Analysis
-
max time kernel
77s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe
-
Size
81KB
-
MD5
a4281c20b778057e213f05a14821ecc0
-
SHA1
775f3e658a317ac6f907f8c29aa7d20d9d6fabbc
-
SHA256
37386448737870b641369f73ab76a18c8f8535fe5fb4f038dcdda3b47f608c39
-
SHA512
93c5836b6047c9daf43f07e4fca300397db45f9a6301bc2603139c6882fc763b0f9bb6eefb6cecf22db27cc3563fb31bf793657f08fed3cf86d2c07309c18952
-
SSDEEP
1536:GzfMMkPZE1J7S6/PMj42VJEY4ujMepJtANuOAl0QQsIEySYndfcop:EfMNE1JG6XMk27EbpOthl0ZUed0op
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjzhrh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemtgvhw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgpadj.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhopam.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzysrl.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrzhfh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemahyiw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemkxgfy.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemagncb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzlgki.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemoyeop.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhmpov.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjbbyt.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdaocw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgtwtl.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemxznav.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemxhyhr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnxuvu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemxhbpi.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjtytp.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemeaguw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjmkdm.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrxvxk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemyljoq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemxmgbk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemofoca.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrudtb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnfhpl.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemixgux.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemycunn.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemkfanf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemslskv.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemedjpt.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemlhdgz.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqembavcb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwkyvk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemutoyr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemckrxf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqempfcmk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhqfgs.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqembfamu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemyfibu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemihnkx.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhjqpx.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzdlmq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqembpund.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemohssi.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemyulxx.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemqkhri.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemejhxp.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrffnk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgtnpw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemayrzk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgbhhh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemoaftn.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemismwv.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemxaliw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemszlif.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemmqtwk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqempvdut.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgzfnu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemtgxfc.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemilkaz.exe -
Executes dropped EXE 64 IoCs
pid Process 3456 Sysqempfcmk.exe 1276 Sysqemgiqom.exe 5048 Sysqembakrb.exe 696 Sysqemgfphp.exe 1400 Sysqempvdut.exe 1552 Sysqemthwcm.exe 4596 Sysqembavcb.exe 3840 Sysqemlzhal.exe 1708 Sysqembmhvp.exe 3916 Sysqemofoca.exe 5004 Sysqembpund.exe 3608 Sysqemrffnk.exe 4772 Sysqemeviqt.exe 1600 Sysqemrudtb.exe 1732 Sysqemwkyvk.exe 4272 Sysqemjbbyt.exe 4516 Sysqemttidx.exe 3600 Sysqemyjoef.exe 3828 Sysqembfamu.exe 4244 Sysqemohhhr.exe 2508 Sysqemyomsn.exe 3704 Sysqemohssi.exe 1552 Sysqemysjip.exe 2448 Sysqemgzfnu.exe 2364 Sysqemoaftn.exe 4424 Sysqemgaqrm.exe 1048 Sysqemyatol.exe 5020 Sysqemjzhrh.exe 2252 Sysqemzlhml.exe 5060 Sysqemotsur.exe 3944 Sysqembsvxa.exe 3564 Sysqemrzhfh.exe 3492 Sysqemebnms.exe 536 Sysqemtgvhw.exe 4640 Sysqemgibxi.exe 3688 Sysqemtvkno.exe 3136 Sysqemgtnpw.exe 2284 Sysqemtgxfc.exe 1444 Sysqemgxail.exe 5084 Sysqembhrfd.exe 2364 Sysqemvylaa.exe 3968 Sysqemorzgt.exe 1340 Sysqemdojlr.exe 1924 Sysqemtlsyp.exe 696 Sysqemgykhp.exe 4836 Sysqemdhvhl.exe 3608 Sysqemyulxx.exe 3492 Sysqemqmwcw.exe 4156 Sysqemdaocw.exe 1500 Sysqemycunn.exe 4516 Sysqemjmkdm.exe 4160 Sysqemquhis.exe 3808 Sysqemlladp.exe 4436 Sysqemdlljo.exe 4340 Sysqemqkhri.exe 3304 Sysqemjghcf.exe 4660 Sysqemayrzk.exe 1368 Sysqemnayvh.exe 100 Sysqemdxhif.exe 2980 Sysqemgpadj.exe 4884 Sysqemnxxip.exe 4572 Sysqemgtwtl.exe 3552 Sysqemismwv.exe 4908 Sysqemyljoq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkxgfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemedjpt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemznrup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmqwkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembcgdx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwnhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemysjip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdhvhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnfhpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvylaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvxxd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwpoyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyomsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyatol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjzhrh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcthrf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxhbpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrzccq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfcmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjbbyt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgbhhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmijqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwqhcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmhvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoaftn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyulxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfrrji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvanuv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeviqt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtgvhw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtgxfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhopam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjrdtt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembakrb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqmwcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemueptt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcheub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkdgry.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjtytp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwkyvk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgibxi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfyptu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkfanf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhqfgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgiqom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemthwcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzhal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmdgru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemebnms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtnpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtwtl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrlwsu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemohhhr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhrfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemorzgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemttidx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdojlr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrxvxk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemszlif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwtkoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivalm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemohssi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqkhri.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4724 wrote to memory of 3456 4724 a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe 84 PID 4724 wrote to memory of 3456 4724 a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe 84 PID 4724 wrote to memory of 3456 4724 a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe 84 PID 3456 wrote to memory of 1276 3456 Sysqempfcmk.exe 85 PID 3456 wrote to memory of 1276 3456 Sysqempfcmk.exe 85 PID 3456 wrote to memory of 1276 3456 Sysqempfcmk.exe 85 PID 1276 wrote to memory of 5048 1276 Sysqemgiqom.exe 86 PID 1276 wrote to memory of 5048 1276 Sysqemgiqom.exe 86 PID 1276 wrote to memory of 5048 1276 Sysqemgiqom.exe 86 PID 5048 wrote to memory of 696 5048 Sysqembakrb.exe 87 PID 5048 wrote to memory of 696 5048 Sysqembakrb.exe 87 PID 5048 wrote to memory of 696 5048 Sysqembakrb.exe 87 PID 696 wrote to memory of 1400 696 Sysqemgfphp.exe 89 PID 696 wrote to memory of 1400 696 Sysqemgfphp.exe 89 PID 696 wrote to memory of 1400 696 Sysqemgfphp.exe 89 PID 1400 wrote to memory of 1552 1400 Sysqempvdut.exe 91 PID 1400 wrote to memory of 1552 1400 Sysqempvdut.exe 91 PID 1400 wrote to memory of 1552 1400 Sysqempvdut.exe 91 PID 1552 wrote to memory of 4596 1552 Sysqemthwcm.exe 92 PID 1552 wrote to memory of 4596 1552 Sysqemthwcm.exe 92 PID 1552 wrote to memory of 4596 1552 Sysqemthwcm.exe 92 PID 4596 wrote to memory of 3840 4596 Sysqembavcb.exe 93 PID 4596 wrote to memory of 3840 4596 Sysqembavcb.exe 93 PID 4596 wrote to memory of 3840 4596 Sysqembavcb.exe 93 PID 3840 wrote to memory of 1708 3840 Sysqemlzhal.exe 94 PID 3840 wrote to memory of 1708 3840 Sysqemlzhal.exe 94 PID 3840 wrote to memory of 1708 3840 Sysqemlzhal.exe 94 PID 1708 wrote to memory of 3916 1708 Sysqembmhvp.exe 95 PID 1708 wrote to memory of 3916 1708 Sysqembmhvp.exe 95 PID 1708 wrote to memory of 3916 1708 Sysqembmhvp.exe 95 PID 3916 wrote to memory of 5004 3916 Sysqemofoca.exe 96 PID 3916 wrote to memory of 5004 3916 Sysqemofoca.exe 96 PID 3916 wrote to memory of 5004 3916 Sysqemofoca.exe 96 PID 5004 wrote to memory of 3608 5004 Sysqembpund.exe 97 PID 5004 wrote to memory of 3608 5004 Sysqembpund.exe 97 PID 5004 wrote to memory of 3608 5004 Sysqembpund.exe 97 PID 3608 wrote to memory of 4772 3608 Sysqemrffnk.exe 99 PID 3608 wrote to memory of 4772 3608 Sysqemrffnk.exe 99 PID 3608 wrote to memory of 4772 3608 Sysqemrffnk.exe 99 PID 4772 wrote to memory of 1600 4772 Sysqemeviqt.exe 100 PID 4772 wrote to memory of 1600 4772 Sysqemeviqt.exe 100 PID 4772 wrote to memory of 1600 4772 Sysqemeviqt.exe 100 PID 1600 wrote to memory of 1732 1600 Sysqemrudtb.exe 101 PID 1600 wrote to memory of 1732 1600 Sysqemrudtb.exe 101 PID 1600 wrote to memory of 1732 1600 Sysqemrudtb.exe 101 PID 1732 wrote to memory of 4272 1732 Sysqemwkyvk.exe 102 PID 1732 wrote to memory of 4272 1732 Sysqemwkyvk.exe 102 PID 1732 wrote to memory of 4272 1732 Sysqemwkyvk.exe 102 PID 4272 wrote to memory of 4516 4272 Sysqemjbbyt.exe 137 PID 4272 wrote to memory of 4516 4272 Sysqemjbbyt.exe 137 PID 4272 wrote to memory of 4516 4272 Sysqemjbbyt.exe 137 PID 4516 wrote to memory of 3600 4516 Sysqemttidx.exe 104 PID 4516 wrote to memory of 3600 4516 Sysqemttidx.exe 104 PID 4516 wrote to memory of 3600 4516 Sysqemttidx.exe 104 PID 3600 wrote to memory of 3828 3600 Sysqemyjoef.exe 105 PID 3600 wrote to memory of 3828 3600 Sysqemyjoef.exe 105 PID 3600 wrote to memory of 3828 3600 Sysqemyjoef.exe 105 PID 3828 wrote to memory of 4244 3828 Sysqembfamu.exe 106 PID 3828 wrote to memory of 4244 3828 Sysqembfamu.exe 106 PID 3828 wrote to memory of 4244 3828 Sysqembfamu.exe 106 PID 4244 wrote to memory of 2508 4244 Sysqemohhhr.exe 107 PID 4244 wrote to memory of 2508 4244 Sysqemohhhr.exe 107 PID 4244 wrote to memory of 2508 4244 Sysqemohhhr.exe 107 PID 2508 wrote to memory of 3704 2508 Sysqemyomsn.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a4281c20b778057e213f05a14821ecc0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfcmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfcmk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgiqom.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgiqom.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\Sysqembakrb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembakrb.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfphp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfphp.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\Sysqempvdut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempvdut.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthwcm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthwcm.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Sysqembavcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembavcb.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzhal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzhal.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmhvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmhvp.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofoca.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofoca.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\Sysqembpund.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembpund.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrffnk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrffnk.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeviqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeviqt.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrudtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrudtb.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkyvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkyvk.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttidx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttidx.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjoef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjoef.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfamu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfamu.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohhhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohhhr.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyomsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyomsn.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohssi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohssi.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemysjip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemysjip.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgzfnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgzfnu.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoaftn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoaftn.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgaqrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgaqrm.exe"27⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyatol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyatol.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzhrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzhrh.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"30⤵
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotsur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotsur.exe"31⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\Sysqembsvxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembsvxa.exe"32⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzhfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzhfh.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebnms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebnms.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtgvhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtgvhw.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgibxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgibxi.exe"36⤵
- Executes dropped EXE
- Modifies registry class
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvkno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvkno.exe"37⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtnpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtnpw.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtgxfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtgxfc.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxail.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxail.exe"40⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhrfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhrfd.exe"41⤵
- Executes dropped EXE
- Modifies registry class
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvylaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvylaa.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdojlr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdojlr.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlsyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlsyp.exe"45⤵
- Executes dropped EXE
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgykhp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgykhp.exe"46⤵
- Executes dropped EXE
PID:696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhvhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhvhl.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyulxx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyulxx.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdaocw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdaocw.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycunn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycunn.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmkdm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmkdm.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemquhis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemquhis.exe"53⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlladp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlladp.exe"54⤵
- Executes dropped EXE
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdlljo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlljo.exe"55⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqkhri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkhri.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"57⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemayrzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayrzk.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnayvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnayvh.exe"59⤵
- Executes dropped EXE
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxhif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxhif.exe"60⤵
- Executes dropped EXE
PID:100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgpadj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpadj.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxxip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxxip.exe"62⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemismwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemismwv.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyljoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyljoq.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfhpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfhpl.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgbhhh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbhhh.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihnkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihnkx.exe"68⤵
- Checks computer location settings
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemahyiw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemahyiw.exe"69⤵
- Checks computer location settings
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilkaz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilkaz.exe"70⤵
- Checks computer location settings
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfibu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfibu.exe"71⤵
- Checks computer location settings
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfyptu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyptu.exe"72⤵
- Modifies registry class
PID:400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhatq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhatq.exe"73⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfrrji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrrji.exe"74⤵
- Modifies registry class
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixgux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixgux.exe"75⤵
- Checks computer location settings
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemapird.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapird.exe"76⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvanuv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanuv.exe"77⤵
- Modifies registry class
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjqpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjqpx.exe"78⤵
- Checks computer location settings
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxgfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxgfy.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxznav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxznav.exe"80⤵
- Checks computer location settings
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyadz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyadz.exe"81⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\Sysqemupwyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupwyc.exe"82⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcthrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcthrf.exe"83⤵
- Modifies registry class
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhyhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhyhr.exe"84⤵
- Checks computer location settings
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemagncb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagncb.exe"85⤵
- Checks computer location settings
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkfanf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfanf.exe"86⤵
- Checks computer location settings
- Modifies registry class
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxaliw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxaliw.exe"87⤵
- Checks computer location settings
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxuvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxuvu.exe"88⤵
- Checks computer location settings
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszlif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszlif.exe"89⤵
- Checks computer location settings
- Modifies registry class
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutoyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutoyr.exe"90⤵
- Checks computer location settings
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfqorn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfqorn.exe"91⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxmgbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmgbk.exe"92⤵
- Checks computer location settings
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkovwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkovwh.exe"93⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhaqjx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhaqjx.exe"94⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmqwkf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqwkf.exe"95⤵
- Modifies registry class
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvxxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvxxd.exe"96⤵
- Modifies registry class
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemslskv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslskv.exe"97⤵
- Checks computer location settings
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfnzga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfnzga.exe"98⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxczqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxczqw.exe"99⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmpov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmpov.exe"100⤵
- Checks computer location settings
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhqlrd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqlrd.exe"101⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcheub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcheub.exe"102⤵
- Modifies registry class
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmdgru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdgru.exe"103⤵
- Modifies registry class
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemedjpt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedjpt.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpfcr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpfcr.exe"105⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\Sysqemruoqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemruoqp.exe"106⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\Sysqemueptt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemueptt.exe"107⤵
- Modifies registry class
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzhok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzhok.exe"108⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmeawk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmeawk.exe"109⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzghrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzghrp.exe"110⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhksjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhksjk.exe"111⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxhbpi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhbpi.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhopam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhopam.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlgki.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlgki.exe"114⤵
- Checks computer location settings
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtkfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtkfl.exe"115⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeezde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeezde.exe"116⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmijqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmijqo.exe"117⤵
- Modifies registry class
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\Sysqembcgdx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembcgdx.exe"118⤵
- Modifies registry class
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugwda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugwda.exe"119⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkdgry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdgry.exe"120⤵
- Modifies registry class
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhttg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhttg.exe"121⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzwnhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwnhy.exe"122⤵
- Modifies registry class
PID:404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-