Analysis
-
max time kernel
106s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 04:31
Behavioral task
behavioral1
Sample
6e62e836c2397078a6fdde9a18d7f3b0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6e62e836c2397078a6fdde9a18d7f3b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
6e62e836c2397078a6fdde9a18d7f3b0_NeikiAnalytics.exe
-
Size
222KB
-
MD5
6e62e836c2397078a6fdde9a18d7f3b0
-
SHA1
9ccd87e8ab3b8746382a2d2cc0835c86d0684267
-
SHA256
b1ed2701cc6d08ad9f1c3bca3baeb573f5b3b1d4a1d9e2ad0b8857b107582565
-
SHA512
ef093e9436ead2d9f691480ccb8491a99c2ff67b74c21b1a44a745382ffd6cfc760c40c7db1fcc7871aad5f5c20529df29904cb4314738b124c501aa8171f8a7
-
SSDEEP
3072:adEUfKj8BYbDiC1ZTK7sxtLUIGsqDiC1ZBdEUfKjj9dEUfKj8BYbDiC1ZTK7sxt1:aUSiZTK40QuZBUX9USiZTK40+HMHC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemylgzt.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemnbbak.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemblwkq.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemolhik.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemeqlfd.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemdyjgt.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemevtng.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemhzdwb.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemqvxfn.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemlojbn.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemiinzh.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemdtdrm.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemvjyde.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemklsay.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqembzrak.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemvrcqu.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemqaosm.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemsrgmo.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemhvzdn.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemojgee.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemvgriu.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemqbwqm.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemotucb.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemwtndv.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemqkqka.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemfgpcz.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemizxfh.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemamcrg.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemcbjbi.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemuhbom.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemmrptp.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemmwxsu.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemetfeh.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemgphbo.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemsdhez.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemdlhmy.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemnjiev.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqembqlwz.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemgjrbd.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemiseql.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemxevkj.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemcfoya.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemozlro.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemstmlv.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemdhvhl.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemeuhlv.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqembtgff.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemtrlyt.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemffust.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemijnpc.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqembdmdu.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemwrgjf.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemapzqm.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemlsafk.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemtvjpx.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemejgsw.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemnmlpz.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemudzuq.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemnorsr.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemanhfc.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemlsqlg.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemhwodj.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemwhajw.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Sysqemozztq.exe -
Executes dropped EXE 64 IoCs
pid Process 2004 Sysqemmufhr.exe 4612 Sysqemmgrzg.exe 2216 Sysqemotucb.exe 3876 Sysqemunofl.exe 2884 Sysqememscw.exe 980 Sysqemjkpkj.exe 4500 Sysqemrskkw.exe 4200 Sysqemuvnai.exe 3008 Sysqemwffya.exe 1940 Sysqemczztl.exe 3040 Sysqemwqsva.exe 3168 Sysqembdmdu.exe 4952 Sysqemzmwlp.exe 3384 Sysqemevmgy.exe 2804 Sysqemmrptp.exe 4388 Sysqemudzuq.exe 1452 Sysqemrerhu.exe 3212 Sysqemrmsmf.exe 4620 Sysqemblwkq.exe 3892 Sysqemmhxcf.exe 980 Sysqemzupsl.exe 3128 Sysqemzftka.exe 2812 Sysqemmwxsu.exe 3876 Sysqemwkzvd.exe 740 Sysqemjxplq.exe 4400 Sysqemtigjx.exe 2144 Sysqemowwzj.exe 2224 Sysqemetfeh.exe 3092 Sysqemmteew.exe 4700 Sysqemopiuc.exe 724 Sysqemlqbns.exe 3004 Sysqemwphqo.exe 2684 Sysqemolhik.exe 3876 Sysqemyhhtr.exe 2984 Sysqemzwgdc.exe 3480 Sysqemwtndv.exe 4068 Sysqemgphbo.exe 5056 Sysqemoipux.exe 2304 Sysqemtvjhc.exe 4700 Sysqemeqlfd.exe 3304 Sysqemjoinj.exe 3936 Sysqemgbcvc.exe 3120 Sysqemqaosm.exe 1556 Sysqemlktve.exe 4324 Sysqemojiyn.exe 3008 Sysqemiactl.exe 4860 Sysqemwrgjf.exe 1020 Sysqemdhvhl.exe 2188 Sysqemtaahg.exe 4216 Sysqemiinzh.exe 2552 Sysqemqqjfe.exe 1032 Sysqemnorsr.exe 1500 Sysqemqrvwp.exe 2028 Sysqemdtdrm.exe 4220 Sysqembqlwz.exe 4820 Sysqemnhorc.exe 980 Sysqemvplxh.exe 2360 Sysqemanhfc.exe 2184 Sysqemqkqka.exe 4720 Sysqemqkryl.exe 2592 Sysqemdyjgt.exe 3880 Sysqemvjyde.exe 3668 Sysqemtvuyd.exe 2028 Sysqemvbibs.exe -
resource yara_rule behavioral2/memory/4456-0-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000700000002340d-6.dat upx behavioral2/memory/2004-37-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0008000000023409-42.dat upx behavioral2/files/0x000700000002340f-72.dat upx behavioral2/memory/4612-74-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023410-108.dat upx behavioral2/memory/2216-109-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000800000002340a-144.dat upx behavioral2/memory/3876-146-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023412-180.dat upx behavioral2/memory/2884-182-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023413-216.dat upx behavioral2/memory/980-218-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000f00000000a30b-252.dat upx behavioral2/memory/4456-260-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000700000001d9e8-289.dat upx behavioral2/memory/4200-291-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2004-297-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023415-327.dat upx behavioral2/memory/3008-328-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4612-335-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2216-361-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023416-368.dat upx behavioral2/memory/1940-369-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3876-399-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023417-405.dat upx behavioral2/memory/3040-407-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2884-413-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/980-444-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023418-445.dat upx behavioral2/memory/3168-447-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0008000000023419-481.dat upx behavioral2/memory/4952-483-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4500-489-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0009000000023370-519.dat upx behavioral2/memory/3384-521-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4200-527-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0008000000023384-557.dat upx behavioral2/memory/2804-559-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3008-589-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0008000000023385-595.dat upx behavioral2/memory/4388-597-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/1940-627-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000800000002338a-633.dat upx behavioral2/memory/1452-634-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000900000002338c-672.dat upx behavioral2/memory/3040-665-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3212-673-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3168-711-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3892-741-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4952-764-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/980-776-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3384-778-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2804-807-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4388-841-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/1452-843-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2812-849-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3212-854-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4620-880-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3876-886-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3892-915-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/740-921-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/980-950-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjxplq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtaahg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscoaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmnyjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembzrak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembakea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqftgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzmwlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwkzvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrhbhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempimzw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejgsw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtsbyp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzdwb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxevkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemseihu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembtgff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivuma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemylgzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvjhc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqkqka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjyde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempecca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcnigg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvqod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemozlro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkasyn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnckqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvpbes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvrcqu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiinzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemojgee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlqbns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlktve.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgpcz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxgazr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrxaid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrerhu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblwkq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzupsl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwgdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeqlfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvuyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaszfr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuhbom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemozztq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkiai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnnfhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqbwqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnkhyi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemudzuq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlsqlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsrgmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemunofl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmwxsu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjoinj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkycho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzcqfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczztl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgbcvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdtdrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvbibs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkcht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcnnrg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 2004 4456 6e62e836c2397078a6fdde9a18d7f3b0_NeikiAnalytics.exe 82 PID 4456 wrote to memory of 2004 4456 6e62e836c2397078a6fdde9a18d7f3b0_NeikiAnalytics.exe 82 PID 4456 wrote to memory of 2004 4456 6e62e836c2397078a6fdde9a18d7f3b0_NeikiAnalytics.exe 82 PID 2004 wrote to memory of 4612 2004 Sysqemmufhr.exe 84 PID 2004 wrote to memory of 4612 2004 Sysqemmufhr.exe 84 PID 2004 wrote to memory of 4612 2004 Sysqemmufhr.exe 84 PID 4612 wrote to memory of 2216 4612 Sysqemmgrzg.exe 87 PID 4612 wrote to memory of 2216 4612 Sysqemmgrzg.exe 87 PID 4612 wrote to memory of 2216 4612 Sysqemmgrzg.exe 87 PID 2216 wrote to memory of 3876 2216 Sysqemotucb.exe 88 PID 2216 wrote to memory of 3876 2216 Sysqemotucb.exe 88 PID 2216 wrote to memory of 3876 2216 Sysqemotucb.exe 88 PID 3876 wrote to memory of 2884 3876 Sysqemunofl.exe 89 PID 3876 wrote to memory of 2884 3876 Sysqemunofl.exe 89 PID 3876 wrote to memory of 2884 3876 Sysqemunofl.exe 89 PID 2884 wrote to memory of 980 2884 Sysqememscw.exe 111 PID 2884 wrote to memory of 980 2884 Sysqememscw.exe 111 PID 2884 wrote to memory of 980 2884 Sysqememscw.exe 111 PID 980 wrote to memory of 4500 980 Sysqemjkpkj.exe 107 PID 980 wrote to memory of 4500 980 Sysqemjkpkj.exe 107 PID 980 wrote to memory of 4500 980 Sysqemjkpkj.exe 107 PID 4500 wrote to memory of 4200 4500 Sysqemrskkw.exe 92 PID 4500 wrote to memory of 4200 4500 Sysqemrskkw.exe 92 PID 4500 wrote to memory of 4200 4500 Sysqemrskkw.exe 92 PID 4200 wrote to memory of 3008 4200 Sysqemuvnai.exe 93 PID 4200 wrote to memory of 3008 4200 Sysqemuvnai.exe 93 PID 4200 wrote to memory of 3008 4200 Sysqemuvnai.exe 93 PID 3008 wrote to memory of 1940 3008 Sysqemwffya.exe 94 PID 3008 wrote to memory of 1940 3008 Sysqemwffya.exe 94 PID 3008 wrote to memory of 1940 3008 Sysqemwffya.exe 94 PID 1940 wrote to memory of 3040 1940 Sysqemczztl.exe 96 PID 1940 wrote to memory of 3040 1940 Sysqemczztl.exe 96 PID 1940 wrote to memory of 3040 1940 Sysqemczztl.exe 96 PID 3040 wrote to memory of 3168 3040 Sysqemwqsva.exe 98 PID 3040 wrote to memory of 3168 3040 Sysqemwqsva.exe 98 PID 3040 wrote to memory of 3168 3040 Sysqemwqsva.exe 98 PID 3168 wrote to memory of 4952 3168 Sysqembdmdu.exe 100 PID 3168 wrote to memory of 4952 3168 Sysqembdmdu.exe 100 PID 3168 wrote to memory of 4952 3168 Sysqembdmdu.exe 100 PID 4952 wrote to memory of 3384 4952 Sysqemzmwlp.exe 102 PID 4952 wrote to memory of 3384 4952 Sysqemzmwlp.exe 102 PID 4952 wrote to memory of 3384 4952 Sysqemzmwlp.exe 102 PID 3384 wrote to memory of 2804 3384 Sysqemevmgy.exe 104 PID 3384 wrote to memory of 2804 3384 Sysqemevmgy.exe 104 PID 3384 wrote to memory of 2804 3384 Sysqemevmgy.exe 104 PID 2804 wrote to memory of 4388 2804 Sysqemmrptp.exe 105 PID 2804 wrote to memory of 4388 2804 Sysqemmrptp.exe 105 PID 2804 wrote to memory of 4388 2804 Sysqemmrptp.exe 105 PID 4388 wrote to memory of 1452 4388 Sysqemudzuq.exe 106 PID 4388 wrote to memory of 1452 4388 Sysqemudzuq.exe 106 PID 4388 wrote to memory of 1452 4388 Sysqemudzuq.exe 106 PID 1452 wrote to memory of 3212 1452 Sysqemrerhu.exe 108 PID 1452 wrote to memory of 3212 1452 Sysqemrerhu.exe 108 PID 1452 wrote to memory of 3212 1452 Sysqemrerhu.exe 108 PID 3212 wrote to memory of 4620 3212 Sysqemrmsmf.exe 109 PID 3212 wrote to memory of 4620 3212 Sysqemrmsmf.exe 109 PID 3212 wrote to memory of 4620 3212 Sysqemrmsmf.exe 109 PID 4620 wrote to memory of 3892 4620 Sysqemblwkq.exe 110 PID 4620 wrote to memory of 3892 4620 Sysqemblwkq.exe 110 PID 4620 wrote to memory of 3892 4620 Sysqemblwkq.exe 110 PID 3892 wrote to memory of 980 3892 Sysqemmhxcf.exe 111 PID 3892 wrote to memory of 980 3892 Sysqemmhxcf.exe 111 PID 3892 wrote to memory of 980 3892 Sysqemmhxcf.exe 111 PID 980 wrote to memory of 3128 980 Sysqemzupsl.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e62e836c2397078a6fdde9a18d7f3b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6e62e836c2397078a6fdde9a18d7f3b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmufhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmufhr.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgrzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgrzg.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotucb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotucb.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunofl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunofl.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Sysqememscw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqememscw.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjkpkj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjkpkj.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrskkw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrskkw.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvnai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvnai.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwffya.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwffya.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemczztl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczztl.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwqsva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqsva.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdmdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdmdu.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmwlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmwlp.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevmgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevmgy.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrptp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrptp.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemudzuq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudzuq.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrerhu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrerhu.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrmsmf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmsmf.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblwkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblwkq.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmhxcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhxcf.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzupsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzupsl.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzftka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzftka.exe"23⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmwxsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmwxsu.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkzvd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkzvd.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxplq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxplq.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtigjx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtigjx.exe"27⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemowwzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowwzj.exe"28⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemetfeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemetfeh.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmteew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmteew.exe"30⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopiuc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopiuc.exe"31⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqbns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqbns.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwphqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwphqo.exe"33⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolhik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolhik.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhhtr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhhtr.exe"35⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzwgdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwgdc.exe"36⤵
- Executes dropped EXE
- Modifies registry class
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwtndv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtndv.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgphbo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgphbo.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoipux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoipux.exe"39⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvjhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvjhc.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqlfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqlfd.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjoinj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjoinj.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgbcvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbcvc.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqaosm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqaosm.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlktve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlktve.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojiyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojiyn.exe"46⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiactl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiactl.exe"47⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrgjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrgjf.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhvhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhvhl.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtaahg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtaahg.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiinzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiinzh.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqqjfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqjfe.exe"52⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnorsr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnorsr.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqrvwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrvwp.exe"54⤵
- Executes dropped EXE
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtdrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtdrm.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqlwz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqlwz.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhorc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhorc.exe"57⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvplxh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvplxh.exe"58⤵
- Executes dropped EXE
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemanhfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemanhfc.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqkqka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkqka.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqkryl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkryl.exe"61⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdyjgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdyjgt.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjyde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjyde.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvuyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvuyd.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbibs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbibs.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidpwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidpwp.exe"66⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtkcht.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkcht.exe"67⤵
- Modifies registry class
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaszfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaszfr.exe"68⤵
- Modifies registry class
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxevkj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxevkj.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjdfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjdfu.exe"70⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfyeid.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyeid.exe"71⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlsqlg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsqlg.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlxlv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlxlv.exe"73⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapzqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapzqm.exe"74⤵
- Checks computer location settings
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfctyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfctyx.exe"75⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemspkod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspkod.exe"76⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapjos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapjos.exe"77⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\Sysqemseihu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemseihu.exe"78⤵
- Modifies registry class
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgpcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgpcz.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxgazr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgazr.exe"80⤵
- Modifies registry class
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklsay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklsay.exe"81⤵
- Checks computer location settings
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"82⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkasyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkasyn.exe"83⤵
- Modifies registry class
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajfqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajfqo.exe"84⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\Sysqempccqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempccqj.exe"85⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsudtn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsudtn.exe"86⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfwkps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfwkps.exe"87⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvqipn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqipn.exe"88⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkycho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkycho.exe"89⤵
- Modifies registry class
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscoaj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscoaj.exe"90⤵
- Modifies registry class
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizxfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizxfh.exe"91⤵
- Checks computer location settings
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhrfp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhrfp.exe"92⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcumtu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcumtu.exe"93⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxwrwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwrwe.exe"94⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcnnrg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnnrg.exe"95⤵
- Modifies registry class
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsdhez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdhez.exe"96⤵
- Checks computer location settings
PID:8 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuneg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuneg.exe"97⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\Sysqempecca.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempecca.exe"98⤵
- Modifies registry class
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnckqn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnckqn.exe"99⤵
- Modifies registry class
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemusyvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemusyvk.exe"100⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnrkyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrkyv.exe"101⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmnyjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnyjl.exe"102⤵
- Modifies registry class
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemamcrg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamcrg.exe"103⤵
- Checks computer location settings
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsmnpf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsmnpf.exe"104⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Sysqemerfxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemerfxe.exe"105⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuldxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuldxa.exe"106⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Sysqemevtng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevtng.exe"107⤵
- Checks computer location settings
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxaid.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxaid.exe"108⤵
- Modifies registry class
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrbmag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbmag.exe"109⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcfoya.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfoya.exe"110⤵
- Checks computer location settings
PID:644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcbjbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbjbi.exe"111⤵
- Checks computer location settings
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhajw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhajw.exe"112⤵
- Checks computer location settings
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrgmo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrgmo.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjvuxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvuxq.exe"114⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxknp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxknp.exe"115⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhwodj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwodj.exe"116⤵
- Checks computer location settings
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcnigg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnigg.exe"117⤵
- Modifies registry class
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmxgvn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxgvn.exe"118⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeuygb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeuygb.exe"119⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeuhlv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeuhlv.exe"120⤵
- Checks computer location settings
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzatv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzatv.exe"121⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrhbhg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrhbhg.exe"122⤵
- Modifies registry class
PID:1032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-