Analysis
-
max time kernel
104s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 21:32
Behavioral task
behavioral1
Sample
60cf48418b178d40edb69630742da8f0_NEIKI.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
60cf48418b178d40edb69630742da8f0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
60cf48418b178d40edb69630742da8f0_NEIKI.exe
-
Size
205KB
-
MD5
60cf48418b178d40edb69630742da8f0
-
SHA1
2fd08f7704b9745e52fcc971a4509a69a5709460
-
SHA256
63642116b6c842857a9d75a470c28846af611e4103160f14ab41ca70cac3604e
-
SHA512
5bd3c0a132f37a60c61798337eba96b1adcc34f2dd824387322831c8175a3723428dde482e27259991ffefd9cbd66919f22b82691908509a6adf88cd783663f4
-
SSDEEP
3072:SdEUfKj8BYbDiC1ZTK7sxtLUIG5yyoDU9q3XRrMBEGltj95y6hsYDRdX:SUSiZTK40syz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemztlpu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemluatl.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemcztmu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemqaaox.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemlizws.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemffoze.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemgyziz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemhoaih.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemmhxcf.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemcfonv.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemtvaov.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemokjtj.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemwaytf.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemotucb.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemispzu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemlcarl.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemvrxwt.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemgyrny.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemcnyfw.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemtejbj.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemkqsbs.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemjqwji.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemgtcmf.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemxaliw.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemgvfbn.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemsqvwi.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemxiyjc.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqembtqcb.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemmmqna.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqempdhdd.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemesxtm.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemoeeao.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 60cf48418b178d40edb69630742da8f0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemnehup.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemiqvqp.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemsrevp.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqempqatm.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemkufvi.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemoalpl.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemudxce.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemiudim.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemjimyw.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemafdct.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemnaxpw.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemldagp.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemoauqv.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemroeaw.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemjeldi.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqembfmcw.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemduiub.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemjnjqu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemdilhy.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemvfiiz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqememoaf.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemlzysu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemtnkxr.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemaotyq.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemybtks.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemtlxlv.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemceenu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemvmqrq.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemvrwly.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemficav.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemcbgvc.exe -
Executes dropped EXE 64 IoCs
pid Process 4216 Sysqemcbgvc.exe 5056 Sysqemkufvi.exe 3976 Sysqemutjsb.exe 3084 Sysqemhoaih.exe 2456 Sysqemuygtk.exe 3596 Sysqemxiyjc.exe 856 Sysqemxlkbq.exe 456 Sysqemmcvje.exe 4868 Sysqemmjsod.exe 1880 Sysqemobkev.exe 4604 Sysqempblkh.exe 4556 Sysqemotucb.exe 4348 Sysqemwiipe.exe 532 Sysqemconfs.exe 2696 Sysqemcvccj.exe 3416 Sysqemtyznl.exe 616 Sysqemmvqgh.exe 3788 Sysqembooyc.exe 3520 Sysqemjeldi.exe 3412 Sysqemorfrn.exe 1740 Sysqemogekq.exe 1016 Sysqemmhxcf.exe 512 Sysqemedxnu.exe 3944 Sysqemrttvw.exe 4040 Sysqemorbia.exe 5056 Sysqemokjtj.exe 4296 Sysqemlttbw.exe 4620 Sysqemttsbl.exe 4476 Sysqemrgoob.exe 4348 Sysqemuirmo.exe 1680 Sysqemoalpl.exe 884 Sysqemjybkg.exe 2288 Sysqembfmcw.exe 4264 Sysqemzzipv.exe 3852 Sysqemjcxai.exe 5032 Sysqemoauqv.exe 1916 Sysqemtjlqx.exe 640 Sysqemeucgw.exe 4408 Sysqemtnagr.exe 4920 Sysqembrlzu.exe 3412 Sysqemgtcmf.exe 4040 Sysqemlcmmh.exe 884 Sysqemeqlfd.exe 5012 Sysqemgyziz.exe 2492 Sysqemgqbgf.exe 1108 Sysqemjibjj.exe 3568 Sysqemvrxwt.exe 4160 Sysqemdsfjl.exe 2380 Sysqembtqcb.exe 1388 Sysqemqmwcw.exe 1528 Sysqemguiux.exe 1740 Sysqemycunn.exe 4832 Sysqemiqvqp.exe 4412 Sysqemworyr.exe 5072 Sysqemgvfbn.exe 1568 Sysqemgcuge.exe 680 Sysqemlizws.exe 4484 Sysqemtejbj.exe 3436 Sysqemvlqmz.exe 4564 Sysqemiyiuz.exe 2884 Sysqemnaxpw.exe 3852 Sysqemvfiiz.exe 2456 Sysqemsrevp.exe 1204 Sysqemdyjgt.exe -
resource yara_rule behavioral2/memory/4856-0-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00070000000233f6-6.dat upx behavioral2/memory/4216-37-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00080000000233f2-42.dat upx behavioral2/memory/5056-74-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00070000000233f8-73.dat upx behavioral2/files/0x00070000000233f9-108.dat upx behavioral2/files/0x00070000000233fa-143.dat upx behavioral2/files/0x00080000000233f3-178.dat upx behavioral2/files/0x00070000000233fc-213.dat upx behavioral2/files/0x00070000000233fd-248.dat upx behavioral2/memory/4856-255-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4216-281-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00070000000233fe-288.dat upx behavioral2/memory/456-289-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/5056-319-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3976-325-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x00070000000233ff-327.dat upx behavioral2/memory/3084-357-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023400-363.dat upx behavioral2/memory/2456-394-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023401-400.dat upx behavioral2/files/0x0007000000023402-435.dat upx behavioral2/memory/3596-466-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023404-473.dat upx behavioral2/memory/856-503-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023405-509.dat upx behavioral2/memory/456-534-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023406-547.dat upx behavioral2/memory/4868-553-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1880-579-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023407-585.dat upx behavioral2/memory/3416-587-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4604-617-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4556-625-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023408-623.dat upx behavioral2/memory/4348-656-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x0007000000023409-662.dat upx behavioral2/memory/532-692-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2696-699-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3416-728-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/616-762-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3788-796-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1016-802-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3520-832-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3412-865-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1740-899-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1016-934-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/5056-939-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4620-1004-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/512-1030-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3944-1067-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4040-1101-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/5056-1135-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/884-1141-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4296-1146-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4620-1171-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4476-1237-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3852-1243-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4348-1271-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1680-1304-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/884-1309-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1916-1314-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2288-1340-0x0000000000400000-0x000000000049A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemedxnu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemihwom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempqatm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemroeaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwiipe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlfcji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemworyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrgkoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdpcy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtravu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnuvjv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobkev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfiiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyomzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembooyc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkqsbs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcnyfw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcbgvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmvqgh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjybkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtnagr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjqwji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjibjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemconfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtlxlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemewnrx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemafdct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmcvje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemukxiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhtyuq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyrny.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemalqee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemahemq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemttsbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybtks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembtqcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxiyjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoauqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvrxwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxaliw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtlcez.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvmqrq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrqjgy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotucb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrslak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdyjgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemucumw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcztmu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhoaih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemokjtj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnaxpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemndwjy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkebpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkvhj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyiqqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemorfrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeucgw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembrlzu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtcmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemslhhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzlgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsspok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkufvi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvrwly.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4216 4856 60cf48418b178d40edb69630742da8f0_NEIKI.exe 82 PID 4856 wrote to memory of 4216 4856 60cf48418b178d40edb69630742da8f0_NEIKI.exe 82 PID 4856 wrote to memory of 4216 4856 60cf48418b178d40edb69630742da8f0_NEIKI.exe 82 PID 4216 wrote to memory of 5056 4216 Sysqemcbgvc.exe 85 PID 4216 wrote to memory of 5056 4216 Sysqemcbgvc.exe 85 PID 4216 wrote to memory of 5056 4216 Sysqemcbgvc.exe 85 PID 5056 wrote to memory of 3976 5056 Sysqemkufvi.exe 87 PID 5056 wrote to memory of 3976 5056 Sysqemkufvi.exe 87 PID 5056 wrote to memory of 3976 5056 Sysqemkufvi.exe 87 PID 3976 wrote to memory of 3084 3976 Sysqemutjsb.exe 88 PID 3976 wrote to memory of 3084 3976 Sysqemutjsb.exe 88 PID 3976 wrote to memory of 3084 3976 Sysqemutjsb.exe 88 PID 3084 wrote to memory of 2456 3084 Sysqemhoaih.exe 89 PID 3084 wrote to memory of 2456 3084 Sysqemhoaih.exe 89 PID 3084 wrote to memory of 2456 3084 Sysqemhoaih.exe 89 PID 2456 wrote to memory of 3596 2456 Sysqemuygtk.exe 90 PID 2456 wrote to memory of 3596 2456 Sysqemuygtk.exe 90 PID 2456 wrote to memory of 3596 2456 Sysqemuygtk.exe 90 PID 3596 wrote to memory of 856 3596 Sysqemxiyjc.exe 91 PID 3596 wrote to memory of 856 3596 Sysqemxiyjc.exe 91 PID 3596 wrote to memory of 856 3596 Sysqemxiyjc.exe 91 PID 856 wrote to memory of 456 856 Sysqemxlkbq.exe 92 PID 856 wrote to memory of 456 856 Sysqemxlkbq.exe 92 PID 856 wrote to memory of 456 856 Sysqemxlkbq.exe 92 PID 456 wrote to memory of 4868 456 Sysqemmcvje.exe 95 PID 456 wrote to memory of 4868 456 Sysqemmcvje.exe 95 PID 456 wrote to memory of 4868 456 Sysqemmcvje.exe 95 PID 4868 wrote to memory of 1880 4868 Sysqemmjsod.exe 96 PID 4868 wrote to memory of 1880 4868 Sysqemmjsod.exe 96 PID 4868 wrote to memory of 1880 4868 Sysqemmjsod.exe 96 PID 1880 wrote to memory of 4604 1880 Sysqemobkev.exe 97 PID 1880 wrote to memory of 4604 1880 Sysqemobkev.exe 97 PID 1880 wrote to memory of 4604 1880 Sysqemobkev.exe 97 PID 4604 wrote to memory of 4556 4604 Sysqempblkh.exe 100 PID 4604 wrote to memory of 4556 4604 Sysqempblkh.exe 100 PID 4604 wrote to memory of 4556 4604 Sysqempblkh.exe 100 PID 4556 wrote to memory of 4348 4556 Sysqemotucb.exe 101 PID 4556 wrote to memory of 4348 4556 Sysqemotucb.exe 101 PID 4556 wrote to memory of 4348 4556 Sysqemotucb.exe 101 PID 4348 wrote to memory of 532 4348 Sysqemwiipe.exe 102 PID 4348 wrote to memory of 532 4348 Sysqemwiipe.exe 102 PID 4348 wrote to memory of 532 4348 Sysqemwiipe.exe 102 PID 532 wrote to memory of 2696 532 Sysqemconfs.exe 103 PID 532 wrote to memory of 2696 532 Sysqemconfs.exe 103 PID 532 wrote to memory of 2696 532 Sysqemconfs.exe 103 PID 2696 wrote to memory of 3416 2696 Sysqemcvccj.exe 104 PID 2696 wrote to memory of 3416 2696 Sysqemcvccj.exe 104 PID 2696 wrote to memory of 3416 2696 Sysqemcvccj.exe 104 PID 3416 wrote to memory of 616 3416 Sysqemtyznl.exe 105 PID 3416 wrote to memory of 616 3416 Sysqemtyznl.exe 105 PID 3416 wrote to memory of 616 3416 Sysqemtyznl.exe 105 PID 616 wrote to memory of 3788 616 Sysqemmvqgh.exe 107 PID 616 wrote to memory of 3788 616 Sysqemmvqgh.exe 107 PID 616 wrote to memory of 3788 616 Sysqemmvqgh.exe 107 PID 3788 wrote to memory of 3520 3788 Sysqembooyc.exe 108 PID 3788 wrote to memory of 3520 3788 Sysqembooyc.exe 108 PID 3788 wrote to memory of 3520 3788 Sysqembooyc.exe 108 PID 3520 wrote to memory of 3412 3520 Sysqemjeldi.exe 109 PID 3520 wrote to memory of 3412 3520 Sysqemjeldi.exe 109 PID 3520 wrote to memory of 3412 3520 Sysqemjeldi.exe 109 PID 3412 wrote to memory of 1740 3412 Sysqemorfrn.exe 110 PID 3412 wrote to memory of 1740 3412 Sysqemorfrn.exe 110 PID 3412 wrote to memory of 1740 3412 Sysqemorfrn.exe 110 PID 1740 wrote to memory of 1016 1740 Sysqemogekq.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\60cf48418b178d40edb69630742da8f0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\60cf48418b178d40edb69630742da8f0_NEIKI.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcbgvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbgvc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkufvi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkufvi.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutjsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutjsb.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhoaih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhoaih.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuygtk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuygtk.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxiyjc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxiyjc.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxlkbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxlkbq.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmcvje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmcvje.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjsod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjsod.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobkev.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobkev.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Sysqempblkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempblkh.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotucb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotucb.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwiipe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwiipe.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemconfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemconfs.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvccj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvccj.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtyznl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyznl.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmvqgh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvqgh.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Sysqembooyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembooyc.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjeldi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjeldi.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorfrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorfrn.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemogekq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogekq.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmhxcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhxcf.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemedxnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedxnu.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrttvw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrttvw.exe"25⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorbia.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorbia.exe"26⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokjtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokjtj.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlttbw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlttbw.exe"28⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttsbl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttsbl.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgoob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgoob.exe"30⤵
- Executes dropped EXE
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuirmo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuirmo.exe"31⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoalpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoalpl.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjybkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjybkg.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfmcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfmcw.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzipv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzipv.exe"35⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcxai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcxai.exe"36⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoauqv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoauqv.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjlqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjlqx.exe"38⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeucgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeucgw.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnagr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnagr.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrlzu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrlzu.exe"41⤵
- Executes dropped EXE
- Modifies registry class
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtcmf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtcmf.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcmmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcmmh.exe"43⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqlfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqlfd.exe"44⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyziz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyziz.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqbgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqbgf.exe"46⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjibjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjibjj.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvrxwt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrxwt.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdsfjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdsfjl.exe"49⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtqcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtqcb.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"51⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguiux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguiux.exe"52⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycunn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycunn.exe"53⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiqvqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqvqp.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemworyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemworyr.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvfbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvfbn.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgcuge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcuge.exe"57⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlizws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlizws.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtejbj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtejbj.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvlqmz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvlqmz.exe"60⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyiuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyiuz.exe"61⤵
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnaxpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnaxpw.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfiiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfiiz.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrevp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrevp.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdyjgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdyjgt.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemikety.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikety.exe"66⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtkrwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkrwu.exe"67⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemduiub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemduiub.exe"68⤵
- Checks computer location settings
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsoomw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsoomw.exe"69⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\Sysqemispzu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemispzu.exe"70⤵
- Checks computer location settings
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihnkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihnkx.exe"71⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\Sysqemybtks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybtks.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldagp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldagp.exe"73⤵
- Checks computer location settings
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlxlv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlxlv.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaexwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaexwd.exe"75⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapkbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapkbd.exe"76⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaxhzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaxhzj.exe"77⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Sysqemudxce.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudxce.exe"78⤵
- Checks computer location settings
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqspj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqspj.exe"79⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiudim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiudim.exe"80⤵
- Checks computer location settings
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemijcsp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijcsp.exe"81⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\Sysqempcblx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempcblx.exe"82⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkqsbs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkqsbs.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndwjy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndwjy.exe"84⤵
- Modifies registry class
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemayomq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayomq.exe"85⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnehup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnehup.exe"86⤵
- Checks computer location settings
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsnqur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnqur.exe"87⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxaliw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxaliw.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmqna.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmqna.exe"89⤵
- Checks computer location settings
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcfonv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfonv.exe"90⤵
- Checks computer location settings
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakvjo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakvjo.exe"91⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemihwom.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihwom.exe"92⤵
- Modifies registry class
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemssvmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssvmk.exe"93⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkovwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkovwh.exe"94⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemffoze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffoze.exe"95⤵
- Checks computer location settings
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemslhhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslhhe.exe"96⤵
- Modifies registry class
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkzhsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkzhsa.exe"97⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\Sysqemukxiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukxiz.exe"98⤵
- Modifies registry class
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"99⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfrlyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrlyo.exe"100⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzlqoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlqoo.exe"101⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\Sysqempqatm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqatm.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzpnei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpnei.exe"103⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmdfmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdfmi.exe"104⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsepmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsepmk.exe"105⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\Sysqempvzug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempvzug.exe"106⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkebpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkebpv.exe"107⤵
- Modifies registry class
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemceenu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemceenu.exe"108⤵
- Checks computer location settings
PID:848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwgjdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgjdu.exe"109⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Sysqempdhdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdhdd.exe"110⤵
- Checks computer location settings
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrqjgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqjgy.exe"111⤵
- Modifies registry class
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfaqjb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfaqjb.exe"112⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjnjqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnjqu.exe"113⤵
- Checks computer location settings
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuicbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuicbb.exe"114⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqwji.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuilon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuilon.exe"116⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemehpmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehpmx.exe"117⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrgkoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgkoo.exe"118⤵
- Modifies registry class
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemewnrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewnrx.exe"119⤵
- Modifies registry class
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosgce.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosgce.exe"120⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzkvhj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkvhj.exe"121⤵
- Modifies registry class
PID:212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcnyfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnyfw.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:3968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-