Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 00:33
Behavioral task
behavioral1
Sample
68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe
-
Size
592KB
-
MD5
68704df5d48d8d8c3117413eceea24d0
-
SHA1
949752a62d2e7e16688ff928aef4c301816fe750
-
SHA256
220908165946dbc14e3adbf52c2e261f558ddfcdebd1fc8a119e6c802d1e002a
-
SHA512
09cb9bdce221dff401366ce2919e95aa0c19a43d5dd93e2888a2f8c89a3489eb78ebec31562e78af559901f5bb617f46a86faf5fa9f880629e61b779429b6d0a
-
SSDEEP
3072:2CaoAs101Pol0xPTM7mRCAdJSSxPUkl3Vn2ZMQTCk/dN92sdNhavtrVdewnAx3wv:2qDAwl0xPTMiR9JSSxPUKl0dodH6/a
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemqzffv.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemwacvo.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemqcxlm.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemtorxn.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemdeszz.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemwisge.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemdvzyh.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemocmbl.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemhvqrm.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemeffdb.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemqhkkc.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemcugib.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemzcqfs.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemzsonf.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemukcue.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemwhzbn.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemnhanm.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemhjbad.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemwovzy.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqembkvsz.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemutecl.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemtpkpw.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemjydck.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemldpsi.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemismwv.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemwmuhz.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemybuzc.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemlqnjc.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemynspl.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemnsknf.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemhafgg.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemmdpvj.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemekmnp.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemgkiiv.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemggqwg.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemojfbq.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemsadyf.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemryumu.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemzexik.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemrswyl.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemzbqjl.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemcizdc.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemqdoui.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemjjsnx.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqembzjjk.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemxqjyn.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemoucsx.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemthgln.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemdjlni.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemnijbd.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemgvjxs.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemrxzfw.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemyjsbw.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemxytej.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemethrz.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemmxrxk.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemgqbgf.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemxhyhr.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemuxhfy.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemivuma.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemakqji.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemnizdy.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemhjqpx.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation Sysqemchfzm.exe -
Executes dropped EXE 64 IoCs
pid Process 4500 Sysqemjgzpw.exe 2832 Sysqemunfrs.exe 3052 Sysqemrsmnk.exe 1900 Sysqemucdkd.exe 1904 Sysqemugqdr.exe 2840 Sysqemurcvf.exe 3848 Sysqemwyqyv.exe 3104 Sysqemzexik.exe 4964 Sysqemeffdb.exe 3260 Sysqemeucjs.exe 2068 Sysqemejaoj.exe 932 Sysqembskoe.exe 4164 Sysqemzbvws.exe 364 Sysqemeyaef.exe 1920 Sysqemhfgpv.exe 2268 Sysqemhueum.exe 1304 Sysqemhjbad.exe 3508 Sysqemjttpw.exe 1672 Sysqemjbuvh.exe 1648 Sysqempcldj.exe 1152 Sysqemjtfgg.exe 1444 Sysqemwditq.exe 4524 Sysqemgvxyc.exe 2928 Sysqemwovzy.exe 1992 Sysqemlateb.exe 2148 Sysqemmxrxk.exe 2036 Sysqemwskps.exe 4176 Sysqemyomsn.exe 3260 Sysqemgdify.exe 4020 Sysqemgvjxs.exe 3568 Sysqemowiph.exe 704 Sysqemysjip.exe 3756 Sysqemgkiiv.exe 2740 Sysqemmfbdg.exe 3208 Sysqemwacvo.exe 3504 Sysqemglsgj.exe 2916 Sysqemrswyl.exe 1152 Sysqemyohww.exe 4316 Sysqemydghz.exe 4824 Sysqemdqaue.exe 1480 Sysqemoucsx.exe 2448 Sysqemqsrnp.exe 3864 Sysqemoqxig.exe 4244 Sysqemgqbgf.exe 4336 Sysqemldvtk.exe 3620 Sysqemthgln.exe 2940 Sysqemtlcwv.exe 116 Sysqembpnpy.exe 3984 Sysqemldpsi.exe 2560 Sysqemgujai.exe 3504 Sysqemqcxlm.exe 4176 Sysqemgndvc.exe 1876 Sysqemauveq.exe 388 Sysqembuwjc.exe 2344 Sysqemggqwg.exe 4432 Sysqembuhmt.exe 3784 Sysqembkvsz.exe 2656 Sysqemdjlni.exe 1448 Sysqemdjuau.exe 4124 Sysqemnizdy.exe 4660 Sysqemnijbd.exe 2904 Sysqemismwv.exe 1876 Sysqemtkcht.exe 944 Sysqemiwamx.exe -
resource yara_rule behavioral2/memory/1548-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000023426-6.dat upx behavioral2/memory/4500-37-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000023421-42.dat upx behavioral2/files/0x0007000000023428-72.dat upx behavioral2/files/0x0008000000023423-107.dat upx behavioral2/memory/3052-109-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002342a-144.dat upx behavioral2/memory/1900-145-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002342b-179.dat upx behavioral2/memory/1548-209-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002342c-215.dat upx behavioral2/memory/2840-217-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002342d-251.dat upx behavioral2/memory/4500-257-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002342e-287.dat upx behavioral2/memory/2832-293-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0003000000022982-323.dat upx behavioral2/memory/3052-329-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002342f-360.dat upx behavioral2/memory/1900-367-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000023430-396.dat upx behavioral2/memory/1904-398-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2840-427-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000500000002297a-433.dat upx behavioral2/memory/3848-463-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000800000002296a-469.dat upx behavioral2/memory/3104-499-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000023431-505.dat upx behavioral2/memory/364-507-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4964-536-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000b00000002338e-542.dat upx behavioral2/memory/3260-577-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000023434-578.dat upx behavioral2/files/0x0007000000023435-613.dat upx behavioral2/memory/2068-619-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000023436-650.dat upx behavioral2/memory/932-655-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4164-680-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/364-686-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1672-687-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1920-715-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1648-721-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2268-749-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1304-750-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3508-815-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1672-848-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1992-886-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1648-914-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2148-920-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1152-948-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4176-986-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1444-990-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4524-1047-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2928-1112-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/704-1118-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1992-1146-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2148-1170-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2740-1186-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2036-1213-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4176-1254-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3260-1279-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4020-1280-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3568-1307-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrxzfw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzpcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemakqji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjqpx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemryumu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobwxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdybpt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkcht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempjaqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjjsnx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjtfgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgkiiv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdjuau.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcgyug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzcqfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembrpxd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcigci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvgxtg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemysjip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxyddq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmqna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjcfoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzexik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembpnpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcizdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhzbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwisge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjskhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlqnjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzbvws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwacvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxisad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvnucc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemthgln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchfzm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmqitt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemadsjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshflb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgvxyc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyohww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgujai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgndvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkjsd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzpsah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemojfbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhvqrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubrmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemurcvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejaoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrswyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmedw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtddsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdjgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsncta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtpkpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemethrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwzqda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrsmnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhfgpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemowiph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembuhmt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnijbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbgzd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1548 wrote to memory of 4500 1548 68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe 84 PID 1548 wrote to memory of 4500 1548 68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe 84 PID 1548 wrote to memory of 4500 1548 68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe 84 PID 4500 wrote to memory of 2832 4500 Sysqemjgzpw.exe 85 PID 4500 wrote to memory of 2832 4500 Sysqemjgzpw.exe 85 PID 4500 wrote to memory of 2832 4500 Sysqemjgzpw.exe 85 PID 2832 wrote to memory of 3052 2832 Sysqemunfrs.exe 88 PID 2832 wrote to memory of 3052 2832 Sysqemunfrs.exe 88 PID 2832 wrote to memory of 3052 2832 Sysqemunfrs.exe 88 PID 3052 wrote to memory of 1900 3052 Sysqemrsmnk.exe 90 PID 3052 wrote to memory of 1900 3052 Sysqemrsmnk.exe 90 PID 3052 wrote to memory of 1900 3052 Sysqemrsmnk.exe 90 PID 1900 wrote to memory of 1904 1900 Sysqemucdkd.exe 91 PID 1900 wrote to memory of 1904 1900 Sysqemucdkd.exe 91 PID 1900 wrote to memory of 1904 1900 Sysqemucdkd.exe 91 PID 1904 wrote to memory of 2840 1904 Sysqemugqdr.exe 94 PID 1904 wrote to memory of 2840 1904 Sysqemugqdr.exe 94 PID 1904 wrote to memory of 2840 1904 Sysqemugqdr.exe 94 PID 2840 wrote to memory of 3848 2840 Sysqemurcvf.exe 95 PID 2840 wrote to memory of 3848 2840 Sysqemurcvf.exe 95 PID 2840 wrote to memory of 3848 2840 Sysqemurcvf.exe 95 PID 3848 wrote to memory of 3104 3848 Sysqemwyqyv.exe 121 PID 3848 wrote to memory of 3104 3848 Sysqemwyqyv.exe 121 PID 3848 wrote to memory of 3104 3848 Sysqemwyqyv.exe 121 PID 3104 wrote to memory of 4964 3104 Sysqemzexik.exe 98 PID 3104 wrote to memory of 4964 3104 Sysqemzexik.exe 98 PID 3104 wrote to memory of 4964 3104 Sysqemzexik.exe 98 PID 4964 wrote to memory of 3260 4964 Sysqemeffdb.exe 124 PID 4964 wrote to memory of 3260 4964 Sysqemeffdb.exe 124 PID 4964 wrote to memory of 3260 4964 Sysqemeffdb.exe 124 PID 3260 wrote to memory of 2068 3260 Sysqemeucjs.exe 101 PID 3260 wrote to memory of 2068 3260 Sysqemeucjs.exe 101 PID 3260 wrote to memory of 2068 3260 Sysqemeucjs.exe 101 PID 2068 wrote to memory of 932 2068 Sysqemejaoj.exe 102 PID 2068 wrote to memory of 932 2068 Sysqemejaoj.exe 102 PID 2068 wrote to memory of 932 2068 Sysqemejaoj.exe 102 PID 932 wrote to memory of 4164 932 Sysqembskoe.exe 103 PID 932 wrote to memory of 4164 932 Sysqembskoe.exe 103 PID 932 wrote to memory of 4164 932 Sysqembskoe.exe 103 PID 4164 wrote to memory of 364 4164 Sysqemzbvws.exe 104 PID 4164 wrote to memory of 364 4164 Sysqemzbvws.exe 104 PID 4164 wrote to memory of 364 4164 Sysqemzbvws.exe 104 PID 364 wrote to memory of 1920 364 Sysqemeyaef.exe 105 PID 364 wrote to memory of 1920 364 Sysqemeyaef.exe 105 PID 364 wrote to memory of 1920 364 Sysqemeyaef.exe 105 PID 1920 wrote to memory of 2268 1920 Sysqemhfgpv.exe 106 PID 1920 wrote to memory of 2268 1920 Sysqemhfgpv.exe 106 PID 1920 wrote to memory of 2268 1920 Sysqemhfgpv.exe 106 PID 2268 wrote to memory of 1304 2268 Sysqemhueum.exe 108 PID 2268 wrote to memory of 1304 2268 Sysqemhueum.exe 108 PID 2268 wrote to memory of 1304 2268 Sysqemhueum.exe 108 PID 1304 wrote to memory of 3508 1304 Sysqemhjbad.exe 109 PID 1304 wrote to memory of 3508 1304 Sysqemhjbad.exe 109 PID 1304 wrote to memory of 3508 1304 Sysqemhjbad.exe 109 PID 3508 wrote to memory of 1672 3508 Sysqemjttpw.exe 110 PID 3508 wrote to memory of 1672 3508 Sysqemjttpw.exe 110 PID 3508 wrote to memory of 1672 3508 Sysqemjttpw.exe 110 PID 1672 wrote to memory of 1648 1672 Sysqemjbuvh.exe 111 PID 1672 wrote to memory of 1648 1672 Sysqemjbuvh.exe 111 PID 1672 wrote to memory of 1648 1672 Sysqemjbuvh.exe 111 PID 1648 wrote to memory of 1152 1648 Sysqempcldj.exe 134 PID 1648 wrote to memory of 1152 1648 Sysqempcldj.exe 134 PID 1648 wrote to memory of 1152 1648 Sysqempcldj.exe 134 PID 1152 wrote to memory of 1444 1152 Sysqemjtfgg.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\68704df5d48d8d8c3117413eceea24d0_NeikiAnalytics.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgzpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgzpw.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunfrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunfrs.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrsmnk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrsmnk.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucdkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucdkd.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugqdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugqdr.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemurcvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemurcvf.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwyqyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyqyv.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzexik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzexik.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeffdb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeffdb.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeucjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeucjs.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejaoj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejaoj.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Sysqembskoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembskoe.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbvws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbvws.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyaef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyaef.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfgpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfgpv.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhueum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhueum.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjbad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjbad.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjttpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjttpw.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbuvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbuvh.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Sysqempcldj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempcldj.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjtfgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtfgg.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwditq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwditq.exe"23⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvxyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvxyc.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwovzy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwovzy.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlateb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlateb.exe"26⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmxrxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxrxk.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwskps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwskps.exe"28⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyomsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyomsn.exe"29⤵
- Executes dropped EXE
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgdify.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgdify.exe"30⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvjxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvjxs.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemowiph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowiph.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemysjip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemysjip.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkiiv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkiiv.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfbdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfbdg.exe"35⤵
- Executes dropped EXE
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwacvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwacvo.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglsgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglsgj.exe"37⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrswyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrswyl.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyohww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyohww.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemydghz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydghz.exe"40⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqaue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqaue.exe"41⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoucsx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoucsx.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqsrnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsrnp.exe"43⤵
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqxig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqxig.exe"44⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqbgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqbgf.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldvtk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldvtk.exe"46⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthgln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthgln.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlcwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlcwv.exe"48⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Sysqembpnpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembpnpy.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldpsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldpsi.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgujai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgujai.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcxlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcxlm.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgndvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgndvc.exe"53⤵
- Executes dropped EXE
- Modifies registry class
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemauveq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemauveq.exe"54⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\Sysqembuwjc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembuwjc.exe"55⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemggqwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemggqwg.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Sysqembuhmt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembuhmt.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkvsz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkvsz.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdjlni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjlni.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdjuau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjuau.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnizdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnizdy.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnijbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnijbd.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemismwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemismwv.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkcht.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkcht.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwamx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwamx.exe"65⤵
- Executes dropped EXE
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtorxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtorxn.exe"66⤵
- Checks computer location settings
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvngsw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvngsw.exe"67⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxisad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxisad.exe"68⤵
- Modifies registry class
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgqwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgqwc.exe"69⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqixrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqixrh.exe"70⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvgdrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgdrp.exe"71⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnznpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnznpu.exe"72⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemprfsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprfsy.exe"73⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhjqpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjqpx.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"75⤵
- Modifies registry class
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnsknf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnsknf.exe"76⤵
- Checks computer location settings
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"77⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdbgzd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbgzd.exe"78⤵
- Modifies registry class
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdoui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdoui.exe"79⤵
- Checks computer location settings
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhyhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhyhr.exe"80⤵
- Checks computer location settings
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcigci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcigci.exe"81⤵
- Modifies registry class
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfsfra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfsfra.exe"82⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqhkkc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqhkkc.exe"83⤵
- Checks computer location settings
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuxhfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxhfy.exe"84⤵
- Checks computer location settings
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzkjsd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkjsd.exe"85⤵
- Modifies registry class
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmqna.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmqna.exe"86⤵
- Modifies registry class
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Sysqempwjqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempwjqe.exe"87⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfmedw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmedw.exe"88⤵
- Modifies registry class
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhafgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhafgg.exe"89⤵
- Checks computer location settings
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucmbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucmbd.exe"90⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcgyug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcgyug.exe"91⤵
- Modifies registry class
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"92⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzpsah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpsah.exe"93⤵
- Modifies registry class
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefyao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefyao.exe"94⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\Sysqempjaqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjaqi.exe"95⤵
- Modifies registry class
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfnbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfnbq.exe"96⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkterk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkterk.exe"97⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzbqjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbqjl.exe"98⤵
- Checks computer location settings
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchfzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchfzm.exe"99⤵
- Checks computer location settings
- Modifies registry class
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzfnnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzfnnz.exe"100⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemutecl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutecl.exe"101⤵
- Checks computer location settings
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzjkdt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjkdt.exe"102⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwzqda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzqda.exe"103⤵
- Modifies registry class
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcizdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcizdc.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"105⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Sysqemubmzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubmzh.exe"106⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Sysqemryumu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryumu.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmlcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmlcg.exe"108⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjcrch.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcrch.exe"109⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcugib.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcugib.exe"110⤵
- Checks computer location settings
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzsonf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzsonf.exe"111⤵
- Checks computer location settings
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhwzgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwzgi.exe"112⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmqitt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqitt.exe"113⤵
- Modifies registry class
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwohs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwohs.exe"114⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwmuhz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmuhz.exe"115⤵
- Checks computer location settings
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemukcue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukcue.exe"116⤵
- Checks computer location settings
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobwxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobwxb.exe"117⤵
- Modifies registry class
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtddsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtddsy.exe"118⤵
- Modifies registry class
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxzfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxzfw.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmdpvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdpvj.exe"120⤵
- Checks computer location settings
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrrys.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrrys.exe"121⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyjsbw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjsbw.exe"122⤵
- Checks computer location settings
PID:4432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-