Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
a7f3ef628bc33990b59e34ea70856de0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7f3ef628bc33990b59e34ea70856de0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a7f3ef628bc33990b59e34ea70856de0_NeikiAnalytics.exe
-
Size
531KB
-
MD5
a7f3ef628bc33990b59e34ea70856de0
-
SHA1
b9cf9458c590337da390944a9783386aa60f659e
-
SHA256
02da1904ecd826732ab2965b37069c73aa8c70cc031b4ca7a9341373bf6fb618
-
SHA512
e710467f1597a1a12232db297eef540fd419d9bfa58266ffa5c87117ac9e75b89368f28de1b087b42ab2a7db283b7d9e8acca3db3bc536bb8199e9f8c0c8b0b2
-
SSDEEP
3072:4Cao5s1x1Pkl0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxA:4qal8l0xPTMiR9JSSxPUKYGdodH5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemehuyd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzxwix.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjpcrz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqlwza.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhuaur.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyjsbw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemrgisl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtscfl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjxnyv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtvyrh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembqeei.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemghvqh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwdklt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdcxab.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemoyzqv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyuptc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemubmzh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemcdrjs.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfmipe.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkmvlq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqzpdk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembbmlw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkdzzh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvnurq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvezkl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlzepv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqbgpt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvudsv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemufjcv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhepid.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzptmz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemguuim.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlhpwr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzcyyo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemicptt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgpufi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemaxcuc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemacfqm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemoswrb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemllzye.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemaxjxp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzacxa.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemygwpa.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfcumj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnznpu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemobwxb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemofbgu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjaskb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgfnif.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqapyy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgfyle.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempmbff.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlmqnp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhnrvr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemskbuz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlrona.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemuvici.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemsxpjn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembexxo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzonmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnsusz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjybkg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfmxlf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemujiqc.exe -
Executes dropped EXE 64 IoCs
pid Process 3476 Sysqemhnrvr.exe 4312 Sysqemwhnih.exe 1176 Sysqemyuptc.exe 1660 Sysqemzcyyo.exe 2516 Sysqemgvxyc.exe 4540 Sysqemowwzj.exe 4300 Sysqemozjrx.exe 3536 Sysqembqeei.exe 5112 Sysqemgojuo.exe 3280 Sysqemjybkg.exe 4624 Sysqemmxtuq.exe 4480 Sysqemolvxl.exe 2096 Sysqemygwpa.exe 3268 Sysqemghvqh.exe 4440 Sysqemroaij.exe 4340 Sysqemrgisl.exe 3744 Sysqembnodh.exe 4300 Sysqemuykba.exe 664 Sysqemlcaji.exe 1188 Sysqemzptmz.exe 2240 Sysqemmrahe.exe 60 Sysqembzvaf.exe 1788 Sysqemgfnif.exe 1136 Sysqemqapyy.exe 384 Sysqemgfyle.exe 5008 Sysqemyqnjp.exe 1684 Sysqemvnurq.exe 1364 Sysqemlsueu.exe 2924 Sysqemgnzum.exe 3844 Sysqemjpcrz.exe 3984 Sysqemyywka.exe 1236 Sysqemgftpg.exe 4548 Sysqemtscfl.exe 3232 Sysqemdaocw.exe 1756 Sysqemjxnyv.exe 2604 Sysqemyjsdz.exe 4092 Sysqemllzye.exe 2076 Sysqembbmlw.exe 2232 Sysqemodbgt.exe 2608 Sysqemyrdjv.exe 4220 Sysqemohpxn.exe 4556 Sysqemvezkl.exe 2536 Sysqemiggfq.exe 668 Sysqemacfqm.exe 5040 Sysqemqzpdk.exe 4496 Sysqemgtmvg.exe 3284 Sysqemypmou.exe 640 Sysqemfmxlf.exe 3292 Sysqemskbuz.exe 4044 Sysqemfmipe.exe 4848 Sysqemqlwza.exe 4028 Sysqemlzepv.exe 3768 Sysqemlrona.exe 3420 Sysqemguuim.exe 4672 Sysqemlhpwr.exe 5032 Sysqemfcumj.exe 408 Sysqemiltbb.exe 4440 Sysqemqbgpt.exe 1620 Sysqemnznpu.exe 4776 Sysqemaxjxp.exe 4996 Sysqemkwwit.exe 3968 Sysqemxyddq.exe 4028 Sysqemkmvlq.exe 4308 Sysqemafbll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrfequ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvezkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwkst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwqhcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgaqzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobwxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfnif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaxjxp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmktqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzptmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmrahe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvudsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzxwix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoswrb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyuptc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemguuim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemisoxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhgln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkbjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdche.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembbmlw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjpcrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemehuyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhnih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqbgpt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemacfqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwwit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemftugq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjsdz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrvlus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemspgbx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdcxab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemowwzj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemypmou.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlrona.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemppcml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemunahd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhppci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuvici.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeqxuj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemywibi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgylue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeqefn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyywka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmipe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzepv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkmvlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrffdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgpufi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvyrh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzcyyo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhuaur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdsut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlpiqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyqnjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdaocw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtmvg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkymlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubmzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofbgu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuykba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjxnyv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodbgt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 3476 4604 a7f3ef628bc33990b59e34ea70856de0_NeikiAnalytics.exe 82 PID 4604 wrote to memory of 3476 4604 a7f3ef628bc33990b59e34ea70856de0_NeikiAnalytics.exe 82 PID 4604 wrote to memory of 3476 4604 a7f3ef628bc33990b59e34ea70856de0_NeikiAnalytics.exe 82 PID 3476 wrote to memory of 4312 3476 Sysqemhnrvr.exe 85 PID 3476 wrote to memory of 4312 3476 Sysqemhnrvr.exe 85 PID 3476 wrote to memory of 4312 3476 Sysqemhnrvr.exe 85 PID 4312 wrote to memory of 1176 4312 Sysqemwhnih.exe 86 PID 4312 wrote to memory of 1176 4312 Sysqemwhnih.exe 86 PID 4312 wrote to memory of 1176 4312 Sysqemwhnih.exe 86 PID 1176 wrote to memory of 1660 1176 Sysqemyuptc.exe 88 PID 1176 wrote to memory of 1660 1176 Sysqemyuptc.exe 88 PID 1176 wrote to memory of 1660 1176 Sysqemyuptc.exe 88 PID 1660 wrote to memory of 2516 1660 Sysqemzcyyo.exe 89 PID 1660 wrote to memory of 2516 1660 Sysqemzcyyo.exe 89 PID 1660 wrote to memory of 2516 1660 Sysqemzcyyo.exe 89 PID 2516 wrote to memory of 4540 2516 Sysqemgvxyc.exe 90 PID 2516 wrote to memory of 4540 2516 Sysqemgvxyc.exe 90 PID 2516 wrote to memory of 4540 2516 Sysqemgvxyc.exe 90 PID 4540 wrote to memory of 4300 4540 Sysqemowwzj.exe 110 PID 4540 wrote to memory of 4300 4540 Sysqemowwzj.exe 110 PID 4540 wrote to memory of 4300 4540 Sysqemowwzj.exe 110 PID 2604 wrote to memory of 3536 2604 Sysqemrvlus.exe 96 PID 2604 wrote to memory of 3536 2604 Sysqemrvlus.exe 96 PID 2604 wrote to memory of 3536 2604 Sysqemrvlus.exe 96 PID 3536 wrote to memory of 5112 3536 Sysqembqeei.exe 97 PID 3536 wrote to memory of 5112 3536 Sysqembqeei.exe 97 PID 3536 wrote to memory of 5112 3536 Sysqembqeei.exe 97 PID 5112 wrote to memory of 3280 5112 Sysqemgojuo.exe 100 PID 5112 wrote to memory of 3280 5112 Sysqemgojuo.exe 100 PID 5112 wrote to memory of 3280 5112 Sysqemgojuo.exe 100 PID 3280 wrote to memory of 4624 3280 Sysqemjybkg.exe 102 PID 3280 wrote to memory of 4624 3280 Sysqemjybkg.exe 102 PID 3280 wrote to memory of 4624 3280 Sysqemjybkg.exe 102 PID 4624 wrote to memory of 4480 4624 Sysqemmxtuq.exe 103 PID 4624 wrote to memory of 4480 4624 Sysqemmxtuq.exe 103 PID 4624 wrote to memory of 4480 4624 Sysqemmxtuq.exe 103 PID 4480 wrote to memory of 2096 4480 Sysqemolvxl.exe 104 PID 4480 wrote to memory of 2096 4480 Sysqemolvxl.exe 104 PID 4480 wrote to memory of 2096 4480 Sysqemolvxl.exe 104 PID 2096 wrote to memory of 3268 2096 Sysqemygwpa.exe 105 PID 2096 wrote to memory of 3268 2096 Sysqemygwpa.exe 105 PID 2096 wrote to memory of 3268 2096 Sysqemygwpa.exe 105 PID 3268 wrote to memory of 4440 3268 Sysqemghvqh.exe 106 PID 3268 wrote to memory of 4440 3268 Sysqemghvqh.exe 106 PID 3268 wrote to memory of 4440 3268 Sysqemghvqh.exe 106 PID 4440 wrote to memory of 4340 4440 Sysqemroaij.exe 107 PID 4440 wrote to memory of 4340 4440 Sysqemroaij.exe 107 PID 4440 wrote to memory of 4340 4440 Sysqemroaij.exe 107 PID 4340 wrote to memory of 3744 4340 Sysqemrgisl.exe 109 PID 4340 wrote to memory of 3744 4340 Sysqemrgisl.exe 109 PID 4340 wrote to memory of 3744 4340 Sysqemrgisl.exe 109 PID 3744 wrote to memory of 4300 3744 Sysqembnodh.exe 110 PID 3744 wrote to memory of 4300 3744 Sysqembnodh.exe 110 PID 3744 wrote to memory of 4300 3744 Sysqembnodh.exe 110 PID 2860 wrote to memory of 664 2860 Sysqemywibi.exe 112 PID 2860 wrote to memory of 664 2860 Sysqemywibi.exe 112 PID 2860 wrote to memory of 664 2860 Sysqemywibi.exe 112 PID 664 wrote to memory of 1188 664 Sysqemlcaji.exe 113 PID 664 wrote to memory of 1188 664 Sysqemlcaji.exe 113 PID 664 wrote to memory of 1188 664 Sysqemlcaji.exe 113 PID 1188 wrote to memory of 2240 1188 Sysqemzptmz.exe 115 PID 1188 wrote to memory of 2240 1188 Sysqemzptmz.exe 115 PID 1188 wrote to memory of 2240 1188 Sysqemzptmz.exe 115 PID 2240 wrote to memory of 60 2240 Sysqemmrahe.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7f3ef628bc33990b59e34ea70856de0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a7f3ef628bc33990b59e34ea70856de0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhnrvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhnrvr.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhnih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhnih.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyuptc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyuptc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzcyyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcyyo.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvxyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvxyc.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemowwzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowwzj.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemozjrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozjrx.exe"8⤵
- Executes dropped EXE
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvlus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvlus.exe"9⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqeei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqeei.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgojuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgojuo.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjybkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjybkg.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmxtuq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxtuq.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolvxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolvxl.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygwpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygwpa.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghvqh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghvqh.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemroaij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemroaij.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgisl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgisl.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnodh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnodh.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuykba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuykba.exe"20⤵
- Executes dropped EXE
- Modifies registry class
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywibi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywibi.exe"21⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcaji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcaji.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzptmz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzptmz.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrahe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrahe.exe"24⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzvaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzvaf.exe"25⤵
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfnif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfnif.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqapyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqapyy.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfyle.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfyle.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyqnjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyqnjp.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvnurq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvnurq.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsueu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsueu.exe"31⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"32⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpcrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpcrz.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyywka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyywka.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgftpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgftpg.exe"35⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtscfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtscfl.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdaocw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdaocw.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxnyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxnyv.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjsdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjsdz.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllzye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllzye.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\Sysqembbmlw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbmlw.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodbgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodbgt.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyrdjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyrdjv.exe"43⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohpxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohpxn.exe"44⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvezkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvezkl.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiggfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiggfq.exe"46⤵
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacfqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacfqm.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzpdk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzpdk.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtmvg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtmvg.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemypmou.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemypmou.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmxlf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmxlf.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemskbuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemskbuz.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmipe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmipe.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqlwza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqlwza.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzepv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzepv.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrona.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrona.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguuim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguuim.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhpwr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhpwr.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfcumj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfcumj.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiltbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiltbb.exe"60⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbgpt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbgpt.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnznpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnznpu.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaxjxp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaxjxp.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwwit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwwit.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"65⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkmvlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkmvlq.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafbll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafbll.exe"67⤵
- Executes dropped EXE
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemikneo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikneo.exe"68⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemflxjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemflxjk.exe"69⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemicptt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemicptt.exe"70⤵
- Checks computer location settings
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqslzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqslzz.exe"71⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Sysqemisoxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemisoxy.exe"72⤵
- Modifies registry class
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvudsv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvudsv.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnivkr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnivkr.exe"74⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcqpds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqpds.exe"75⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemftugq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemftugq.exe"76⤵
- Modifies registry class
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsvbbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsvbbn.exe"77⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkdzzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdzzh.exe"78⤵
- Checks computer location settings
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemppcml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppcml.exe"79⤵
- Modifies registry class
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunahd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunahd.exe"80⤵
- Modifies registry class
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhppci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhppci.exe"81⤵
- Modifies registry class
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvici.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvici.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqempmbff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempmbff.exe"83⤵
- Checks computer location settings
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfnzga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfnzga.exe"84⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemspgbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspgbx.exe"85⤵
- Modifies registry class
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmktqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmktqx.exe"86⤵
- Modifies registry class
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcdrjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdrjs.exe"87⤵
- Checks computer location settings
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsxpjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsxpjn.exe"88⤵
- Checks computer location settings
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwyywy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyywy.exe"89⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhuaur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhuaur.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwppo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwppo.exe"91⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcaair.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcaair.exe"92⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnhgln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhgln.exe"93⤵
- Modifies registry class
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkymlv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkymlv.exe"94⤵
- Modifies registry class
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxwptx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwptx.exe"95⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\Sysqemubmzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubmzh.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdsut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdsut.exe"97⤵
- Modifies registry class
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemufjcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemufjcv.exe"98⤵
- Checks computer location settings
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtkfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtkfl.exe"99⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhepid.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhepid.exe"100⤵
- Checks computer location settings
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemujiqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemujiqc.exe"101⤵
- Checks computer location settings
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkbjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkbjk.exe"102⤵
- Modifies registry class
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbvmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbvmh.exe"103⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzdche.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdche.exe"104⤵
- Modifies registry class
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqxuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqxuj.exe"105⤵
- Modifies registry class
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzacxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzacxa.exe"106⤵
- Checks computer location settings
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobwxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobwxb.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzxwix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxwix.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuoqln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuoqln.exe"109⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\Sysqembaxvv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembaxvv.exe"110⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuhbom.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhbom.exe"111⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyjsbw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjsbw.exe"112⤵
- Checks computer location settings
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofbgu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofbgu.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqembexxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembexxo.exe"114⤵
- Checks computer location settings
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"115⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtwkst.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwkst.exe"116⤵
- Modifies registry class
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjefy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjefy.exe"117⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrfequ.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfequ.exe"118⤵
- Modifies registry class
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrffdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrffdg.exe"119⤵
- Modifies registry class
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdklt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdklt.exe"120⤵
- Checks computer location settings
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehuyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehuyd.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlpiqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlpiqx.exe"122⤵
- Modifies registry class
PID:2480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-