldwqf.exe 1828 Sysqemggzos.exe 968 Sysqemlweoz.exe 4464 Sysqemtaqhc.exe 5064 Sysqemwwupj.exe 3016 Sysqemjrmsa.exe 2616 Sysqemzovxy.exe 5080 Sysqemjcxai.exe 2728 Sysqemuuoly.exe 2536 Sysqemhwvgd.exe 3368 Sysqemmjqti.exe 4080 Sysqemgssor.exe 2424 Sysqemrwums.exe 220 Sysqemyerky.exe 1688 Sysqembdgni.exe 1572 Sysqemdklqe.exe 1784 Sysqemiwodj.exe 2584 Sysqemlduny.exe 2448 Sysqemdojlr.exe 4508 Sysqemgnyob.exe 1836 Sysqemtpfjy.exe 3800 Sysqembtqcb.exe 2452 Sysqemqmwcw.exe 3676 Sysqemguiux.exe 348 Sysqemyrift.exe 3956 Sysqemabbix.exe 3304 Sysqemozfqr.exe 1176 Sysqemdwoep.exe 2752 Sysqembqlwz.exe 4388 Sysqemossrw.exe 3632 Sysqemajvmh.exe 2056 Sysqemlxvxv.exe 1508 Sysqemywrnx.exe 4616 Sysqemlygiu.exe 2180 Sysqemvxmlq.exe 2028 Sysqemlcvyo.exe 924 Sysqemyhnyw.exe 664 Sysqemdfsob.exe 2868 Sysqemoximo.exe 3368 Sysqemtkcht.exe 3848 Sysqemyxxuy.exe 744 Sysqemqamkl.exe 4980 Sysqemdofsl.exe 4920 Sysqemyitox.exe 396 Sysqemgnegs.exe 3272 Sysqemgyqzg.exe 2616 Sysqemixgux.exe 2652 Sysqemfkahc.exe 2200 Sysqemyupno.exe 4376 Sysqemnzysm.exe 3812 Sysqemiudim.exe 3308 Sysqemkmvlq.exe 3040 Sysqemqnnls.exe 2056 Sysqemicnoi.exe 3220 Sysqemfawcu.exe 1568 Sysqemnawhn.exe 1548 Sysqemkfanf.exe 2044 Sysqemsgasf.exe 4320 Sysqemcqrie.exe 2216 Sysqemkucbh.exe -
resource yara_rule behavioral2/memory/228-0-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c8-6.dat upx behavioral2/memory/3652-37-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c7-42.dat upx behavioral2/files/0x00070000000233c9-72.dat upx behavioral2/memory/3608-73-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00080000000233c4-108.dat upx behavioral2/memory/3852-110-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/228-140-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233ca-146.dat upx behavioral2/memory/4564-148-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233cb-182.dat upx behavioral2/memory/4712-186-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3652-214-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233cd-220.dat upx behavioral2/memory/1828-221-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3608-249-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233ce-258.dat upx behavioral2/memory/968-260-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3852-287-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4564-292-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233cf-298.dat upx behavioral2/memory/4464-300-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4712-331-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d0-337.dat upx behavioral2/memory/5064-339-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d1-374.dat upx behavioral2/memory/1828-376-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d2-410.dat upx behavioral2/memory/2616-412-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/968-414-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d3-449.dat upx behavioral2/memory/5080-451-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4464-457-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d4-487.dat upx behavioral2/memory/2728-489-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5064-495-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3016-525-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d5-527.dat upx behavioral2/memory/2536-529-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2616-559-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d6-565.dat upx behavioral2/memory/3368-566-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5080-597-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d7-603.dat upx behavioral2/memory/4080-605-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2728-635-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d8-641.dat upx behavioral2/memory/2424-643-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2536-673-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233d9-679.dat upx behavioral2/memory/220-680-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3368-709-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1688-715-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4080-744-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1572-750-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1784-783-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2424-812-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2584-818-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/220-847-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2448-853-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1688-882-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4508-888-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1572-893-0x0000000000400000-0x000000000049E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyqzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemekawn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnnlsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhxpxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempvdut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhnqqf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdofsl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyitox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfkahc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfawcu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemucwzq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgtir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmitzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjcxai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrwums.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkucbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjmrj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsefla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiosqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyerky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdojlr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxvxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnojmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwnpzb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdklt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqematlqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuuoly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfeag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyouaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqndnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtouad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemldwqf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcrvvy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdgjsq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnyick.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemozfqr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgnegs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzusu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemibibx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemguiux.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtlywi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdthkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemljyzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitxhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdfsob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemixgux.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiudim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqnnls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhinzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjezvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhplb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembtqcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyrift.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyupno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwgeo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdklqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiltmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtttja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhscbs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemossrw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuiedi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfoqkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjqti.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembdgni.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 3652 228 5b1ec19280c49b98ecab126e710c9020_NeikiAnalytics.exe 82 PID 228 wrote to memory of 3652 228 5b1ec19280c49b98ecab126e710c9020_NeikiAnalytics.exe 82 PID 228 wrote to memory of 3652 228 5b1ec19280c49b98ecab126e710c9020_NeikiAnalytics.exe 82 PID 3652 wrote to memory of 3608 3652 Sysqemudjre.exe 83 PID 3652 wrote to memory of 3608 3652 Sysqemudjre.exe 83 PID 3652 wrote to memory of 3608 3652 Sysqemudjre.exe 83 PID 3608 wrote to memory of 3852 3608 Sysqempvdut.exe 84 PID 3608 wrote to memory of 3852 3608 Sysqempvdut.exe 84 PID 3608 wrote to memory of 3852 3608 Sysqempvdut.exe 84 PID 3852 wrote to memory of 4564 3852 Sysqemtouad.exe 85 PID 3852 wrote to memory of 4564 3852 Sysqemtouad.exe 85 PID 3852 wrote to memory of 4564 3852 Sysqemtouad.exe 85 PID 4564 wrote to memory of 4712 4564 Sysqemhnqqf.exe 86 PID 4564 wrote to memory of 4712 4564 Sysqemhnqqf.exe 86 PID 4564 wrote to memory of 4712 4564 Sysqemhnqqf.exe 86 PID 4712 wrote to memory of 1828 4712 Sysqemldwqf.exe 87 PID 4712 wrote to memory of 1828 4712 Sysqemldwqf.exe 87 PID 4712 wrote to memory of 1828 4712 Sysqemldwqf.exe 87 PID 1828 wrote to memory of 968 1828 Sysqemggzos.exe 88 PID 1828 wrote to memory of 968 1828 Sysqemggzos.exe 88 PID 1828 wrote to memory of 968 1828 Sysqemggzos.exe 88 PID 968 wrote to memory of 4464 968 Sysqemlweoz.exe 89 PID 968 wrote to memory of 4464 968 Sysqemlweoz.exe 89 PID 968 wrote to memory of 4464 968 Sysqemlweoz.exe 89 PID 4464 wrote to memory of 5064 4464 Sysqemtaqhc.exe 90 PID 4464 wrote to memory of 5064 4464 Sysqemtaqhc.exe 90 PID 4464 wrote to memory of 5064 4464 Sysqemtaqhc.exe 90 PID 5064 wrote to memory of 3016 5064 Sysqemwwupj.exe 91 PID 5064 wrote to memory of 3016 5064 Sysqemwwupj.exe 91 PID 5064 wrote to memory of 3016 5064 Sysqemwwupj.exe 91 PID 3016 wrote to memory of 2616 3016 Sysqemjrmsa.exe 92 PID 3016 wrote to memory of 2616 3016 Sysqemjrmsa.exe 92 PID 3016 wrote to memory of 2616 3016 Sysqemjrmsa.exe 92 PID 2616 wrote to memory of 5080 2616 Sysqemzovxy.exe 93 PID 2616 wrote to memory of 5080 2616 Sysqemzovxy.exe 93 PID 2616 wrote to memory of 5080 2616 Sysqemzovxy.exe 93 PID 5080 wrote to memory of 2728 5080 Sysqemjcxai.exe 94 PID 5080 wrote to memory of 2728 5080 Sysqemjcxai.exe 94 PID 5080 wrote to memory of 2728 5080 Sysqemjcxai.exe 94 PID 2728 wrote to memory of 2536 2728 Sysqemuuoly.exe 95 PID 2728 wrote to memory of 2536 2728 Sysqemuuoly.exe 95 PID 2728 wrote to memory of 2536 2728 Sysqemuuoly.exe 95 PID 2536 wrote to memory of 3368 2536 Sysqemhwvgd.exe 96 PID 2536 wrote to memory of 3368 2536 Sysqemhwvgd.exe 96 PID 2536 wrote to memory of 3368 2536 Sysqemhwvgd.exe 96 PID 3368 wrote to memory of 4080 3368 Sysqemmjqti.exe 97 PID 3368 wrote to memory of 4080 3368 Sysqemmjqti.exe 97 PID 3368 wrote to memory of 4080 3368 Sysqemmjqti.exe 97 PID 4080 wrote to memory of 2424 4080 Sysqemgssor.exe 98 PID 4080 wrote to memory of 2424 4080 Sysqemgssor.exe 98 PID 4080 wrote to memory of 2424 4080 Sysqemgssor.exe 98 PID 2424 wrote to memory of 220 2424 Sysqemrwums.exe 99 PID 2424 wrote to memory of 220 2424 Sysqemrwums.exe 99 PID 2424 wrote to memory of 220 2424 Sysqemrwums.exe 99 PID 220 wrote to memory of 1688 220 Sysqemyerky.exe 102 PID 220 wrote to memory of 1688 220 Sysqemyerky.exe 102 PID 220 wrote to memory of 1688 220 Sysqemyerky.exe 102 PID 1688 wrote to memory of 1572 1688 Sysqembdgni.exe 103 PID 1688 wrote to memory of 1572 1688 Sysqembdgni.exe 103 PID 1688 wrote to memory of 1572 1688 Sysqembdgni.exe 103 PID 1572 wrote to memory of 1784 1572 Sysqemdklqe.exe 106 PID 1572 wrote to memory of 1784 1572 Sysqemdklqe.exe 106 PID 1572 wrote to memory of 1784 1572 Sysqemdklqe.exe 106 PID 1784 wrote to memory of 2584 1784 Sysqemiwodj.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b1ec19280c49b98ecab126e710c9020_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5b1ec19280c49b98ecab126e710c9020_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemudjre.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudjre.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\Sysqempvdut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempvdut.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtouad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtouad.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhnqqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhnqqf.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldwqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldwqf.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemggzos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemggzos.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlweoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlweoz.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtaqhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtaqhc.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwwupj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwupj.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjrmsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrmsa.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzovxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzovxy.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcxai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcxai.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuuoly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuuoly.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhwvgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwvgd.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjqti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjqti.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgssor.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgssor.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwums.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwums.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyerky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyerky.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdgni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdgni.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdklqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdklqe.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwodj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwodj.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlduny.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlduny.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdojlr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdojlr.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnyob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnyob.exe"25⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpfjy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpfjy.exe"26⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtqcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtqcb.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"28⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguiux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguiux.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyrift.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyrift.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemabbix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabbix.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemozfqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozfqr.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdwoep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdwoep.exe"33⤵
- Executes dropped EXE
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqlwz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqlwz.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemossrw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemossrw.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajvmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajvmh.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxvxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxvxv.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywrnx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywrnx.exe"38⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlygiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlygiu.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxmlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxmlq.exe"40⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcvyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcvyo.exe"41⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhnyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhnyw.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfsob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfsob.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoximo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoximo.exe"44⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkcht.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkcht.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyxxuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxxuy.exe"46⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqamkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqamkl.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdofsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdofsl.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyitox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyitox.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnegs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnegs.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyqzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyqzg.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixgux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixgux.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfkahc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkahc.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyupno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyupno.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnzysm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzysm.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiudim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiudim.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkmvlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkmvlq.exe"57⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqnnls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqnnls.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemicnoi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemicnoi.exe"59⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfawcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfawcu.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnawhn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnawhn.exe"61⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkfanf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfanf.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsgasf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgasf.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqrie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqrie.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkucbh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkucbh.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuiedi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuiedi.exe"66⤵
- Modifies registry class
PID:600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjmrj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjmrj.exe"67⤵
- Modifies registry class
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiltmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiltmg.exe"68⤵
- Modifies registry class
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucwzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucwzq.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcdwfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdwfi.exe"70⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\Sysqempfeag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfeag.exe"71⤵
- Modifies registry class
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhxpxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxpxf.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemukhfm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukhfm.exe"73⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkautf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkautf.exe"74⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsefla.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsefla.exe"75⤵
- Modifies registry class
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"76⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnojmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnojmd.exe"77⤵
- Modifies registry class
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrqazn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqazn.exe"78⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkaoxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkaoxg.exe"79⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemehgfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehgfv.exe"80⤵
- Checks computer location settings
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgtir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgtir.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtodw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtodw.exe"82⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzghrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzghrp.exe"83⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhksjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhksjk.exe"84⤵
- Checks computer location settings
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjjheb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjheb.exe"85⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzzusu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzusu.exe"86⤵
- Modifies registry class
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcrvvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrvvy.exe"87⤵
- Modifies registry class
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqtlj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqtlj.exe"88⤵
- Checks computer location settings
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebxwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebxwh.exe"89⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjvobs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvobs.exe"90⤵
- Checks computer location settings
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhchs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhchs.exe"91⤵
- Checks computer location settings
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhinzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhinzh.exe"92⤵
- Modifies registry class
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhxmkk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxmkk.exe"93⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjezvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjezvo.exe"94⤵
- Modifies registry class
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhplb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhplb.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhujyg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhujyg.exe"96⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwnpzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwnpzb.exe"97⤵
- Checks computer location settings
- Modifies registry class
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"98⤵
- Modifies registry class
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlywi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlywi.exe"99⤵
- Checks computer location settings
- Modifies registry class
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjfwxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfwxd.exe"100⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrqehe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqehe.exe"101⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwwcdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwcdd.exe"102⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemedyij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedyij.exe"103⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtmtak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmtak.exe"104⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwdklt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdklt.exe"105⤵
- Modifies registry class
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmitzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmitzr.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtttja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtttja.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjycwy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjycwy.exe"108⤵
- Checks computer location settings
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqgzuw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgzuw.exe"109⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdthkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdthkq.exe"110⤵
- Modifies registry class
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyouaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyouaq.exe"111⤵
- Modifies registry class
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqbvn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqbvn.exe"112⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoxifd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxifd.exe"113⤵
- Checks computer location settings
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjkyvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjkyvx.exe"114⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\Sysqembhygl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhygl.exe"115⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwmpwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmpwg.exe"116⤵
- Checks computer location settings
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxfme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxfme.exe"117⤵
- Checks computer location settings
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpypq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpypq.exe"118⤵
- Checks computer location settings
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrwep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrwep.exe"119⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\Sysqemalwxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalwxy.exe"120⤵
- Checks computer location settings
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnnlsv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnnlsv.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgjsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgjsq.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:4464
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-