Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe
-
Size
89KB
-
MD5
2f445a7aab57259ad4020890af599900
-
SHA1
6c1cac89e074a97f04b2ebc648cc368147dde498
-
SHA256
2fbf31f8826f5a866da5daca5dafe8926921bed911e182b99c9eaf0abf9743c1
-
SHA512
159ce7a12c1797e2823b65fc242efbd59891a5b92700e63bdf76c6a4183ec7b4ee8e306f0f519bfd218684d71cdd9a0a61823798e3e072778c998bfa8fc5b2cc
-
SSDEEP
1536:gGaq93mQy5PV4MSu4M3vfAlA89mWMMF4pzYU2qIUZ6kd+lG:g5MaVVnLA0WLM0Uvh6kd+lG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkycpj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempjpvm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzqypd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhwfcg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtmtak.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrtelv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemosagg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjmjoy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrqqyo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemgsomj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhdzhd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnivkr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmyhqb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemeyaax.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemptcyq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtlozu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwevky.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqwthc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnuplb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcjqzn.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemppdrx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemprwvu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemurnzy.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrfeos.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemszpjp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkvpcd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkwles.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemgxcyk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemgfqsa.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcpdrc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhkyue.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfzgcq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemobpzw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemeivty.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvdjqt.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuvkan.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhsckv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempfjmt.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemyakvw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempozzw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemknmjq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcqrie.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemesrbv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfimmk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmrqxx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemusgdo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempevmw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvqdto.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsokzi.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfpaqr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzbzwx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemblmwn.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemstxtq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemvprgn.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkfhnn.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemshxcq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempdhgg.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxqcre.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrkcod.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemlkult.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtgkjw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkgojr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcyylj.exe -
Executes dropped EXE 64 IoCs
pid Process 2256 Sysqemcxehz.exe 3928 Sysqemcjqzn.exe 4944 Sysqemhkyue.exe 4676 Sysqemnivkr.exe 3024 Sysqempojnh.exe 2036 Sysqemxsuaq.exe 4976 Sysqemcqrie.exe 4004 Sysqemqdiyk.exe 3276 Sysqemacmdc.exe 4936 Sysqemkucbh.exe 3068 Sysqemvqdto.exe 1200 Sysqemcyylj.exe 3164 Sysqemcyxlp.exe 4968 Sysqemkrwme.exe 4560 Sysqemsokzi.exe 4900 Sysqemckljp.exe 1056 Sysqemhperi.exe 3272 Sysqemppdrx.exe 836 Sysqemxqcre.exe 4944 Sysqemfjbss.exe 5016 Sysqempifpd.exe 4036 Sysqemxfbco.exe 748 Sysqemzsdfk.exe 3068 Sysqemvdjqt.exe 4396 Sysqemuvkan.exe 2936 Sysqemifqlq.exe 3928 Sysqemsarvg.exe 3256 Sysqemczvtq.exe 3868 Sysqemmyhqb.exe 3788 Sysqemcsfqw.exe 3112 Sysqempqbhy.exe 2696 Sysqemzbzwx.exe 3276 Sysqemklqme.exe 3688 Sysqemfzgcq.exe 232 Sysqemrfzky.exe 4464 Sysqemhvlyq.exe 4792 Sysqemprwvu.exe 3016 Sysqemrnytv.exe 4616 Sysqemzrige.exe 4368 Sysqemesrbv.exe 4936 Sysqembmmot.exe 468 Sysqemcmvte.exe 3464 Sysqemhwfcg.exe 3324 Sysqemeabhr.exe 4008 Sysqemhsckv.exe 2144 Sysqemkzraw.exe 4368 Sysqemosagg.exe 2696 Sysqemeivty.exe 4644 Sysqemrkcod.exe 4680 Sysqemhtooe.exe 2580 Sysqemuvekb.exe 4596 Sysqempfjmt.exe 1268 Sysqemuvpns.exe 5032 Sysqemwuuyw.exe 4364 Sysqemjimyw.exe 3360 Sysqemovhtb.exe 1192 Sysqemjmjoy.exe 2364 Sysqemtlozu.exe 2428 Sysqemocqbr.exe 4032 Sysqemldjuz.exe 1468 Sysqembtwhr.exe 2144 Sysqemtelxf.exe 2868 Sysqemrqqyo.exe 2020 Sysqemtmtak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmtfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshxcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemknmjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmyhqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdievm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfimmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemacmdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkrwme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfjbss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsarvg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcmvte.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemusgdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjatwp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkcod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqdcaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemstxtq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzqnz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemovhtb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhdzhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrvjhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfzgcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtlozu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvprgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqematafo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemprabi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkxgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyaax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmmot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeabhr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgsomj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtstge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzhrxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqrie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqdiyk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzrige.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembvbkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqsvtv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemppool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnuplb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchiap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzbzwx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrrswu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempzkqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemklqme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdgjsq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembjpsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhkyue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqwthc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkvpcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzgxsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkucbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxqcre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhtooe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlqmdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwles.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdhgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnivkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcsfqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwevky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblmwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobqeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemunqjw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemosagg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyakvw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2256 1076 2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe 92 PID 1076 wrote to memory of 2256 1076 2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe 92 PID 1076 wrote to memory of 2256 1076 2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe 92 PID 2256 wrote to memory of 3928 2256 Sysqemcxehz.exe 93 PID 2256 wrote to memory of 3928 2256 Sysqemcxehz.exe 93 PID 2256 wrote to memory of 3928 2256 Sysqemcxehz.exe 93 PID 3928 wrote to memory of 4944 3928 Sysqemcjqzn.exe 95 PID 3928 wrote to memory of 4944 3928 Sysqemcjqzn.exe 95 PID 3928 wrote to memory of 4944 3928 Sysqemcjqzn.exe 95 PID 4944 wrote to memory of 4676 4944 Sysqemhkyue.exe 98 PID 4944 wrote to memory of 4676 4944 Sysqemhkyue.exe 98 PID 4944 wrote to memory of 4676 4944 Sysqemhkyue.exe 98 PID 4676 wrote to memory of 3024 4676 Sysqemnivkr.exe 99 PID 4676 wrote to memory of 3024 4676 Sysqemnivkr.exe 99 PID 4676 wrote to memory of 3024 4676 Sysqemnivkr.exe 99 PID 3024 wrote to memory of 2036 3024 Sysqempojnh.exe 100 PID 3024 wrote to memory of 2036 3024 Sysqempojnh.exe 100 PID 3024 wrote to memory of 2036 3024 Sysqempojnh.exe 100 PID 2036 wrote to memory of 4976 2036 Sysqemxsuaq.exe 101 PID 2036 wrote to memory of 4976 2036 Sysqemxsuaq.exe 101 PID 2036 wrote to memory of 4976 2036 Sysqemxsuaq.exe 101 PID 4976 wrote to memory of 4004 4976 Sysqemcqrie.exe 102 PID 4976 wrote to memory of 4004 4976 Sysqemcqrie.exe 102 PID 4976 wrote to memory of 4004 4976 Sysqemcqrie.exe 102 PID 4004 wrote to memory of 3276 4004 Sysqemqdiyk.exe 135 PID 4004 wrote to memory of 3276 4004 Sysqemqdiyk.exe 135 PID 4004 wrote to memory of 3276 4004 Sysqemqdiyk.exe 135 PID 3276 wrote to memory of 4936 3276 Sysqemacmdc.exe 104 PID 3276 wrote to memory of 4936 3276 Sysqemacmdc.exe 104 PID 3276 wrote to memory of 4936 3276 Sysqemacmdc.exe 104 PID 4936 wrote to memory of 3068 4936 Sysqemkucbh.exe 124 PID 4936 wrote to memory of 3068 4936 Sysqemkucbh.exe 124 PID 4936 wrote to memory of 3068 4936 Sysqemkucbh.exe 124 PID 3068 wrote to memory of 1200 3068 Sysqemvqdto.exe 106 PID 3068 wrote to memory of 1200 3068 Sysqemvqdto.exe 106 PID 3068 wrote to memory of 1200 3068 Sysqemvqdto.exe 106 PID 1200 wrote to memory of 3164 1200 Sysqemcyylj.exe 107 PID 1200 wrote to memory of 3164 1200 Sysqemcyylj.exe 107 PID 1200 wrote to memory of 3164 1200 Sysqemcyylj.exe 107 PID 3164 wrote to memory of 4968 3164 Sysqemcyxlp.exe 108 PID 3164 wrote to memory of 4968 3164 Sysqemcyxlp.exe 108 PID 3164 wrote to memory of 4968 3164 Sysqemcyxlp.exe 108 PID 4968 wrote to memory of 4560 4968 Sysqemkrwme.exe 109 PID 4968 wrote to memory of 4560 4968 Sysqemkrwme.exe 109 PID 4968 wrote to memory of 4560 4968 Sysqemkrwme.exe 109 PID 4560 wrote to memory of 4900 4560 Sysqemsokzi.exe 110 PID 4560 wrote to memory of 4900 4560 Sysqemsokzi.exe 110 PID 4560 wrote to memory of 4900 4560 Sysqemsokzi.exe 110 PID 4900 wrote to memory of 1056 4900 Sysqemckljp.exe 113 PID 4900 wrote to memory of 1056 4900 Sysqemckljp.exe 113 PID 4900 wrote to memory of 1056 4900 Sysqemckljp.exe 113 PID 1056 wrote to memory of 3272 1056 Sysqemhperi.exe 116 PID 1056 wrote to memory of 3272 1056 Sysqemhperi.exe 116 PID 1056 wrote to memory of 3272 1056 Sysqemhperi.exe 116 PID 3272 wrote to memory of 836 3272 Sysqemppdrx.exe 117 PID 3272 wrote to memory of 836 3272 Sysqemppdrx.exe 117 PID 3272 wrote to memory of 836 3272 Sysqemppdrx.exe 117 PID 836 wrote to memory of 4944 836 Sysqemxqcre.exe 118 PID 836 wrote to memory of 4944 836 Sysqemxqcre.exe 118 PID 836 wrote to memory of 4944 836 Sysqemxqcre.exe 118 PID 4944 wrote to memory of 5016 4944 Sysqemfjbss.exe 121 PID 4944 wrote to memory of 5016 4944 Sysqemfjbss.exe 121 PID 4944 wrote to memory of 5016 4944 Sysqemfjbss.exe 121 PID 5016 wrote to memory of 4036 5016 Sysqempifpd.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2f445a7aab57259ad4020890af599900_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcxehz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxehz.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcjqzn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjqzn.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkyue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkyue.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnivkr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnivkr.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Sysqempojnh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempojnh.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxsuaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxsuaq.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqrie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqrie.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdiyk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdiyk.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacmdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacmdc.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkucbh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkucbh.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqdto.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqdto.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcyylj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyylj.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcyxlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyxlp.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrwme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrwme.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsokzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsokzi.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemppdrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppdrx.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxqcre.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqcre.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfjbss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjbss.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Sysqempifpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempifpd.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxfbco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxfbco.exe"23⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzsdfk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzsdfk.exe"24⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvdjqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdjqt.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvkan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvkan.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemifqlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemifqlq.exe"27⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsarvg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsarvg.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemczvtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczvtq.exe"29⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmyhqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmyhqb.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsfqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsfqw.exe"31⤵
- Executes dropped EXE
- Modifies registry class
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\Sysqempqbhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqbhy.exe"32⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbzwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbzwx.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklqme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklqme.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzgcq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzgcq.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrfzky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfzky.exe"36⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhvlyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvlyq.exe"37⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemprwvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprwvu.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrnytv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrnytv.exe"39⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrige.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrige.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemesrbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemesrbv.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmmot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmmot.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcmvte.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmvte.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhwfcg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwfcg.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeabhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeabhr.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhsckv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhsckv.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkzraw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkzraw.exe"47⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosagg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosagg.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeivty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeivty.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkcod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkcod.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtooe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtooe.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvekb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvekb.exe"52⤵
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfjmt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfjmt.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"54⤵
- Executes dropped EXE
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwuuyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuuyw.exe"55⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjimyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjimyw.exe"56⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemovhtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovhtb.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmjoy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmjoy.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlozu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlozu.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemocqbr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemocqbr.exe"60⤵
- Executes dropped EXE
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldjuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldjuz.exe"61⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtwhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtwhr.exe"62⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtelxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtelxf.exe"63⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrqqyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqqyo.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmtak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmtak.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrswu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrswu.exe"66⤵
- Modifies registry class
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqfyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqfyy.exe"67⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgsomj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgsomj.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfecv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfecv.exe"69⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqgzuw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgzuw.exe"70⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwevky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwevky.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqembvbkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvbkg.exe"72⤵
- Modifies registry class
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlydaz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlydaz.exe"73⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyakvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyakvw.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqsvtv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsvtv.exe"75⤵
- Modifies registry class
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlglrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlglrp.exe"76⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtgkjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtgkjw.exe"77⤵
- Checks computer location settings
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblmwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblmwn.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobpzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobpzw.exe"79⤵
- Checks computer location settings
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefpua.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefpua.exe"80⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemobqeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobqeh.exe"81⤵
- Modifies registry class
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwthc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwthc.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoubup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoubup.exe"83⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgfqsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfqsa.exe"84⤵
- Checks computer location settings
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgjsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgjsq.exe"85⤵
- Modifies registry class
PID:936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlkult.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlkult.exe"86⤵
- Checks computer location settings
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtelv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtelv.exe"87⤵
- Checks computer location settings
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtstge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtstge.exe"88⤵
- Modifies registry class
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvwvey.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwvey.exe"89⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Sysqembjpsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembjpsc.exe"90⤵
- Modifies registry class
PID:636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdievm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdievm.exe"91⤵
- Modifies registry class
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaubnw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaubnw.exe"92⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemosfdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosfdq.exe"93⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlqmdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqmdr.exe"94⤵
- Modifies registry class
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvprgn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvprgn.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolrrj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolrrj.exe"96⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkgus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkgus.exe"97⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdikcn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdikcn.exe"98⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkrxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkrxs.exe"99⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkfwnk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfwnk.exe"100⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqdcaj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdcaj.exe"101⤵
- Modifies registry class
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytrgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytrgp.exe"102⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgxcyk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxcyk.exe"103⤵
- Checks computer location settings
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemppool.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppool.exe"104⤵
- Modifies registry class
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszpjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszpjp.exe"105⤵
- Checks computer location settings
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkvpcd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvpcd.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwphd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwphd.exe"107⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\Sysqematafo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqematafo.exe"108⤵
- Modifies registry class
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffust.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffust.exe"109⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqbwqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbwqm.exe"110⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemstxtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemstxtq.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwles.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwles.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdeowj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdeowj.exe"113⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\Sysqemllluo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllluo.exe"114⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnkaxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkaxy.exe"115⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqzqnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzqnz.exe"116⤵
- Modifies registry class
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkfhnn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfhnn.exe"117⤵
- Checks computer location settings
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpaqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpaqr.exe"118⤵
- Checks computer location settings
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkdyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkdyy.exe"119⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfimmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfimmk.exe"120⤵
- Checks computer location settings
- Modifies registry class
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemskbhh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemskbhh.exe"121⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhdzhd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhdzhd.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:2620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-