Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 09:10
Behavioral task
behavioral1
Sample
e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe
-
Size
87KB
-
MD5
e6ab9e7cf68878476375e0cc1454b420
-
SHA1
c595ac2fbc061038e4d25d6a35bd1827661c84f9
-
SHA256
b1a556bbaa544f65a282421b1c59c48686e481cbd4007afe54d34382cac177a3
-
SHA512
d32726e76d6505d51e9184eae4bb1492110bb7b39201e3b1aa99945eed234602a48c949bcea0b40a7131116a5719f4aa4ece8ce015d8328450299fc1e736a89c
-
SSDEEP
1536:TYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nxP:0dEUfKj8BYbDiC1ZTK7sxtLUIGE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemobqeh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjukyj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemotbtf.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemunujr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemgyrny.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvfrgz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjlzql.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzfxqg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhwfcg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzacxa.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemaywye.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvpbes.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxpwrh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfgjdg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzmwvh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembusjh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtpgoq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsyfde.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemphtlm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemixfeu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrsgck.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfjxsx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemimkiu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzeghr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxfbsk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuvkth.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxydau.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempeolo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemoufvv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemywkcd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtduwc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhefaz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmfndp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrtsoa.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemeezde.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrejbq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqrauy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemchpyu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfirli.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrzvpp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxcqud.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemucmbd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembfdep.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsinzp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfyqhk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemigqwp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempejyh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsffud.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempwuhd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempjaqi.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemozkul.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemttzfq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemlzipa.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemadrjz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempdhsy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmvqph.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemctqkr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmpsna.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhkjld.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwxwwp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrlemj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkikaq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhppii.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkdviu.exe -
Executes dropped EXE 64 IoCs
pid Process 4112 Sysqempdhsy.exe 3216 Sysqemphtlm.exe 4800 Sysqemxhslb.exe 2280 Sysqemfirli.exe 4688 Sysqemknltb.exe 1736 Sysqemccjee.exe 4084 Sysqemkdies.exe 632 Sysqemucmbd.exe 1524 Sysqemcclcr.exe 3332 Sysqemixfeu.exe 1976 Sysqemrzvpp.exe 2476 Sysqemvzmaz.exe 4396 Sysqemzprmn.exe 1580 Sysqemhefaz.exe 1200 Sysqemmfndp.exe 1452 Sysqemxydau.exe 5000 Sysqemfcnnm.exe 4612 Sysqemkdviu.exe 4976 Sysqempjaqi.exe 1028 Sysqemrtsoa.exe 1996 Sysqemfgjdg.exe 3108 Sysqemkhryw.exe 4112 Sysqemzmamu.exe 3120 Sysqemnkwuo.exe 556 Sysqemhcyxl.exe 4920 Sysqemcwded.exe 1060 Sysqemmvqph.exe 1032 Sysqemhjzfu.exe 4272 Sysqemafzqq.exe 1532 Sysqemzmwvh.exe 4432 Sysqemeapdp.exe 4692 Sysqemhvslw.exe 2612 Sysqemuxagt.exe 208 Sysqemhzhbq.exe 3696 Sysqemhwfcg.exe 5104 Sysqemrkgfi.exe 1764 Sysqemjygpe.exe 1972 Sysqemzreqz.exe 1528 Sysqemeezde.exe 4480 Sysqemzvsgu.exe 4024 Sysqemkrtyj.exe 3372 Sysqemunujr.exe 652 Sysqempeolo.exe 1944 Sysqemwxwwp.exe 392 Sysqemrlemj.exe 3860 Sysqemmyvcd.exe 1972 Sysqemzacxa.exe 2908 Sysqemreyhc.exe 1988 Sysqemzxwix.exe 4332 Sysqemoufvv.exe 4268 Sysqemjlzql.exe 3720 Sysqemzfxqg.exe 4136 Sysqemyxfji.exe 3956 Sysqemrejbq.exe 1484 Sysqembhicr.exe 1752 Sysqemmazmq.exe 5084 Sysqemttzfq.exe 3004 Sysqemgyrny.exe 784 Sysqemwsxnt.exe 3060 Sysqemoopyi.exe 4072 Sysqemjfqbf.exe 216 Sysqembftye.exe 1472 Sysqembfdep.exe 1580 Sysqembusjh.exe -
resource yara_rule behavioral2/memory/4808-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000700000002354d-6.dat upx behavioral2/files/0x0008000000023549-41.dat upx behavioral2/files/0x000700000002354f-71.dat upx behavioral2/memory/3216-73-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0007000000023550-107.dat upx behavioral2/memory/4800-109-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000800000002354a-143.dat upx behavioral2/memory/2280-149-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0007000000023552-179.dat upx behavioral2/memory/4808-214-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0007000000023553-216.dat upx behavioral2/files/0x0007000000023554-251.dat upx behavioral2/memory/4112-258-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0007000000023555-288.dat upx behavioral2/memory/3216-291-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4800-325-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0007000000023556-327.dat upx behavioral2/files/0x0007000000023557-362.dat upx behavioral2/memory/3332-364-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0008000000023558-398.dat upx behavioral2/files/0x0009000000023302-434.dat upx behavioral2/memory/2476-436-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4688-466-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0009000000023305-472.dat upx behavioral2/memory/4396-474-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1736-504-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0008000000023317-510.dat upx behavioral2/memory/4084-541-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000800000002331d-547.dat upx behavioral2/memory/1200-549-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/632-579-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000800000002296f-586.dat upx behavioral2/memory/1524-616-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000a0000000232ff-622.dat upx behavioral2/memory/5000-624-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3332-654-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000900000002331e-660.dat upx behavioral2/memory/4612-662-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1976-668-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0009000000023320-698.dat upx behavioral2/memory/4976-699-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2476-727-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4396-761-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1580-795-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1200-797-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1452-828-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/5000-833-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4112-839-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4612-868-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4976-874-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1028-904-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1996-938-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3108-972-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4112-1006-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3120-1040-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/556-1075-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4920-1108-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1060-1142-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1032-1149-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4692-1153-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4272-1179-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/208-1217-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1532-1246-0x0000000000400000-0x0000000000492000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnseqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxojo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemphtlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjkzbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemceiyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrtsoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemknhwk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembgndu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgunxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaywye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkikaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgjdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembftye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemywkcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxrpfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemccjee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzxwix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjzfu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeezde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemihybw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdhsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnkwuo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtokmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemadrjz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfjxsx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfyqhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfzsep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsokbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkdies.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembfdep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjukyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjlzql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjfqbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmkkyi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempjagd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhefaz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmvqph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkrtyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempeolo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzfxqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobqeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxcqud.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsffud.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkdviu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhcyxl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemozkul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxpwrh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemctqkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkgfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembusjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempwuhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzreqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcjrvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsvofh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfrgz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaehmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoubup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempbvlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgbnax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmpsna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrsgck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwxbai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuvkth.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 4112 4808 e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe 90 PID 4808 wrote to memory of 4112 4808 e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe 90 PID 4808 wrote to memory of 4112 4808 e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe 90 PID 4112 wrote to memory of 3216 4112 Sysqempdhsy.exe 91 PID 4112 wrote to memory of 3216 4112 Sysqempdhsy.exe 91 PID 4112 wrote to memory of 3216 4112 Sysqempdhsy.exe 91 PID 3216 wrote to memory of 4800 3216 Sysqemphtlm.exe 94 PID 3216 wrote to memory of 4800 3216 Sysqemphtlm.exe 94 PID 3216 wrote to memory of 4800 3216 Sysqemphtlm.exe 94 PID 4800 wrote to memory of 2280 4800 Sysqemxhslb.exe 95 PID 4800 wrote to memory of 2280 4800 Sysqemxhslb.exe 95 PID 4800 wrote to memory of 2280 4800 Sysqemxhslb.exe 95 PID 2280 wrote to memory of 4688 2280 Sysqemfirli.exe 96 PID 2280 wrote to memory of 4688 2280 Sysqemfirli.exe 96 PID 2280 wrote to memory of 4688 2280 Sysqemfirli.exe 96 PID 4688 wrote to memory of 1736 4688 Sysqemknltb.exe 98 PID 4688 wrote to memory of 1736 4688 Sysqemknltb.exe 98 PID 4688 wrote to memory of 1736 4688 Sysqemknltb.exe 98 PID 1736 wrote to memory of 4084 1736 Sysqemccjee.exe 99 PID 1736 wrote to memory of 4084 1736 Sysqemccjee.exe 99 PID 1736 wrote to memory of 4084 1736 Sysqemccjee.exe 99 PID 4084 wrote to memory of 632 4084 Sysqemkdies.exe 100 PID 4084 wrote to memory of 632 4084 Sysqemkdies.exe 100 PID 4084 wrote to memory of 632 4084 Sysqemkdies.exe 100 PID 632 wrote to memory of 1524 632 Sysqemucmbd.exe 101 PID 632 wrote to memory of 1524 632 Sysqemucmbd.exe 101 PID 632 wrote to memory of 1524 632 Sysqemucmbd.exe 101 PID 1524 wrote to memory of 3332 1524 Sysqemcclcr.exe 102 PID 1524 wrote to memory of 3332 1524 Sysqemcclcr.exe 102 PID 1524 wrote to memory of 3332 1524 Sysqemcclcr.exe 102 PID 3332 wrote to memory of 1976 3332 Sysqemixfeu.exe 104 PID 3332 wrote to memory of 1976 3332 Sysqemixfeu.exe 104 PID 3332 wrote to memory of 1976 3332 Sysqemixfeu.exe 104 PID 1976 wrote to memory of 2476 1976 Sysqemrzvpp.exe 107 PID 1976 wrote to memory of 2476 1976 Sysqemrzvpp.exe 107 PID 1976 wrote to memory of 2476 1976 Sysqemrzvpp.exe 107 PID 2476 wrote to memory of 4396 2476 Sysqemvzmaz.exe 109 PID 2476 wrote to memory of 4396 2476 Sysqemvzmaz.exe 109 PID 2476 wrote to memory of 4396 2476 Sysqemvzmaz.exe 109 PID 4396 wrote to memory of 1580 4396 Sysqemzprmn.exe 110 PID 4396 wrote to memory of 1580 4396 Sysqemzprmn.exe 110 PID 4396 wrote to memory of 1580 4396 Sysqemzprmn.exe 110 PID 1580 wrote to memory of 1200 1580 Sysqemhefaz.exe 112 PID 1580 wrote to memory of 1200 1580 Sysqemhefaz.exe 112 PID 1580 wrote to memory of 1200 1580 Sysqemhefaz.exe 112 PID 1200 wrote to memory of 1452 1200 Sysqemmfndp.exe 115 PID 1200 wrote to memory of 1452 1200 Sysqemmfndp.exe 115 PID 1200 wrote to memory of 1452 1200 Sysqemmfndp.exe 115 PID 1452 wrote to memory of 5000 1452 Sysqemxydau.exe 117 PID 1452 wrote to memory of 5000 1452 Sysqemxydau.exe 117 PID 1452 wrote to memory of 5000 1452 Sysqemxydau.exe 117 PID 5000 wrote to memory of 4612 5000 Sysqemfcnnm.exe 118 PID 5000 wrote to memory of 4612 5000 Sysqemfcnnm.exe 118 PID 5000 wrote to memory of 4612 5000 Sysqemfcnnm.exe 118 PID 4612 wrote to memory of 4976 4612 Sysqemkdviu.exe 119 PID 4612 wrote to memory of 4976 4612 Sysqemkdviu.exe 119 PID 4612 wrote to memory of 4976 4612 Sysqemkdviu.exe 119 PID 4976 wrote to memory of 1028 4976 Sysqempjaqi.exe 120 PID 4976 wrote to memory of 1028 4976 Sysqempjaqi.exe 120 PID 4976 wrote to memory of 1028 4976 Sysqempjaqi.exe 120 PID 1028 wrote to memory of 1996 1028 Sysqemrtsoa.exe 121 PID 1028 wrote to memory of 1996 1028 Sysqemrtsoa.exe 121 PID 1028 wrote to memory of 1996 1028 Sysqemrtsoa.exe 121 PID 1996 wrote to memory of 3108 1996 Sysqemfgjdg.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e6ab9e7cf68878476375e0cc1454b420_NeikiAnalytics.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdhsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdhsy.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphtlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphtlm.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhslb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhslb.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfirli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfirli.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemknltb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemknltb.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemccjee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccjee.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdies.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdies.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucmbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucmbd.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcclcr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcclcr.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixfeu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixfeu.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzvpp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzvpp.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvzmaz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvzmaz.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzprmn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzprmn.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhefaz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhefaz.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfndp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfndp.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxydau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxydau.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfcnnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfcnnm.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdviu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdviu.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Sysqempjaqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjaqi.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtsoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtsoa.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgjdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgjdg.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhryw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhryw.exe"23⤵
- Executes dropped EXE
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmamu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmamu.exe"24⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkwuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkwuo.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhcyxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhcyxl.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcwded.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwded.exe"27⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmvqph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvqph.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjzfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjzfu.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafzqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafzqq.exe"30⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmwvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmwvh.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeapdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeapdp.exe"32⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhvslw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvslw.exe"33⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuxagt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxagt.exe"34⤵
- Executes dropped EXE
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzhbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzhbq.exe"35⤵
- Executes dropped EXE
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhwfcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwfcg.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkgfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkgfi.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjygpe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjygpe.exe"38⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzreqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzreqz.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeezde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeezde.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvsgu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvsgu.exe"41⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrtyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrtyj.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunujr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunujr.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\Sysqempeolo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempeolo.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwxwwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwxwwp.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlemj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlemj.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmyvcd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmyvcd.exe"47⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzacxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzacxa.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemreyhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemreyhc.exe"49⤵
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzxwix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxwix.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoufvv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoufvv.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjlzql.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjlzql.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzfxqg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzfxqg.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyxfji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxfji.exe"54⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrejbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrejbq.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhicr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhicr.exe"56⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmazmq.exe"57⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttzfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttzfq.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyrny.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyrny.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwsxnt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwsxnt.exe"60⤵
- Executes dropped EXE
PID:784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoopyi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoopyi.exe"61⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjfqbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfqbf.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\Sysqembftye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembftye.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:216 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfdep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfdep.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Sysqembusjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembusjh.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrbxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrbxf.exe"66⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\Sysqemywkcd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywkcd.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvigpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvigpb.exe"68⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemopjir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopjir.exe"69⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Sysqembgndu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgndu.exe"70⤵
- Modifies registry class
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwudtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwudtg.exe"71⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjkzbj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjkzbj.exe"72⤵
- Modifies registry class
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkkyi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkkyi.exe"73⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtnzjb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnzjb.exe"74⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgpgeg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpgeg.exe"75⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemobqeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobqeh.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtokmb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtokmb.exe"77⤵
- Modifies registry class
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgbbcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbbcg.exe"78⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnjpcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjpcb.exe"79⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoubup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoubup.exe"80⤵
- Modifies registry class
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzipa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzipa.exe"81⤵
- Checks computer location settings
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgunxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgunxa.exe"82⤵
- Modifies registry class
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsjnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsjnu.exe"83⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgbnax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbnax.exe"84⤵
- Modifies registry class
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtduwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtduwc.exe"85⤵
- Checks computer location settings
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpgoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpgoq.exe"86⤵
- Checks computer location settings
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjfbbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfbbi.exe"87⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvzgra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvzgra.exe"88⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqrauy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrauy.exe"89⤵
- Checks computer location settings
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemozkul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozkul.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfcgfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfcgfn.exe"91⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvwefi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwefi.exe"92⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnseqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnseqe.exe"93⤵
- Modifies registry class
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaywye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaywye.exe"94⤵
- Checks computer location settings
- Modifies registry class
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxojo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxojo.exe"95⤵
- Modifies registry class
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Sysqembjkwm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembjkwm.exe"96⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvpbes.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvpbes.exe"97⤵
- Checks computer location settings
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtnwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtnwv.exe"98⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnedmc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnedmc.exe"99⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdmzsp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmzsp.exe"100⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsyfde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsyfde.exe"101⤵
- Checks computer location settings
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemadrvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemadrvh.exe"102⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\Sysqemadrjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemadrjz.exe"103⤵
- Checks computer location settings
- Modifies registry class
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilngf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilngf.exe"104⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaaojv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaaojv.exe"105⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfjxsx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjxsx.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnnika.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnnika.exe"107⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfntiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfntiz.exe"108⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\Sysqempbvlb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempbvlb.exe"109⤵
- Modifies registry class
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemimkiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemimkiu.exe"110⤵
- Checks computer location settings
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchpyu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchpyu.exe"111⤵
- Checks computer location settings
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsinzp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsinzp.exe"112⤵
- Checks computer location settings
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfyqhk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyqhk.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzsep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzsep.exe"114⤵
- Modifies registry class
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxcqud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxcqud.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxrpfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxrpfn.exe"116⤵
- Modifies registry class
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkikaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkikaq.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemigqwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemigqwp.exe"118⤵
- Checks computer location settings
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemknhwk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemknhwk.exe"119⤵
- Modifies registry class
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxpwrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxpwrh.exe"120⤵
- Checks computer location settings
- Modifies registry class
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxemcs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxemcs.exe"121⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsvofh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsvofh.exe"122⤵
- Modifies registry class
PID:616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-