Analysis
-
max time kernel
96s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe
-
Size
592KB
-
MD5
ab618bb1dbad6d3a54ef744cf2110540
-
SHA1
e05744a1672af4aa6b0cd65fa8c25b30ad494734
-
SHA256
094fd986d2c0ee6c9a52163ad8f3df3e193e9525b0c34cec422ce138122705cc
-
SHA512
58501f2651e57e2851f554d261eea25f1cd3ef81b060f7c14cada8a61a6f0b58cf99ce10d2ae561b771ee0ce3584892f21d6739f4585f83b58be5f1cc3057d44
-
SSDEEP
3072:6CaoAs101Pol0xPTM7mRCAdJSSxPUkl3VqMQTCk/dN92sdNhavtrVdewnAx3wmVb:6qDAwl0xPTMiR9JSSxPUKadodH6XhT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempoiiv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjflil.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgathl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemeboae.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkelet.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyluyf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxuqig.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemudugj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemeigdt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjcidh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemalptk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemrbvwq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemovdcw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyoxim.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemcwesp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempgsif.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzmmpl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemuqbrh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemmynyz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemssmad.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhtdsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemuzwsk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgnqyb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtwkky.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvoqtg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemszmoq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemrkgfi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjaskb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdeqes.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdepre.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemrvnzm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdcgwn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkmvlq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemsdxgt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxtdhb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemcgdhl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemalpzs.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdsqaj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgdees.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnbvwx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhzfek.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtvaov.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemicptt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtdjxd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemayydq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlzrtp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqmlbi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgrxhu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlmnmu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfcejw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemogrok.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwyose.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlojbn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvnucc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzydif.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqalfs.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqpjkr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemckrxf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtpelj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdtblb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembqzgh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjqmpn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyplbi.exe -
Executes dropped EXE 64 IoCs
pid Process 1492 Sysqemwupmc.exe 3228 Sysqemenoel.exe 4364 Sysqemenpkx.exe 4440 Sysqemtwkky.exe 3452 Sysqemzupsl.exe 2224 Sysqemzuqxx.exe 1424 Sysqemwvakt.exe 1496 Sysqemzydif.exe 116 Sysqembhvyx.exe 1816 Sysqemtpelj.exe 1908 Sysqemokjtj.exe 404 Sysqemgyblf.exe 428 Sysqemrgoob.exe 4412 Sysqemrvnzm.exe 3788 Sysqemtmncq.exe 4732 Sysqembynnq.exe 4532 Sysqembyxke.exe 4740 Sysqemjcidh.exe 4332 Sysqemyzjqf.exe 4052 Sysqemmynyz.exe 3944 Sysqemejdon.exe 4136 Sysqemrzhfh.exe 324 Sysqemeboae.exe 4456 Sysqemtntfi.exe 208 Sysqemofmat.exe 1516 Sysqembsfdl.exe 4520 Sysqemvyvyg.exe 4544 Sysqemalptk.exe 764 Sysqemgnzum.exe 4388 Sysqemyjzej.exe 5056 Sysqemjqmpn.exe 2920 Sysqemgrxhu.exe 2952 Sysqemdsqaj.exe 3452 Sysqemvoqtg.exe 4076 Sysqemdtblb.exe 964 Sysqembqkrn.exe 4840 Sysqemgdees.exe 640 Sysqemlmnmu.exe 1012 Sysqemyhciy.exe 2964 Sysqemduwvd.exe 2028 Sysqemlnwfl.exe 4908 Sysqemyplbi.exe 4304 Sysqemdcgwn.exe 4244 Sysqemdrehy.exe 4456 Sysqemnbvwx.exe 436 Sysqemvfgpa.exe 2296 Sysqemqalfs.exe 3900 Sysqemqpjkr.exe 1508 Sysqemssmad.exe 1788 Sysqemfutva.exe 3700 Sysqemvrciy.exe 3724 Sysqemqftyl.exe 3468 Sysqemapjos.exe 1588 Sysqemfcejw.exe 4452 Sysqemkelet.exe 2268 Sysqemvdyhy.exe 1916 Sysqemqrpxk.exe 1664 Sysqemxkoqt.exe 2096 Sysqemkmvlq.exe 2920 Sysqemvljou.exe 2052 Sysqemabpob.exe 2336 Sysqemicptt.exe 3844 Sysqemkxsja.exe 764 Sysqemscecd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwvakt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgdees.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemopzyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtnefa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembynnq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsdxgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzfek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembqkrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqftyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemabpob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyrapt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzupsl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtmncq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemudugj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgvmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemogrok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzxei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzrtp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmynyz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfgpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemayydq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemalpzs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyplbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcgdhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemenoel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvaov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwupmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembyxke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxkoqt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzxctr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyluyf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemozkul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvyvyg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkodpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemberby.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjaskb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgxcyk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempoiiv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwsmzx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvnucc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemalptk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemedcrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzuqxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjzej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxtdhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuqig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemovdcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgvaex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlojbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhtdsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzrim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemizwbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofmat.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqpjkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzmmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkgfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrjbgw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrgoob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrzhfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvdyhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemccnhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzwsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemckrxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlziu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1492 4588 ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe 83 PID 4588 wrote to memory of 1492 4588 ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe 83 PID 4588 wrote to memory of 1492 4588 ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe 83 PID 1492 wrote to memory of 3228 1492 Sysqemwupmc.exe 86 PID 1492 wrote to memory of 3228 1492 Sysqemwupmc.exe 86 PID 1492 wrote to memory of 3228 1492 Sysqemwupmc.exe 86 PID 3228 wrote to memory of 4364 3228 Sysqemenoel.exe 87 PID 3228 wrote to memory of 4364 3228 Sysqemenoel.exe 87 PID 3228 wrote to memory of 4364 3228 Sysqemenoel.exe 87 PID 4364 wrote to memory of 4440 4364 Sysqemenpkx.exe 88 PID 4364 wrote to memory of 4440 4364 Sysqemenpkx.exe 88 PID 4364 wrote to memory of 4440 4364 Sysqemenpkx.exe 88 PID 4440 wrote to memory of 3452 4440 Sysqemtwkky.exe 90 PID 4440 wrote to memory of 3452 4440 Sysqemtwkky.exe 90 PID 4440 wrote to memory of 3452 4440 Sysqemtwkky.exe 90 PID 3452 wrote to memory of 2224 3452 Sysqemzupsl.exe 91 PID 3452 wrote to memory of 2224 3452 Sysqemzupsl.exe 91 PID 3452 wrote to memory of 2224 3452 Sysqemzupsl.exe 91 PID 2224 wrote to memory of 1424 2224 Sysqemzuqxx.exe 93 PID 2224 wrote to memory of 1424 2224 Sysqemzuqxx.exe 93 PID 2224 wrote to memory of 1424 2224 Sysqemzuqxx.exe 93 PID 1424 wrote to memory of 1496 1424 Sysqemwvakt.exe 94 PID 1424 wrote to memory of 1496 1424 Sysqemwvakt.exe 94 PID 1424 wrote to memory of 1496 1424 Sysqemwvakt.exe 94 PID 1496 wrote to memory of 116 1496 Sysqemzydif.exe 95 PID 1496 wrote to memory of 116 1496 Sysqemzydif.exe 95 PID 1496 wrote to memory of 116 1496 Sysqemzydif.exe 95 PID 116 wrote to memory of 1816 116 Sysqembhvyx.exe 97 PID 116 wrote to memory of 1816 116 Sysqembhvyx.exe 97 PID 116 wrote to memory of 1816 116 Sysqembhvyx.exe 97 PID 1816 wrote to memory of 1908 1816 Sysqemtpelj.exe 98 PID 1816 wrote to memory of 1908 1816 Sysqemtpelj.exe 98 PID 1816 wrote to memory of 1908 1816 Sysqemtpelj.exe 98 PID 1908 wrote to memory of 404 1908 Sysqemokjtj.exe 99 PID 1908 wrote to memory of 404 1908 Sysqemokjtj.exe 99 PID 1908 wrote to memory of 404 1908 Sysqemokjtj.exe 99 PID 404 wrote to memory of 428 404 Sysqemgyblf.exe 100 PID 404 wrote to memory of 428 404 Sysqemgyblf.exe 100 PID 404 wrote to memory of 428 404 Sysqemgyblf.exe 100 PID 428 wrote to memory of 4412 428 Sysqemrgoob.exe 101 PID 428 wrote to memory of 4412 428 Sysqemrgoob.exe 101 PID 428 wrote to memory of 4412 428 Sysqemrgoob.exe 101 PID 4412 wrote to memory of 3788 4412 Sysqemrvnzm.exe 102 PID 4412 wrote to memory of 3788 4412 Sysqemrvnzm.exe 102 PID 4412 wrote to memory of 3788 4412 Sysqemrvnzm.exe 102 PID 3788 wrote to memory of 4732 3788 Sysqemtmncq.exe 103 PID 3788 wrote to memory of 4732 3788 Sysqemtmncq.exe 103 PID 3788 wrote to memory of 4732 3788 Sysqemtmncq.exe 103 PID 4732 wrote to memory of 4532 4732 Sysqembynnq.exe 104 PID 4732 wrote to memory of 4532 4732 Sysqembynnq.exe 104 PID 4732 wrote to memory of 4532 4732 Sysqembynnq.exe 104 PID 4532 wrote to memory of 4740 4532 Sysqembyxke.exe 105 PID 4532 wrote to memory of 4740 4532 Sysqembyxke.exe 105 PID 4532 wrote to memory of 4740 4532 Sysqembyxke.exe 105 PID 4740 wrote to memory of 4332 4740 Sysqemjcidh.exe 106 PID 4740 wrote to memory of 4332 4740 Sysqemjcidh.exe 106 PID 4740 wrote to memory of 4332 4740 Sysqemjcidh.exe 106 PID 4332 wrote to memory of 4052 4332 Sysqemyzjqf.exe 107 PID 4332 wrote to memory of 4052 4332 Sysqemyzjqf.exe 107 PID 4332 wrote to memory of 4052 4332 Sysqemyzjqf.exe 107 PID 4052 wrote to memory of 3944 4052 Sysqemmynyz.exe 108 PID 4052 wrote to memory of 3944 4052 Sysqemmynyz.exe 108 PID 4052 wrote to memory of 3944 4052 Sysqemmynyz.exe 108 PID 3944 wrote to memory of 4136 3944 Sysqemejdon.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ab618bb1dbad6d3a54ef744cf2110540_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwupmc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwupmc.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemenoel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemenoel.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemenpkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemenpkx.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwkky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwkky.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzupsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzupsl.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzuqxx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzuqxx.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwvakt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvakt.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzydif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzydif.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhvyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhvyx.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpelj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpelj.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokjtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokjtj.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyblf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyblf.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgoob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgoob.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvnzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvnzm.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmncq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmncq.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\Sysqembynnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembynnq.exe"17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqembyxke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembyxke.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcidh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcidh.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyzjqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyzjqf.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmynyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmynyz.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejdon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejdon.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzhfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzhfh.exe"23⤵
- Executes dropped EXE
- Modifies registry class
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeboae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeboae.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtntfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtntfi.exe"25⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofmat.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofmat.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Sysqembsfdl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembsfdl.exe"27⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvyvyg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvyvyg.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalptk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalptk.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"30⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjzej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjzej.exe"31⤵
- Executes dropped EXE
- Modifies registry class
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqmpn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqmpn.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdsqaj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdsqaj.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvoqtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvoqtg.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqkrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqkrn.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgdees.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgdees.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmnmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmnmu.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhciy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhciy.exe"40⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemduwvd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemduwvd.exe"41⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnwfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnwfl.exe"42⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyplbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyplbi.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcgwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcgwn.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdrehy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdrehy.exe"45⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnbvwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnbvwx.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfgpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfgpa.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqalfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqalfs.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpjkr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpjkr.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemssmad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssmad.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfutva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfutva.exe"51⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvrciy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrciy.exe"52⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqftyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqftyl.exe"53⤵
- Executes dropped EXE
- Modifies registry class
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemapjos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapjos.exe"54⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfcejw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfcejw.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkelet.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkelet.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvdyhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdyhy.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqrpxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrpxk.exe"58⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxkoqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkoqt.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkmvlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkmvlq.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvljou.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvljou.exe"61⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemabpob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabpob.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemicptt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemicptt.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxsja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxsja.exe"64⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscecd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscecd.exe"65⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Sysqempoiiv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempoiiv.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvpsix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvpsix.exe"67⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiowyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiowyr.exe"68⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\Sysqemszmoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszmoq.exe"69⤵
- Checks computer location settings
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsdxgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdxgt.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxtdhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtdhb.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemccnhd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccnhd.exe"72⤵
- Modifies registry class
PID:380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksjnj.exe"73⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxuqig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuqig.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtdsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtdsc.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzwsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzwsk.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzxctr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxctr.exe"77⤵
- Modifies registry class
PID:404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwpen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwpen.exe"78⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\Sysqemudugj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudugj.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzmmpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmmpl.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcwesp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwesp.exe"81⤵
- Checks computer location settings
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfsiae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfsiae.exe"82⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmzffb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmzffb.exe"83⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Sysqempgsif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgsif.exe"84⤵
- Checks computer location settings
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuqbrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuqbrh.exe"85⤵
- Checks computer location settings
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzfek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzfek.exe"86⤵
- Checks computer location settings
- Modifies registry class
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqzgh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqzgh.exe"87⤵
- Checks computer location settings
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgvmf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgvmf.exe"88⤵
- Modifies registry class
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkgfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkgfi.exe"89⤵
- Checks computer location settings
- Modifies registry class
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhdefd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhdefd.exe"90⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhzrim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzrim.exe"91⤵
- Modifies registry class
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmijqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmijqo.exe"92⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwqwts.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwqwts.exe"93⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemopzyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopzyr.exe"94⤵
- Modifies registry class
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcgdhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcgdhl.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotvpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotvpl.exe"96⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\Sysqemckrxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckrxf.exe"97⤵
- Checks computer location settings
- Modifies registry class
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkodpi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkodpi.exe"98⤵
- Modifies registry class
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzafv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzafv.exe"99⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemogrok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemogrok.exe"100⤵
- Checks computer location settings
- Modifies registry class
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrbvwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbvwq.exe"101⤵
- Checks computer location settings
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemedcrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedcrn.exe"102⤵
- Modifies registry class
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqxes.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqxes.exe"103⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwsmzx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwsmzx.exe"104⤵
- Modifies registry class
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwhuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwhuu.exe"105⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\Sysqemovdcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovdcw.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"107⤵
- Modifies registry class
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnqyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnqyb.exe"108⤵
- Checks computer location settings
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemberby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemberby.exe"109⤵
- Modifies registry class
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrjbgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrjbgw.exe"110⤵
- Modifies registry class
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwtkoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtkoq.exe"111⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgvaex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvaex.exe"112⤵
- Modifies registry class
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyrapt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyrapt.exe"113⤵
- Modifies registry class
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnefa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnefa.exe"114⤵
- Modifies registry class
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeigdt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeigdt.exe"115⤵
- Checks computer location settings
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyluyf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyluyf.exe"116⤵
- Checks computer location settings
- Modifies registry class
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizwbo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizwbo.exe"117⤵
- Modifies registry class
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtybek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtybek.exe"118⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtvaov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvaov.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzxei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzxei.exe"120⤵
- Modifies registry class
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtdjxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtdjxd.exe"121⤵
- Checks computer location settings
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjaskb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjaskb.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:3912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-