Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
76s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe
-
Size
539KB
-
MD5
4c91f9d9512faad77c49ae9c89246070
-
SHA1
27a67a995b7c172d63f76dbc58e66283f34ae9c2
-
SHA256
c2d58a8eb3253ff4eb94c36364c163ea78260fe8d06ce9ba60df1f414a8a7cf0
-
SHA512
76d561c4f4c65fe35e430422566997f0e5699734c0b4825984e0a33fa896df4b30afab03c2d52028294e236bf63bef5693d8e7dd650ebdf1c6d39a4dd1756d82
-
SSDEEP
3072:wCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxy:wqDAwl0xPTMiR9JSSxPUKYGdodHh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemfliuj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemuirzh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemoompm.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemmdmpd.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjyrjd.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemdxyuu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemizcyp.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemhiakh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemfguhf.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjgbee.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemzlvwt.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrrbxf.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjjlep.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemqgknv.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemfnocb.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqempeolo.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtqqpt.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemnawhn.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemofbgu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemgctzq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemragur.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemsixms.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemuyajo.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqempmysk.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemulkam.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrgpun.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemoultw.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemwldll.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqememppb.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemzobyw.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtwkst.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemwsarl.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemgrvko.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemcozzr.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemxghfg.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemojpfo.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemmsaxg.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemdfyzv.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrzqtk.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemupwyc.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemwdjgi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemyczgd.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemwagea.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemohtxt.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemyfbjv.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemlafsq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemawmph.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqempjnuj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemqtvdf.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemvozwn.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrtspk.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemeviqt.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrrqjk.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtczru.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemeoteq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemglekl.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemdabgf.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemcumtu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjtytp.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemwrylb.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemgxail.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemkeakj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemoobjq.exe -
Executes dropped EXE 64 IoCs
pid Process 2616 Sysqemmkqww.exe 3048 Sysqemudyoe.exe 2908 Sysqemrlioa.exe 3176 Sysqemragur.exe 3352 Sysqemmsaxg.exe 2108 Sysqemmdmpd.exe 4000 Sysqemuwlpj.exe 3424 Sysqemrtspk.exe 2856 Sysqemulkam.exe 4692 Sysqemwrylb.exe 4112 Sysqemeviqt.exe 1832 Sysqemwojin.exe 1596 Sysqemqfdlk.exe 2396 Sysqemjyrjd.exe 1964 Sysqemrrqjk.exe 4488 Sysqemwagea.exe 4324 Sysqemrgpun.exe 1256 Sysqemjjlep.exe 4132 Sysqemlpspe.exe 1388 Sysqemtqqpt.exe 4228 Sysqemwwfsi.exe 3916 Sysqemdbpfr.exe 1080 Sysqemohtxt.exe 636 Sysqemwldll.exe 4208 Sysqemdtrdf.exe 4416 Sysqemjrwll.exe 1284 Sysqembrzik.exe 4136 Sysqemqkxjf.exe 4324 Sysqemjkige.exe 4144 Sysqemtczru.exe 4024 Sysqememppb.exe 3352 Sysqemdfyzv.exe 4992 Sysqemglekl.exe 4544 Sysqemtywaq.exe 2000 Sysqemgxail.exe 5068 Sysqemdkuvp.exe 1108 Sysqemoultw.exe 4592 Sysqemyfbjv.exe 1996 Sysqemjadgw.exe 640 Sysqemyjzej.exe 768 Sysqemgrvko.exe 4880 Sysqemlafsq.exe 4128 Sysqemoviax.exe 4360 Sysqemyghqw.exe 2856 Sysqemqgknv.exe 4328 Sysqemvsfja.exe 1852 Sysqemdabgf.exe 4604 Sysqemsixms.exe 3552 Sysqemsnifv.exe 2656 Sysqemdxyuu.exe 4136 Sysqemvuynq.exe 4312 Sysqemlnftx.exe 2324 Sysqemizcyp.exe 3904 Sysqemaobjl.exe 4860 Sysqemlvhuh.exe 4788 Sysqemqijhm.exe 2384 Sysqemlzdkj.exe 2284 Sysqemawmph.exe 4632 Sysqemqtvdf.exe 1080 Sysqemsloyj.exe 1596 Sysqemtwbdj.exe 4480 Sysqemqbgjb.exe 4100 Sysqemvozwn.exe 4144 Sysqemsmhcz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcozzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkeakj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjjlep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtywaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxyuu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuyajo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoalmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgbee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmsaxg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjrwll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemupwyc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoobjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrrqjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoviax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvuynq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmkess.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemudyoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdfyzv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemawmph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqtvdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemekqvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemojpfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemragur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvozwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjjtj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrzqtk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtczru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhzjh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwkst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyczgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemveifd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhiakh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyfbjv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwbdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsmhcz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfnocb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeviqt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjjheb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlnftx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuirzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwagea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaobjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuepno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembfdep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtqqpt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjzej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcumtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofbgu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdjgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmdmpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdkuvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlafsq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqbgjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuialw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempsrnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgctzq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemulkam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjkige.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoultw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqvdnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrrbxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmkqww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembrzik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrvko.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2616 1552 4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe 82 PID 1552 wrote to memory of 2616 1552 4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe 82 PID 1552 wrote to memory of 2616 1552 4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe 82 PID 2616 wrote to memory of 3048 2616 Sysqemmkqww.exe 83 PID 2616 wrote to memory of 3048 2616 Sysqemmkqww.exe 83 PID 2616 wrote to memory of 3048 2616 Sysqemmkqww.exe 83 PID 3048 wrote to memory of 2908 3048 Sysqemudyoe.exe 85 PID 3048 wrote to memory of 2908 3048 Sysqemudyoe.exe 85 PID 3048 wrote to memory of 2908 3048 Sysqemudyoe.exe 85 PID 2908 wrote to memory of 3176 2908 Sysqemrlioa.exe 88 PID 2908 wrote to memory of 3176 2908 Sysqemrlioa.exe 88 PID 2908 wrote to memory of 3176 2908 Sysqemrlioa.exe 88 PID 3176 wrote to memory of 3352 3176 Sysqemragur.exe 89 PID 3176 wrote to memory of 3352 3176 Sysqemragur.exe 89 PID 3176 wrote to memory of 3352 3176 Sysqemragur.exe 89 PID 3352 wrote to memory of 2108 3352 Sysqemmsaxg.exe 90 PID 3352 wrote to memory of 2108 3352 Sysqemmsaxg.exe 90 PID 3352 wrote to memory of 2108 3352 Sysqemmsaxg.exe 90 PID 2108 wrote to memory of 4000 2108 Sysqemmdmpd.exe 91 PID 2108 wrote to memory of 4000 2108 Sysqemmdmpd.exe 91 PID 2108 wrote to memory of 4000 2108 Sysqemmdmpd.exe 91 PID 4000 wrote to memory of 3424 4000 Sysqemuwlpj.exe 94 PID 4000 wrote to memory of 3424 4000 Sysqemuwlpj.exe 94 PID 4000 wrote to memory of 3424 4000 Sysqemuwlpj.exe 94 PID 3424 wrote to memory of 2856 3424 Sysqemrtspk.exe 95 PID 3424 wrote to memory of 2856 3424 Sysqemrtspk.exe 95 PID 3424 wrote to memory of 2856 3424 Sysqemrtspk.exe 95 PID 2856 wrote to memory of 4692 2856 Sysqemulkam.exe 96 PID 2856 wrote to memory of 4692 2856 Sysqemulkam.exe 96 PID 2856 wrote to memory of 4692 2856 Sysqemulkam.exe 96 PID 4692 wrote to memory of 4112 4692 Sysqemwrylb.exe 99 PID 4692 wrote to memory of 4112 4692 Sysqemwrylb.exe 99 PID 4692 wrote to memory of 4112 4692 Sysqemwrylb.exe 99 PID 4112 wrote to memory of 1832 4112 Sysqemeviqt.exe 100 PID 4112 wrote to memory of 1832 4112 Sysqemeviqt.exe 100 PID 4112 wrote to memory of 1832 4112 Sysqemeviqt.exe 100 PID 1832 wrote to memory of 1596 1832 Sysqemwojin.exe 101 PID 1832 wrote to memory of 1596 1832 Sysqemwojin.exe 101 PID 1832 wrote to memory of 1596 1832 Sysqemwojin.exe 101 PID 1596 wrote to memory of 2396 1596 Sysqemqfdlk.exe 102 PID 1596 wrote to memory of 2396 1596 Sysqemqfdlk.exe 102 PID 1596 wrote to memory of 2396 1596 Sysqemqfdlk.exe 102 PID 2396 wrote to memory of 1964 2396 Sysqemjyrjd.exe 103 PID 2396 wrote to memory of 1964 2396 Sysqemjyrjd.exe 103 PID 2396 wrote to memory of 1964 2396 Sysqemjyrjd.exe 103 PID 1964 wrote to memory of 4488 1964 Sysqemrrqjk.exe 104 PID 1964 wrote to memory of 4488 1964 Sysqemrrqjk.exe 104 PID 1964 wrote to memory of 4488 1964 Sysqemrrqjk.exe 104 PID 4488 wrote to memory of 4324 4488 Sysqemwagea.exe 123 PID 4488 wrote to memory of 4324 4488 Sysqemwagea.exe 123 PID 4488 wrote to memory of 4324 4488 Sysqemwagea.exe 123 PID 4324 wrote to memory of 1256 4324 Sysqemrgpun.exe 108 PID 4324 wrote to memory of 1256 4324 Sysqemrgpun.exe 108 PID 4324 wrote to memory of 1256 4324 Sysqemrgpun.exe 108 PID 1256 wrote to memory of 4132 1256 Sysqemjjlep.exe 110 PID 1256 wrote to memory of 4132 1256 Sysqemjjlep.exe 110 PID 1256 wrote to memory of 4132 1256 Sysqemjjlep.exe 110 PID 4132 wrote to memory of 1388 4132 Sysqemlpspe.exe 111 PID 4132 wrote to memory of 1388 4132 Sysqemlpspe.exe 111 PID 4132 wrote to memory of 1388 4132 Sysqemlpspe.exe 111 PID 1388 wrote to memory of 4228 1388 Sysqemtqqpt.exe 112 PID 1388 wrote to memory of 4228 1388 Sysqemtqqpt.exe 112 PID 1388 wrote to memory of 4228 1388 Sysqemtqqpt.exe 112 PID 4228 wrote to memory of 3916 4228 Sysqemwwfsi.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4c91f9d9512faad77c49ae9c89246070_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmkqww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkqww.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemudyoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudyoe.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlioa.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemragur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemragur.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmsaxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsaxg.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmdmpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdmpd.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwlpj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwlpj.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtspk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtspk.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemulkam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemulkam.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrylb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrylb.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeviqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeviqt.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwojin.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwojin.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqfdlk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqfdlk.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjyrjd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjyrjd.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrqjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrqjk.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwagea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwagea.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgpun.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgpun.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjjlep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjlep.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlpspe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlpspe.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqqpt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqqpt.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwwfsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwfsi.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbpfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbpfr.exe"23⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohtxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohtxt.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwldll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwldll.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtrdf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtrdf.exe"26⤵
- Executes dropped EXE
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjrwll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrwll.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrzik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrzik.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqkxjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkxjf.exe"29⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjkige.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjkige.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtczru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtczru.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Sysqememppb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqememppb.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfyzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfyzv.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglekl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglekl.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtywaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtywaq.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxail.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxail.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdkuvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkuvp.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoultw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoultw.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfbjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfbjv.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjadgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjadgw.exe"40⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjzej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjzej.exe"41⤵
- Executes dropped EXE
- Modifies registry class
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrvko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrvko.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlafsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlafsq.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoviax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoviax.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyghqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyghqw.exe"45⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqgknv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgknv.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvsfja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvsfja.exe"47⤵
- Executes dropped EXE
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdabgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdabgf.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsixms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsixms.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsnifv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnifv.exe"50⤵
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxyuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxyuu.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuynq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuynq.exe"52⤵
- Executes dropped EXE
- Modifies registry class
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnftx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnftx.exe"53⤵
- Executes dropped EXE
- Modifies registry class
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizcyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizcyp.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaobjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaobjl.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvhuh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvhuh.exe"56⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqijhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqijhm.exe"57⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzdkj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzdkj.exe"58⤵
- Executes dropped EXE
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawmph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawmph.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqtvdf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqtvdf.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsloyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsloyj.exe"61⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwbdj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwbdj.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbgjb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbgjb.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvozwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvozwn.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsmhcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsmhcz.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemveifd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemveifd.exe"66⤵
- Modifies registry class
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvdnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvdnm.exe"67⤵
- Modifies registry class
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvljou.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvljou.exe"68⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\Sysqemupwyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupwyc.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemancub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemancub.exe"70⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcfujt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfujt.exe"71⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfliuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfliuj.exe"72⤵
- Checks computer location settings
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnawhn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnawhn.exe"73⤵
- Checks computer location settings
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuirzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuirzh.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdjrfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjrfh.exe"75⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"76⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuepno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuepno.exe"77⤵
- Modifies registry class
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcumtu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcumtu.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuyajo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyajo.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlvwt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlvwt.exe"80⤵
- Checks computer location settings
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcozzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcozzr.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfnocb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfnocb.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhiakh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhiakh.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjjtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjjtj.exe"84⤵
- Modifies registry class
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevzjx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevzjx.exe"85⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"86⤵
- Checks computer location settings
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeoteq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeoteq.exe"87⤵
- Checks computer location settings
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\Sysqempjnuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjnuj.exe"88⤵
- Checks computer location settings
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkeakj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkeakj.exe"89⤵
- Checks computer location settings
- Modifies registry class
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxghfg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxghfg.exe"90⤵
- Checks computer location settings
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzyzik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzyzik.exe"91⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuialw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuialw.exe"92⤵
- Modifies registry class
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"93⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoobjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoobjq.exe"94⤵
- Checks computer location settings
- Modifies registry class
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjjheb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjheb.exe"95⤵
- Modifies registry class
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Sysqempsrnv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsrnv.exe"96⤵
- Modifies registry class
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoompm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoompm.exe"97⤵
- Checks computer location settings
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzqtk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzqtk.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzobyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzobyw.exe"99⤵
- Checks computer location settings
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqempeolo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempeolo.exe"100⤵
- Checks computer location settings
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbwrt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbwrt.exe"101⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoalmc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoalmc.exe"102⤵
- Modifies registry class
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Sysqempmysk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempmysk.exe"103⤵
- Checks computer location settings
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmkess.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkess.exe"104⤵
- Modifies registry class
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemekqvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekqvc.exe"105⤵
- Modifies registry class
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhzjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhzjh.exe"106⤵
- Modifies registry class
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjtytp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtytp.exe"107⤵
- Checks computer location settings
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofbgu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofbgu.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgctzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgctzq.exe"109⤵
- Checks computer location settings
- Modifies registry class
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojpfo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojpfo.exe"110⤵
- Checks computer location settings
- Modifies registry class
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwkst.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwkst.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwzovr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzovr.exe"112⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwdjgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdjgi.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwsarl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwsarl.exe"114⤵
- Checks computer location settings
PID:636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyczgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyczgd.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfdep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfdep.exe"116⤵
- Modifies registry class
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgbee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgbee.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjvrjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvrjv.exe"118⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrrbxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrbxf.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzopkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzopkq.exe"120⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\Sysqembznap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembznap.exe"121⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrslak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrslak.exe"122⤵PID:4028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-