Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe
-
Size
549KB
-
MD5
d2358cc1907ec15e9a726401d75d1b40
-
SHA1
0f359c0d47e6a15056b6e4d121a5f9700bfd726d
-
SHA256
6ae6288538a616e5ded595665888ceac32d44de3797d212607b0f9b9cca50ca0
-
SHA512
0de04ad68d18e49bd31513ea0cbbb27112d2e7210b7201f2ecf55ca3fd2aa4d1c1bed0796d6f8fcb1d906ea6d6e72107a68cca9594897df3c05a90deb7d1673d
-
SSDEEP
3072:iCaoAs1k1Pol0xPTM7mBCAdJSSxPUkl3ViFNdAMQTCk/dN92sdNhavtrVdewnAxX:iqDwwl0xPTMiB9JSSxPUKIWdod3Xmx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 61 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemzwfrc.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemkhxum.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemzvgcs.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembkqrt.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemqxpyy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemynuxv.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemvfgme.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemioywx.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemqpoyh.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemoubup.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemgqcsx.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemessgg.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembakea.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemzsqoq.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemmajkv.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemryael.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemkhwjw.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqempxygp.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemalhne.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemfkixz.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemtphbc.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemxhhic.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemkasvr.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemyghgz.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemxzxbg.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemxxcfy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemocvxi.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembaigu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemjkyvx.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemdfooo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemqefbk.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemoeeao.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemvljou.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemqsrao.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemzacxa.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemgfulj.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemzrolk.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqempnifa.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemprvla.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemrslak.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembowlk.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemchiuh.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembrmue.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemtkzhy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemnpcem.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemzdffx.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemwljbf.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemjimyw.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqempvcia.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemudugj.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemcizdc.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemzkqix.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemfgvvp.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemfbmlb.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemygvhb.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemnmoty.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemhmpov.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemojpfo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemphtlm.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemubhdr.exe -
Executes dropped EXE 60 IoCs
pid Process 4000 Sysqemqpoyh.exe 2504 Sysqemkhwjw.exe 2516 Sysqemchiuh.exe 4208 Sysqempvcia.exe 1184 Sysqemvljou.exe 3320 Sysqemxzxbg.exe 5024 Sysqemvfgme.exe 3344 Sysqemxhhic.exe 3160 Sysqemphtlm.exe 3920 Sysqemioywx.exe 2516 Sysqemzwfrc.exe 1196 Sysqemkhxum.exe 2032 Sysqemalhne.exe 3456 Sysqemkasvr.exe 3424 Sysqemhmpov.exe 2980 Sysqemudugj.exe 2524 Sysqemfkixz.exe 2464 Sysqempnifa.exe 3932 Sysqemprvla.exe 3680 Sysqemcizdc.exe 3780 Sysqemessgg.exe 2432 Sysqemzvgcs.exe 836 Sysqemzdffx.exe 3920 Sysqemxxcfy.exe 5096 Sysqemubhdr.exe 5092 Sysqempxygp.exe 3720 Sysqemzsqoq.exe 228 Sysqembkqrt.exe 1788 Sysqemzacxa.exe 1192 Sysqemocvxi.exe 3964 Sysqemjimyw.exe 4004 Sysqemgfulj.exe 4304 Sysqembaigu.exe 4196 Sysqembakea.exe 4804 Sysqemojpfo.exe 1060 Sysqemmajkv.exe 208 Sysqemzrolk.exe 4608 Sysqemzkqix.exe 3636 Sysqemwljbf.exe 2680 Sysqemryael.exe 4304 Sysqembrmue.exe 4196 Sysqemrslak.exe 3992 Sysqemjkyvx.exe 3148 Sysqembowlk.exe 1600 Sysqemdfooo.exe 1288 Sysqemtkzhy.exe 3160 Sysqemoubup.exe 2032 Sysqemgqcsx.exe 4500 Sysqemqefbk.exe 2000 Sysqemqxpyy.exe 1656 Sysqemtphbc.exe 4452 Sysqemygvhb.exe 4992 Sysqemynuxv.exe 4608 Sysqemfgvvp.exe 2172 Sysqemyghgz.exe 3660 Sysqemnpcem.exe 4496 Sysqemoeeao.exe 3164 Sysqemqsrao.exe 4916 Sysqemnmoty.exe 1568 Sysqemfbmlb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 61 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxzxbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemessgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxxcfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubhdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnmoty.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoubup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqefbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyghgz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqpoyh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmpov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmajkv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjkyvx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdfooo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwljbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemynuxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkhwjw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfgme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwfrc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemudugj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembkqrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempvcia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembowlk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnpcem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdffx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzacxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemphtlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzvgcs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembaigu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrslak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzsqoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoeeao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfbmlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkhxum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkasvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgvvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvljou.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfkixz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzrolk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkqix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkzhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemprvla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembakea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqcsx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemalhne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjimyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembrmue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqxpyy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygvhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqsrao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcizdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempxygp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemocvxi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemryael.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtphbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempnifa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfulj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchiuh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxhhic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemioywx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemojpfo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 4000 4400 d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe 91 PID 4400 wrote to memory of 4000 4400 d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe 91 PID 4400 wrote to memory of 4000 4400 d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe 91 PID 4000 wrote to memory of 2504 4000 Sysqemqpoyh.exe 92 PID 4000 wrote to memory of 2504 4000 Sysqemqpoyh.exe 92 PID 4000 wrote to memory of 2504 4000 Sysqemqpoyh.exe 92 PID 2504 wrote to memory of 2516 2504 Sysqemkhwjw.exe 93 PID 2504 wrote to memory of 2516 2504 Sysqemkhwjw.exe 93 PID 2504 wrote to memory of 2516 2504 Sysqemkhwjw.exe 93 PID 2516 wrote to memory of 4208 2516 Sysqemchiuh.exe 94 PID 2516 wrote to memory of 4208 2516 Sysqemchiuh.exe 94 PID 2516 wrote to memory of 4208 2516 Sysqemchiuh.exe 94 PID 4208 wrote to memory of 1184 4208 Sysqempvcia.exe 95 PID 4208 wrote to memory of 1184 4208 Sysqempvcia.exe 95 PID 4208 wrote to memory of 1184 4208 Sysqempvcia.exe 95 PID 1184 wrote to memory of 3320 1184 Sysqemvljou.exe 96 PID 1184 wrote to memory of 3320 1184 Sysqemvljou.exe 96 PID 1184 wrote to memory of 3320 1184 Sysqemvljou.exe 96 PID 3320 wrote to memory of 5024 3320 Sysqemxzxbg.exe 97 PID 3320 wrote to memory of 5024 3320 Sysqemxzxbg.exe 97 PID 3320 wrote to memory of 5024 3320 Sysqemxzxbg.exe 97 PID 5024 wrote to memory of 3344 5024 Sysqemvfgme.exe 98 PID 5024 wrote to memory of 3344 5024 Sysqemvfgme.exe 98 PID 5024 wrote to memory of 3344 5024 Sysqemvfgme.exe 98 PID 3344 wrote to memory of 3160 3344 Sysqemxhhic.exe 101 PID 3344 wrote to memory of 3160 3344 Sysqemxhhic.exe 101 PID 3344 wrote to memory of 3160 3344 Sysqemxhhic.exe 101 PID 3160 wrote to memory of 3920 3160 Sysqemphtlm.exe 122 PID 3160 wrote to memory of 3920 3160 Sysqemphtlm.exe 122 PID 3160 wrote to memory of 3920 3160 Sysqemphtlm.exe 122 PID 3920 wrote to memory of 2516 3920 Sysqemioywx.exe 104 PID 3920 wrote to memory of 2516 3920 Sysqemioywx.exe 104 PID 3920 wrote to memory of 2516 3920 Sysqemioywx.exe 104 PID 2516 wrote to memory of 1196 2516 Sysqemzwfrc.exe 106 PID 2516 wrote to memory of 1196 2516 Sysqemzwfrc.exe 106 PID 2516 wrote to memory of 1196 2516 Sysqemzwfrc.exe 106 PID 1196 wrote to memory of 2032 1196 Sysqemkhxum.exe 107 PID 1196 wrote to memory of 2032 1196 Sysqemkhxum.exe 107 PID 1196 wrote to memory of 2032 1196 Sysqemkhxum.exe 107 PID 2032 wrote to memory of 3456 2032 Sysqemalhne.exe 109 PID 2032 wrote to memory of 3456 2032 Sysqemalhne.exe 109 PID 2032 wrote to memory of 3456 2032 Sysqemalhne.exe 109 PID 3456 wrote to memory of 3424 3456 Sysqemkasvr.exe 110 PID 3456 wrote to memory of 3424 3456 Sysqemkasvr.exe 110 PID 3456 wrote to memory of 3424 3456 Sysqemkasvr.exe 110 PID 3424 wrote to memory of 2980 3424 Sysqemhmpov.exe 111 PID 3424 wrote to memory of 2980 3424 Sysqemhmpov.exe 111 PID 3424 wrote to memory of 2980 3424 Sysqemhmpov.exe 111 PID 2980 wrote to memory of 2524 2980 Sysqemudugj.exe 114 PID 2980 wrote to memory of 2524 2980 Sysqemudugj.exe 114 PID 2980 wrote to memory of 2524 2980 Sysqemudugj.exe 114 PID 2524 wrote to memory of 2464 2524 Sysqemfkixz.exe 116 PID 2524 wrote to memory of 2464 2524 Sysqemfkixz.exe 116 PID 2524 wrote to memory of 2464 2524 Sysqemfkixz.exe 116 PID 2464 wrote to memory of 3932 2464 Sysqempnifa.exe 117 PID 2464 wrote to memory of 3932 2464 Sysqempnifa.exe 117 PID 2464 wrote to memory of 3932 2464 Sysqempnifa.exe 117 PID 3932 wrote to memory of 3680 3932 Sysqemprvla.exe 118 PID 3932 wrote to memory of 3680 3932 Sysqemprvla.exe 118 PID 3932 wrote to memory of 3680 3932 Sysqemprvla.exe 118 PID 3680 wrote to memory of 3780 3680 Sysqemcizdc.exe 119 PID 3680 wrote to memory of 3780 3680 Sysqemcizdc.exe 119 PID 3680 wrote to memory of 3780 3680 Sysqemcizdc.exe 119 PID 3780 wrote to memory of 2432 3780 Sysqemessgg.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d2358cc1907ec15e9a726401d75d1b40_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpoyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpoyh.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhwjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhwjw.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchiuh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchiuh.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqempvcia.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempvcia.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvljou.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvljou.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxzxbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxzxbg.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfgme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfgme.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhhic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhhic.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphtlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphtlm.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemioywx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemioywx.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzwfrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwfrc.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhxum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhxum.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalhne.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalhne.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkasvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkasvr.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmpov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmpov.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemudugj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudugj.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfkixz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkixz.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnifa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnifa.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemprvla.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprvla.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcizdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcizdc.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemessgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemessgg.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvgcs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvgcs.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdffx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdffx.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxxcfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxxcfy.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubhdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubhdr.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqempxygp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxygp.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzsqoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzsqoq.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkqrt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkqrt.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzacxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzacxa.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemocvxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemocvxi.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjimyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjimyw.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfulj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfulj.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqembaigu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembaigu.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\Sysqembakea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembakea.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojpfo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojpfo.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmajkv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmajkv.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrolk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrolk.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzkqix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkqix.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwljbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwljbf.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemryael.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryael.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrmue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrmue.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrslak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrslak.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjkyvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjkyvx.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Sysqembowlk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembowlk.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfooo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfooo.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkzhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkzhy.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoubup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoubup.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqcsx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqcsx.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqefbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqefbk.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxpyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxpyy.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtphbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtphbc.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygvhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygvhb.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemynuxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemynuxv.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgvvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgvvp.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyghgz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyghgz.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnpcem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnpcem.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoeeao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoeeao.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqsrao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsrao.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnmoty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmoty.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfbmlb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfbmlb.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxekbp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxekbp.exe"62⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Sysqemswocr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswocr.exe"63⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvggxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvggxv.exe"64⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemllqqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllqqf.exe"65⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkpmbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpmbv.exe"66⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\Sysqemimuga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemimuga.exe"67⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfyqhk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyqhk.exe"68⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemafipy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafipy.exe"69⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaftsp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaftsp.exe"70⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdbxiw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbxiw.exe"71⤵PID:180
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvthgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvthgj.exe"72⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkbuew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbuew.exe"73⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkfpoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfpoe.exe"74⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnmxef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmxef.exe"75⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiolar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiolar.exe"76⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaoxdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaoxdc.exe"77⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkvbdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvbdr.exe"78⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhttpj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhttpj.exe"79⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuymcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuymcu.exe"80⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\Sysqemksjve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksjve.exe"81⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcsvgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsvgp.exe"82⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwcytg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwcytg.exe"83⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemutjgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutjgf.exe"84⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\Sysqemprbpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemprbpu.exe"85⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\Sysqemceccn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemceccn.exe"86⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcxeat.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxeat.exe"87⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmwsvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmwsvr.exe"88⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcfpgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfpgp.exe"89⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzcxmb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcxmb.exe"90⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcybci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcybci.exe"91⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwqbfm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqbfm.exe"92⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmumyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmumyv.exe"93⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwmatt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmatt.exe"94⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzapju.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzapju.exe"95⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwfmof.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwfmof.exe"96⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtduur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtduur.exe"97⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwuuxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuuxv.exe"98⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrmpfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmpfe.exe"99⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuwqii.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwqii.exe"100⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\Sysqemonsvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemonsvz.exe"101⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjenei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjenei.exe"102⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\Sysqembxxbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxxbn.exe"103⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwdpkc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdpkc.exe"104⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrgvfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgvfn.exe"105⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemryfdt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryfdt.exe"106⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\Sysqemozyva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozyva.exe"107⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtfwrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfwrz.exe"108⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjrdbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrdbx.exe"109⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdxukd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxukd.exe"110⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjvaxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvaxc.exe"111⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgtikp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtikp.exe"112⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyhjnf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhjnf.exe"113⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemersoh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemersoh.exe"114⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyeweo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyeweo.exe"115⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvrcps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrcps.exe"116⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemymhkk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemymhkk.exe"117⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqxeax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxeax.exe"118⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoyzgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoyzgy.exe"119⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemliter.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemliter.exe"120⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiyccy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyccy.exe"121⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqrlas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrlas.exe"122⤵PID:4512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-