Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
2fe9826db1ff9f0ad17e3b14149da9f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fe9826db1ff9f0ad17e3b14149da9f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2fe9826db1ff9f0ad17e3b14149da9f0_NeikiAnalytics.exe
-
Size
563KB
-
MD5
2fe9826db1ff9f0ad17e3b14149da9f0
-
SHA1
804bcefeab57b274ececdd318aeb2184c199d235
-
SHA256
93bec7cde3290e8c5fd0a795f495a097ffbaa3637ae0dab8ab2e3cdd0884f7fb
-
SHA512
faaae190aa5ef4775c67ad7f16845cfd8d7079e9bef8bf71deb276276cfcdd1e3c971a4a83db95041ae924ef07efdd6c38704ee7366766f79150b33bb352ad1c
-
SSDEEP
3072:dCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxH:dqDAwl0xPTMiR9JSSxPUKYGdodHw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqcgoa.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtarcu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfdyty.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlhmnn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlzztw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempzfrk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgqbvi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgssor.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwioxc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwycpe.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembxjce.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdtdrm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemavjac.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrudtb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwdtwp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemworyr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgohzb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvozwn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtvaov.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqksii.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgyrfv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwmama.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhssnp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembuibl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdbavr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemitpcp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemkwuzm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemklicl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemckwin.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemooabh.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqmmep.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqbchd.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnmxrf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxhslb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemueptt.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrsncz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemktarp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemzwwav.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnrolj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemsnqur.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdyjgt.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnfhpl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemcwyay.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempvwmc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqzffv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemndbut.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjcjqt.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvuzim.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemilbku.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvgwow.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembizkr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtntim.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqoiag.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemiwzht.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyrzkb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemotsur.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfwhtw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhmaoz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrfkms.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlpbss.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxmuil.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlufwc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemcqrie.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemsmkuv.exe -
Executes dropped EXE 64 IoCs
pid Process 2656 Sysqemwgber.exe 3780 Sysqemputxn.exe 4944 Sysqemtkxjj.exe 4560 Sysqemcwisk.exe 4440 Sysqembxjce.exe 4752 Sysqemgyrfv.exe 4088 Sysqemjbuvh.exe 536 Sysqemgqbvi.exe 3040 Sysqemrudtb.exe 2076 Sysqemjxplq.exe 408 Sysqemgvxyc.exe 3188 Sysqemmegtt.exe 3968 Sysqemwdtwp.exe 4860 Sysqemjfarm.exe 4728 Sysqemyrzkb.exe 4800 Sysqemhshqb.exe 3152 Sysqemjrwll.exe 4248 Sysqemjcjqt.exe 2960 Sysqemrsgwq.exe 1036 Sysqemgssor.exe 3248 Sysqemotsur.exe 3168 Sysqemwmama.exe 3744 Sysqemwfkkg.exe 3176 Sysqemvuzim.exe 3896 Sysqemilbku.exe 4220 Sysqembwqqo.exe 1560 Sysqemilewl.exe 3188 Sysqemezvmg.exe 4644 Sysqemqbchd.exe 2980 Sysqemvgwow.exe 656 Sysqemtarcu.exe 3040 Sysqemitpcp.exe 3796 Sysqemtprsj.exe 2632 Sysqembizkr.exe 3740 Sysqemlhmnn.exe 3036 Sysqemworyr.exe 4620 Sysqemdtdrm.exe 208 Sysqemgohzb.exe 1560 Sysqemttzhb.exe 2696 Sysqemwioxc.exe 1280 Sysqemtntim.exe 1220 Sysqemdyjgt.exe 3040 Sysqemftnoa.exe 4368 Sysqemlufwc.exe 2660 Sysqemnmxrf.exe 4724 Sysqemnfhpl.exe 2204 Sysqemvjtho.exe 2760 Sysqemnjefn.exe 5100 Sysqemxtudm.exe 3928 Sysqemiahgq.exe 5004 Sysqemvgaoq.exe 4592 Sysqemnrolj.exe 1936 Sysqemlzztw.exe 4940 Sysqemfgpoz.exe 1892 Sysqemvozwn.exe 3496 Sysqemklicl.exe 4396 Sysqemfccfi.exe 2024 Sysqemcwyay.exe 4112 Sysqemafqau.exe 3216 Sysqemsigqh.exe 348 Sysqemfdyty.exe 1600 Sysqemvahyw.exe 1424 Sysqemfhvjs.exe 4504 Sysqempvwmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlghqj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemktarp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsmkuv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgvxyc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemafqau.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeokyb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiiblm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcnnrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzhetw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhicr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfwhtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembizkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzpnei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzhwkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvmcfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemelydg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyrinp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqlwe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvuzim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvozwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjqwji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrbqaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjfarm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembaigu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzjfyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvbupx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuneg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwmadq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvnksj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzvel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlpbss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivuma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqeminhyv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwioxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiggfq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiglsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemweepk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemilbku.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzztw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbavr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkxjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwfkkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemadwbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuqig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhshqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsmece.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqksii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvahyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfhvjs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsnqur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxhslb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwgber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyrfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjxplq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtprsj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempruxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhssnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlziu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnzhru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemttzhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnrolj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrsncz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvaov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemooabh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2656 4504 2fe9826db1ff9f0ad17e3b14149da9f0_NeikiAnalytics.exe 82 PID 4504 wrote to memory of 2656 4504 2fe9826db1ff9f0ad17e3b14149da9f0_NeikiAnalytics.exe 82 PID 4504 wrote to memory of 2656 4504 2fe9826db1ff9f0ad17e3b14149da9f0_NeikiAnalytics.exe 82 PID 2656 wrote to memory of 3780 2656 Sysqemwgber.exe 85 PID 2656 wrote to memory of 3780 2656 Sysqemwgber.exe 85 PID 2656 wrote to memory of 3780 2656 Sysqemwgber.exe 85 PID 3780 wrote to memory of 4944 3780 Sysqemputxn.exe 87 PID 3780 wrote to memory of 4944 3780 Sysqemputxn.exe 87 PID 3780 wrote to memory of 4944 3780 Sysqemputxn.exe 87 PID 4944 wrote to memory of 4560 4944 Sysqemtkxjj.exe 88 PID 4944 wrote to memory of 4560 4944 Sysqemtkxjj.exe 88 PID 4944 wrote to memory of 4560 4944 Sysqemtkxjj.exe 88 PID 4560 wrote to memory of 4440 4560 Sysqemcwisk.exe 89 PID 4560 wrote to memory of 4440 4560 Sysqemcwisk.exe 89 PID 4560 wrote to memory of 4440 4560 Sysqemcwisk.exe 89 PID 4440 wrote to memory of 4752 4440 Sysqembxjce.exe 90 PID 4440 wrote to memory of 4752 4440 Sysqembxjce.exe 90 PID 4440 wrote to memory of 4752 4440 Sysqembxjce.exe 90 PID 4752 wrote to memory of 4088 4752 Sysqemgyrfv.exe 91 PID 4752 wrote to memory of 4088 4752 Sysqemgyrfv.exe 91 PID 4752 wrote to memory of 4088 4752 Sysqemgyrfv.exe 91 PID 4088 wrote to memory of 536 4088 Sysqemjbuvh.exe 92 PID 4088 wrote to memory of 536 4088 Sysqemjbuvh.exe 92 PID 4088 wrote to memory of 536 4088 Sysqemjbuvh.exe 92 PID 536 wrote to memory of 3040 536 Sysqemgqbvi.exe 95 PID 536 wrote to memory of 3040 536 Sysqemgqbvi.exe 95 PID 536 wrote to memory of 3040 536 Sysqemgqbvi.exe 95 PID 3040 wrote to memory of 2076 3040 Sysqemrudtb.exe 96 PID 3040 wrote to memory of 2076 3040 Sysqemrudtb.exe 96 PID 3040 wrote to memory of 2076 3040 Sysqemrudtb.exe 96 PID 2076 wrote to memory of 408 2076 Sysqemjxplq.exe 99 PID 2076 wrote to memory of 408 2076 Sysqemjxplq.exe 99 PID 2076 wrote to memory of 408 2076 Sysqemjxplq.exe 99 PID 408 wrote to memory of 3188 408 Sysqemgvxyc.exe 100 PID 408 wrote to memory of 3188 408 Sysqemgvxyc.exe 100 PID 408 wrote to memory of 3188 408 Sysqemgvxyc.exe 100 PID 3188 wrote to memory of 3968 3188 Sysqemmegtt.exe 101 PID 3188 wrote to memory of 3968 3188 Sysqemmegtt.exe 101 PID 3188 wrote to memory of 3968 3188 Sysqemmegtt.exe 101 PID 3968 wrote to memory of 4860 3968 Sysqemwdtwp.exe 102 PID 3968 wrote to memory of 4860 3968 Sysqemwdtwp.exe 102 PID 3968 wrote to memory of 4860 3968 Sysqemwdtwp.exe 102 PID 4860 wrote to memory of 4728 4860 Sysqemjfarm.exe 104 PID 4860 wrote to memory of 4728 4860 Sysqemjfarm.exe 104 PID 4860 wrote to memory of 4728 4860 Sysqemjfarm.exe 104 PID 4728 wrote to memory of 4800 4728 Sysqemyrzkb.exe 105 PID 4728 wrote to memory of 4800 4728 Sysqemyrzkb.exe 105 PID 4728 wrote to memory of 4800 4728 Sysqemyrzkb.exe 105 PID 4800 wrote to memory of 3152 4800 Sysqemhshqb.exe 106 PID 4800 wrote to memory of 3152 4800 Sysqemhshqb.exe 106 PID 4800 wrote to memory of 3152 4800 Sysqemhshqb.exe 106 PID 3152 wrote to memory of 4248 3152 Sysqemjrwll.exe 107 PID 3152 wrote to memory of 4248 3152 Sysqemjrwll.exe 107 PID 3152 wrote to memory of 4248 3152 Sysqemjrwll.exe 107 PID 4248 wrote to memory of 2960 4248 Sysqemjcjqt.exe 109 PID 4248 wrote to memory of 2960 4248 Sysqemjcjqt.exe 109 PID 4248 wrote to memory of 2960 4248 Sysqemjcjqt.exe 109 PID 2960 wrote to memory of 1036 2960 Sysqemrsgwq.exe 110 PID 2960 wrote to memory of 1036 2960 Sysqemrsgwq.exe 110 PID 2960 wrote to memory of 1036 2960 Sysqemrsgwq.exe 110 PID 1036 wrote to memory of 3248 1036 Sysqemgssor.exe 111 PID 1036 wrote to memory of 3248 1036 Sysqemgssor.exe 111 PID 1036 wrote to memory of 3248 1036 Sysqemgssor.exe 111 PID 3248 wrote to memory of 3168 3248 Sysqemotsur.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fe9826db1ff9f0ad17e3b14149da9f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2fe9826db1ff9f0ad17e3b14149da9f0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwgber.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgber.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemputxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemputxn.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkxjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkxjj.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcwisk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwisk.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxjce.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxjce.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyrfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyrfv.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbuvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbuvh.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqbvi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqbvi.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrudtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrudtb.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxplq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxplq.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvxyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvxyc.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmegtt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmegtt.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjfarm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfarm.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyrzkb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyrzkb.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhshqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhshqb.exe"17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjrwll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrwll.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcjqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcjqt.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrsgwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrsgwq.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgssor.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgssor.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotsur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotsur.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmama.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmama.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwfkkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwfkkg.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuzim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuzim.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilbku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilbku.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwqqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwqqo.exe"27⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilewl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilewl.exe"28⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemezvmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemezvmg.exe"29⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbchd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbchd.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgwow.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgwow.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtarcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtarcu.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitpcp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitpcp.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtprsj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtprsj.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\Sysqembizkr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembizkr.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhmnn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhmnn.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemworyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemworyr.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtdrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtdrm.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgohzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgohzb.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttzhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttzhb.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwioxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwioxc.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiggfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiggfq.exe"42⤵
- Modifies registry class
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtntim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtntim.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdyjgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdyjgt.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemftnoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemftnoa.exe"45⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlufwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlufwc.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnmxrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmxrf.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfhpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfhpl.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjtho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjtho.exe"49⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjefn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjefn.exe"50⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxtudm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtudm.exe"51⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiahgq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiahgq.exe"52⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgaoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgaoq.exe"53⤵
- Executes dropped EXE
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrolj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrolj.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzztw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzztw.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgpoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgpoz.exe"56⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvozwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvozwn.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklicl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklicl.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfccfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfccfi.exe"59⤵
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcwyay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwyay.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafqau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafqau.exe"61⤵
- Executes dropped EXE
- Modifies registry class
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsigqh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsigqh.exe"62⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfdyty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfdyty.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvahyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvahyw.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfhvjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfhvjs.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Sysqempvwmc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempvwmc.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiglsv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiglsv.exe"67⤵
- Modifies registry class
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsnqur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnqur.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxaliw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxaliw.exe"69⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcqrie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqrie.exe"70⤵
- Checks computer location settings
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhslb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhslb.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemadwbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemadwbi.exe"72⤵
- Modifies registry class
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcnnrg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnnrg.exe"73⤵
- Modifies registry class
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkovwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkovwh.exe"74⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxuneg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuneg.exe"75⤵
- Modifies registry class
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwuzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwuzm.exe"76⤵
- Checks computer location settings
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuqig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuqig.exe"77⤵
- Modifies registry class
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckwin.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckwin.exe"78⤵
- Checks computer location settings
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhunqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhunqp.exe"79⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrlclf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlclf.exe"80⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzpnei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpnei.exe"81⤵
- Modifies registry class
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhcyxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhcyxl.exe"82⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxckpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxckpm.exe"83⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkxdse.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxdse.exe"84⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\Sysqempruxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempruxo.exe"85⤵
- Modifies registry class
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemueptt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemueptt.exe"86⤵
- Checks computer location settings
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzhok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzhok.exe"87⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"88⤵
- Modifies registry class
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Sysqempzfrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempzfrk.exe"89⤵
- Checks computer location settings
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqjen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqjen.exe"90⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhssnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhssnp.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzosxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzosxl.exe"92⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwmadq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmadq.exe"93⤵
- Modifies registry class
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhetw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhetw.exe"94⤵
- Modifies registry class
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\Sysqembuibl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembuibl.exe"95⤵
- Checks computer location settings
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwnbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwnbg.exe"96⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmaoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmaoz.exe"97⤵
- Checks computer location settings
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemracra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemracra.exe"98⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhqwft.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqwft.exe"99⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrsncz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrsncz.exe"100⤵
- Checks computer location settings
- Modifies registry class
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwafi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwafi.exe"101⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"102⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjaxjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjaxjv.exe"103⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\Sysqembaigu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembaigu.exe"104⤵
- Modifies registry class
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrfkms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfkms.exe"105⤵
- Checks computer location settings
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhicr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhicr.exe"106⤵
- Modifies registry class
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"107⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrbqaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbqaa.exe"108⤵
- Modifies registry class
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"109⤵
- Modifies registry class
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxuvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxuvz.exe"110⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\Sysqemelydg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemelydg.exe"111⤵
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemooabh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemooabh.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubuom.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubuom.exe"113⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzhwkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhwkx.exe"114⤵
- Modifies registry class
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemweepk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemweepk.exe"115⤵
- Modifies registry class
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvmcfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvmcfv.exe"116⤵
- Modifies registry class
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqoiag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqoiag.exe"117⤵
- Checks computer location settings
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmpwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmpwg.exe"118⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtvaov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvaov.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwthc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwthc.exe"120⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwycpe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwycpe.exe"121⤵
- Checks computer location settings
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjaskb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjaskb.exe"122⤵PID:3112
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-