Analysis
-
max time kernel
78s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 01:21
Behavioral task
behavioral1
Sample
8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe
-
Size
180KB
-
MD5
8fa1333f83ef47b22a73c067854dc4c0
-
SHA1
7a05455c721beacf9177259769c3abaaa514c3cc
-
SHA256
f36c1e39a45330892fb7c2caa3fc1f5c41334af9b9a4512638a915b90a695af0
-
SHA512
82c76760e206efaec029ef707ca7ca93e49a25deb9b889ade3b3e611820dc836a612b6f52b21d84750396e847d35a1099700ca926bd959d1a8256bc0731588e1
-
SSDEEP
3072:adEUfKj8BYbDiC1ZTK7sxtLUIGcly6aqOn7ACE89zMfo0z3r:aUSiZTK40wbaqE7Al8jk7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemewxss.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemdlgwj.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemyghqw.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemhfwru.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemvzrpb.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemvueur.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemqixrh.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemozynf.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemoumnd.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemwevuu.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemteuty.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemehzhp.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemgzfnu.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemeibrz.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemuqwvj.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqempcido.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlmfxq.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemqijhm.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemgdygr.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemcwded.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemzfxqg.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlerzn.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemtotli.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemtrhyo.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemidyoj.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemdbgzd.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemklsfd.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemmxcuy.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemmsnba.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemgnyjw.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemwdtwp.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemtybvp.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemvfqqk.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlvcdc.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemktyef.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemmursx.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemrmsub.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation 8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlvwkn.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemdpqyy.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemrfcsp.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemfaxhg.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqempnjsl.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemmskuu.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemijsph.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemvwliu.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemivbpn.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemmvbjg.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemozwav.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemeafhm.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemulyku.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemptoea.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqempykzi.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemohtxt.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemwvuzz.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemnkzhj.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemwttvb.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemhxwiz.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemogrok.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemtevyp.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemmspyo.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemlysxi.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemeswxe.exe Key value queried \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000\Control Panel\International\Geo\Nation Sysqemleavz.exe -
Executes dropped EXE 64 IoCs
pid Process 2736 Sysqemhxwiz.exe 220 Sysqemeucjs.exe 3544 Sysqemmvbjg.exe 3128 Sysqembwwbh.exe 4664 Sysqemmrptp.exe 3880 Sysqemproez.exe 4184 Sysqemzqtcj.exe 4736 Sysqemjltmr.exe 1940 Sysqemudjre.exe 2300 Sysqemzqczx.exe 2600 Sysqemhfqnb.exe 3804 Sysqemmskuu.exe 1380 Sysqemwolfb.exe 3600 Sysqembmhvp.exe 2640 Sysqemeswxe.exe 3544 Sysqemgcnvx.exe 3756 Sysqemoumnd.exe 4892 Sysqemozwav.exe 4512 Sysqemwzvbb.exe 3540 Sysqemesubq.exe 4676 Sysqemeavgb.exe 1368 Sysqemgnyjw.exe 1592 Sysqemrcdby.exe 3968 Sysqemwdtwp.exe 3564 Sysqemdlgwj.exe 3176 Sysqemlmfxq.exe 4604 Sysqemwevuu.exe 3080 Sysqemeafhm.exe 4016 Sysqemrvxxs.exe 4860 Sysqemyrzkb.exe 2128 Sysqemohtxt.exe 3616 Sysqemgzfnu.exe 928 Sysqemtybvp.exe 4508 Sysqemotgdh.exe 3068 Sysqemeibrz.exe 4848 Sysqembkurp.exe 4148 Sysqemdfyzv.exe 1952 Sysqemljjsy.exe 3640 Sysqemlvwkn.exe 4500 Sysqemtotli.exe 2828 Sysqemybnsb.exe 3080 Sysqemgqbgf.exe 4492 Sysqemeztoa.exe 4508 Sysqemteuty.exe 3444 Sysqemblrzw.exe 1244 Sysqemwcsct.exe 4140 Sysqemwvuzz.exe 1576 Sysqemdockh.exe 2324 Sysqemvzrpb.exe 3696 Sysqemleavz.exe 3032 Sysqemyghqw.exe 1756 Sysqemdpqyy.exe 2676 Sysqemlxnee.exe 1492 Sysqemyzuzb.exe 3968 Sysqemijsph.exe 4296 Sysqemvlakf.exe 3268 Sysqembkvsz.exe 4152 Sysqemntznj.exe 1368 Sysqemtrfab.exe 1148 Sysqemtrhyo.exe 3856 Sysqemakprp.exe 1684 Sysqemvmutg.exe 3248 Sysqemidyoj.exe 752 Sysqemqijhm.exe -
resource yara_rule behavioral2/memory/3188-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000f000000023a46-6.dat upx behavioral2/memory/2736-37-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0012000000023a09-42.dat upx behavioral2/files/0x000f000000023a49-72.dat upx behavioral2/files/0x000f000000023a4c-107.dat upx behavioral2/files/0x0010000000023a3d-142.dat upx behavioral2/files/0x000e000000023a54-177.dat upx behavioral2/files/0x000a000000023b88-212.dat upx behavioral2/memory/3880-214-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b89-250.dat upx behavioral2/memory/3188-249-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b8a-285.dat upx behavioral2/memory/2736-292-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0003000000022967-322.dat upx behavioral2/memory/1940-324-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/220-354-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0003000000022965-360.dat upx behavioral2/memory/3544-390-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x00130000000239ed-396.dat upx behavioral2/files/0x0011000000023a07-431.dat upx behavioral2/memory/3128-438-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4664-468-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0012000000023a0b-470.dat upx behavioral2/memory/1380-472-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3880-502-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0012000000023a40-508.dat upx behavioral2/memory/4184-539-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b8b-545.dat upx behavioral2/memory/4736-547-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b8c-581.dat upx behavioral2/memory/3544-583-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1940-589-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b8d-619.dat upx behavioral2/memory/3756-621-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2300-651-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a000000023b8e-657.dat upx behavioral2/memory/2600-664-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3804-698-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1380-732-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3600-766-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1368-796-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2640-801-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3544-830-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3756-868-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4892-902-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4512-960-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3540-1002-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4676-1051-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1368-1062-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1592-1071-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3968-1097-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3564-1099-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3176-1106-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4604-1135-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3080-1137-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4016-1171-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4508-1209-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4860-1214-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2128-1248-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3616-1274-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/928-1308-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4148-1314-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1952-1347-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlmfxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgqbgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvzrpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemntznj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemugjsf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmvbjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzqtcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzqczx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoumnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivbpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmpov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitjdv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnpibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuqwvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembwwbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemktyef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbgzd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdbhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmhojq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemudjre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyghqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemakprp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtaxhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtevyp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemljjsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmkqf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwgahb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemywkcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdtwp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybnsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqijhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvcdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvwliu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwkutb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeibrz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfaqgw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempcido.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcysap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzfxqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrfcsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeswxe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcrqfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlerzn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmhvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtybvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeztoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczbmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwqwts.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhfwru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmsnba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrcdby.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxnee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvlakf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtrfab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvueur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemortvh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeucjs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemproez.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblrzw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemijsph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemizxfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmyhqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemptoea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrmsub.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 2736 3188 8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe 85 PID 3188 wrote to memory of 2736 3188 8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe 85 PID 3188 wrote to memory of 2736 3188 8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe 85 PID 2736 wrote to memory of 220 2736 Sysqemhxwiz.exe 86 PID 2736 wrote to memory of 220 2736 Sysqemhxwiz.exe 86 PID 2736 wrote to memory of 220 2736 Sysqemhxwiz.exe 86 PID 220 wrote to memory of 3544 220 Sysqemeucjs.exe 88 PID 220 wrote to memory of 3544 220 Sysqemeucjs.exe 88 PID 220 wrote to memory of 3544 220 Sysqemeucjs.exe 88 PID 3544 wrote to memory of 3128 3544 Sysqemmvbjg.exe 89 PID 3544 wrote to memory of 3128 3544 Sysqemmvbjg.exe 89 PID 3544 wrote to memory of 3128 3544 Sysqemmvbjg.exe 89 PID 3128 wrote to memory of 4664 3128 Sysqembwwbh.exe 90 PID 3128 wrote to memory of 4664 3128 Sysqembwwbh.exe 90 PID 3128 wrote to memory of 4664 3128 Sysqembwwbh.exe 90 PID 4664 wrote to memory of 3880 4664 Sysqemmrptp.exe 91 PID 4664 wrote to memory of 3880 4664 Sysqemmrptp.exe 91 PID 4664 wrote to memory of 3880 4664 Sysqemmrptp.exe 91 PID 3880 wrote to memory of 4184 3880 Sysqemproez.exe 92 PID 3880 wrote to memory of 4184 3880 Sysqemproez.exe 92 PID 3880 wrote to memory of 4184 3880 Sysqemproez.exe 92 PID 4184 wrote to memory of 4736 4184 Sysqemzqtcj.exe 93 PID 4184 wrote to memory of 4736 4184 Sysqemzqtcj.exe 93 PID 4184 wrote to memory of 4736 4184 Sysqemzqtcj.exe 93 PID 4736 wrote to memory of 1940 4736 Sysqemjltmr.exe 94 PID 4736 wrote to memory of 1940 4736 Sysqemjltmr.exe 94 PID 4736 wrote to memory of 1940 4736 Sysqemjltmr.exe 94 PID 1940 wrote to memory of 2300 1940 Sysqemudjre.exe 95 PID 1940 wrote to memory of 2300 1940 Sysqemudjre.exe 95 PID 1940 wrote to memory of 2300 1940 Sysqemudjre.exe 95 PID 2300 wrote to memory of 2600 2300 Sysqemzqczx.exe 96 PID 2300 wrote to memory of 2600 2300 Sysqemzqczx.exe 96 PID 2300 wrote to memory of 2600 2300 Sysqemzqczx.exe 96 PID 2600 wrote to memory of 3804 2600 Sysqemhfqnb.exe 97 PID 2600 wrote to memory of 3804 2600 Sysqemhfqnb.exe 97 PID 2600 wrote to memory of 3804 2600 Sysqemhfqnb.exe 97 PID 3804 wrote to memory of 1380 3804 Sysqemmskuu.exe 98 PID 3804 wrote to memory of 1380 3804 Sysqemmskuu.exe 98 PID 3804 wrote to memory of 1380 3804 Sysqemmskuu.exe 98 PID 1380 wrote to memory of 3600 1380 Sysqemwolfb.exe 101 PID 1380 wrote to memory of 3600 1380 Sysqemwolfb.exe 101 PID 1380 wrote to memory of 3600 1380 Sysqemwolfb.exe 101 PID 3600 wrote to memory of 2640 3600 Sysqembmhvp.exe 102 PID 3600 wrote to memory of 2640 3600 Sysqembmhvp.exe 102 PID 3600 wrote to memory of 2640 3600 Sysqembmhvp.exe 102 PID 2640 wrote to memory of 3544 2640 Sysqemeswxe.exe 103 PID 2640 wrote to memory of 3544 2640 Sysqemeswxe.exe 103 PID 2640 wrote to memory of 3544 2640 Sysqemeswxe.exe 103 PID 3544 wrote to memory of 3756 3544 Sysqemgcnvx.exe 104 PID 3544 wrote to memory of 3756 3544 Sysqemgcnvx.exe 104 PID 3544 wrote to memory of 3756 3544 Sysqemgcnvx.exe 104 PID 3756 wrote to memory of 4892 3756 Sysqemoumnd.exe 107 PID 3756 wrote to memory of 4892 3756 Sysqemoumnd.exe 107 PID 3756 wrote to memory of 4892 3756 Sysqemoumnd.exe 107 PID 4892 wrote to memory of 4512 4892 Sysqemozwav.exe 108 PID 4892 wrote to memory of 4512 4892 Sysqemozwav.exe 108 PID 4892 wrote to memory of 4512 4892 Sysqemozwav.exe 108 PID 4512 wrote to memory of 3540 4512 Sysqemwzvbb.exe 109 PID 4512 wrote to memory of 3540 4512 Sysqemwzvbb.exe 109 PID 4512 wrote to memory of 3540 4512 Sysqemwzvbb.exe 109 PID 3540 wrote to memory of 4676 3540 Sysqemesubq.exe 110 PID 3540 wrote to memory of 4676 3540 Sysqemesubq.exe 110 PID 3540 wrote to memory of 4676 3540 Sysqemesubq.exe 110 PID 4676 wrote to memory of 1368 4676 Sysqemeavgb.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\8fa1333f83ef47b22a73c067854dc4c0_NEIKI.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhxwiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxwiz.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeucjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeucjs.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmvbjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvbjg.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwwbh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwwbh.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrptp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrptp.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemproez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemproez.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzqtcj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzqtcj.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjltmr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjltmr.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemudjre.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudjre.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzqczx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzqczx.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfqnb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfqnb.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmskuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmskuu.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwolfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwolfb.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmhvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmhvp.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeswxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeswxe.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgcnvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcnvx.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoumnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoumnd.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemozwav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozwav.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwzvbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzvbb.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemesubq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemesubq.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeavgb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeavgb.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnyjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnyjw.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrcdby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrcdby.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdlgwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlgwj.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmfxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmfxq.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwevuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwevuu.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeafhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeafhm.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvxxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvxxs.exe"30⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyrzkb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyrzkb.exe"31⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohtxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohtxt.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgzfnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgzfnu.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtybvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtybvp.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotgdh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotgdh.exe"35⤵
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeibrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeibrz.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkurp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkurp.exe"37⤵
- Executes dropped EXE
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfyzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfyzv.exe"38⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljjsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljjsy.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvwkn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvwkn.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtotli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtotli.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqbgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqbgf.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeztoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeztoa.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteuty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteuty.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblrzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblrzw.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwcsct.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwcsct.exe"47⤵
- Executes dropped EXE
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwvuzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvuzz.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdockh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdockh.exe"49⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvzrpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvzrpb.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemleavz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemleavz.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyghqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyghqw.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpqyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpqyy.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxnee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxnee.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyzuzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyzuzb.exe"55⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemijsph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijsph.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvlakf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvlakf.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkvsz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkvsz.exe"58⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemntznj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntznj.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrfab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrfab.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrhyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrhyo.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakprp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakprp.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvmutg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvmutg.exe"63⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidyoj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidyoj.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqijhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqijhm.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvueur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvueur.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmyxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmyxo.exe"67⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcrqfo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrqfo.exe"68⤵
- Modifies registry class
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfqqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfqqk.exe"69⤵
- Checks computer location settings
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvcdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvcdc.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitjdv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitjdv.exe"71⤵
- Modifies registry class
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqixrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqixrh.exe"72⤵
- Checks computer location settings
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemczbmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczbmk.exe"73⤵
- Modifies registry class
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemktyef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemktyef.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkzhj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkzhj.exe"75⤵
- Checks computer location settings
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnqxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnqxq.exe"76⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\Sysqemulyku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemulyku.exe"77⤵
- Checks computer location settings
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvwliu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwliu.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmioa.exe"79⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdbgzd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbgzd.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnpibn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnpibn.exe"81⤵
- Modifies registry class
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfaxhg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfaxhg.exe"82⤵
- Checks computer location settings
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemivbpn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivbpn.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxogpi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxogpi.exe"84⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemizxfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizxfh.exe"85⤵
- Modifies registry class
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfaqgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfaqgw.exe"86⤵
- Modifies registry class
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcyylj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyylj.exe"87⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\Sysqempxttj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxttj.exe"88⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemptoea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptoea.exe"89⤵
- Checks computer location settings
- Modifies registry class
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugjsf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugjsf.exe"90⤵
- Modifies registry class
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklsfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklsfd.exe"91⤵
- Checks computer location settings
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrzve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrzve.exe"92⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\Sysqemztoqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztoqb.exe"93⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmyhqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmyhqb.exe"94⤵
- Modifies registry class
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmpov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmpov.exe"95⤵
- Modifies registry class
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemultwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemultwp.exe"96⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfvkmw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfvkmw.exe"97⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcwded.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwded.exe"98⤵
- Checks computer location settings
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\Sysqempykzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempykzi.exe"99⤵
- Checks computer location settings
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnjsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnjsl.exe"100⤵
- Checks computer location settings
PID:352 -
C:\Users\Admin\AppData\Local\Temp\Sysqempcido.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempcido.exe"101⤵
- Checks computer location settings
- Modifies registry class
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmkqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmkqf.exe"102⤵
- Modifies registry class
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuxzwz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxzwz.exe"103⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmxcuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxcuy.exe"104⤵
- Checks computer location settings
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjukzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjukzc.exe"105⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\Sysqempdbhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdbhe.exe"106⤵
- Modifies registry class
PID:408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuqwvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuqwvj.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcysap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcysap.exe"108⤵
- Modifies registry class
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhlnou.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhlnou.exe"109⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwqwts.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqwts.exe"110⤵
- Modifies registry class
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjutn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjutn.exe"111⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzsqoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzsqoq.exe"112⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmufjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmufjn.exe"113⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeqxuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqxuj.exe"114⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzenkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzenkd.exe"115⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmursx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmursx.exe"116⤵
- Checks computer location settings
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemortvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemortvh.exe"117⤵
- Modifies registry class
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemekqvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekqvc.exe"118⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemogrok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogrok.exe"119⤵
- Checks computer location settings
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkutb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkutb.exe"120⤵
- Modifies registry class
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmsnba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsnba.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzfxqg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzfxqg.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:2996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-