Analysis
-
max time kernel
109s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
09b4334c4205996925e222e507ae2860_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09b4334c4205996925e222e507ae2860_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
09b4334c4205996925e222e507ae2860_NeikiAnalytics.exe
-
Size
539KB
-
MD5
09b4334c4205996925e222e507ae2860
-
SHA1
134813201ec447dcbb825240e5788cdf4e034931
-
SHA256
98d57e95fc82f157f68b83c644f77e4845782a820b4282282d4fed1ec41e19b1
-
SHA512
617652985155e4bb33c46ac2d7e57628d7f28cb7143b6bf48f39a96bb2a0c2f37d3396a5fc64a57ee3fcfe8f723d6a598b4652f71dceac431d6eb6b9761e4b12
-
SSDEEP
3072:wCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxp:wqDAwl0xPTMiR9JSSxPUKYGdodHy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemyuvxh.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemaqspj.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemeyedg.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemclloo.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemmowqw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjefsp.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjansv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemxwiqs.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqvuss.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempnmgg.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemefpua.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemnxnki.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemxqnor.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemzuqwk.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemtnkef.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemaqdsi.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemwmuhz.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemgigbc.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemnmxef.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemdgtjx.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemnbktf.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemfpwkd.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemwofui.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqtkwj.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemsitmx.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempawfv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemcntjf.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemwjpit.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemzmrtf.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempafmg.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemreiof.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqnyif.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemzbfar.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemijsph.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlysxi.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemvobbf.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemhlesa.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemsawoz.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemhatsa.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemzjphn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemnfxrt.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempyydc.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlseba.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlqzrx.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemmgxav.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemmbwrt.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemzohum.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemeqgzu.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlxgtr.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemojbld.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemiphqt.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemladna.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemyrift.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemnehct.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemfypzc.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemljjsy.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemyomlg.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemffdwf.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempxduu.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemfvuss.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemdgdrb.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqembedup.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemxiicx.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemfzcfa.exe -
Executes dropped EXE 64 IoCs
pid Process 2924 Sysqemjzxyw.exe 3084 Sysqemgltlu.exe 2632 Sysqemjgxbb.exe 4088 Sysqemlqort.exe 1904 Sysqemtnkef.exe 1652 Sysqemzlhml.exe 856 Sysqemgprzc.exe 3764 Sysqemombmm.exe 1864 Sysqemtryuz.exe 2468 Sysqemboihr.exe 3632 Sysqemljjsy.exe 4856 Sysqemwfkkg.exe 1120 Sysqemjoinj.exe 1992 Sysqemgfnif.exe 1104 Sysqemjefsp.exe 2244 Sysqemlowih.exe 4756 Sysqemorzgt.exe 224 Sysqemymaqb.exe 4700 Sysqemgfzqq.exe 2856 Sysqemiactl.exe 2132 Sysqemtlsyp.exe 1620 Sysqemdgtjx.exe 4688 Sysqemnnxop.exe 2152 Sysqembaoev.exe 60 Sysqemlseba.exe 2900 Sysqemwofui.exe 3724 Sysqemgnjra.exe 4652 Sysqemtaahg.exe 3492 Sysqembedup.exe 5040 Sysqemdhgsc.exe 2684 Sysqemdodxt.exe 228 Sysqemyrift.exe 3740 Sysqemyuvxh.exe 3536 Sysqemlwcte.exe 4444 Sysqemdpqyy.exe 2784 Sysqemvhbwx.exe 2324 Sysqemnhetw.exe 4548 Sysqemlmlpg.exe 1356 Sysqemijsph.exe 4596 Sysqemlqzrx.exe 1244 Sysqemacumn.exe 2788 Sysqemlfwkg.exe 3720 Sysqemlbknx.exe 4088 Sysqemdmgtq.exe 1992 Sysqemniivs.exe 3172 Sysqemnbktf.exe 2240 Sysqemqtkwj.exe 2904 Sysqemdgdrb.exe 4644 Sysqemvfgpa.exe 3632 Sysqemlzepv.exe 4564 Sysqemxiicx.exe 3800 Sysqemaaafb.exe 3972 Sysqemlhoqf.exe 1012 Sysqemgnegs.exe 5080 Sysqemsawoz.exe 4828 Sysqemsitmx.exe 2108 Sysqemcpyxb.exe 3628 Sysqemaqspj.exe 4764 Sysqemnszko.exe 3256 Sysqemaqdsi.exe 4780 Sysqempnmgg.exe 4660 Sysqemyomlg.exe 2152 Sysqemdbgzd.exe 5024 Sysqemkugrm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjansv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeqgzu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemreiof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygowf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmobj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvwlqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzmrtf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdgdrb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmlryy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblnzj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhetw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyrift.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnszko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlmlpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqtkwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwekad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfzcfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxgtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemphemh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrfcsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfypzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcpyxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjmjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsoktp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoncug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefpua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtpgci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwwav.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgynzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgigbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgprzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdgtjx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtaahg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemacumn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvobbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempxehm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlowih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiiblm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnvqnx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzohum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemivuma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemedxtn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxrjap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbwxg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxqnor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemniivs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkbtyk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemombmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfzqq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdmgtq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjpit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdeqes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqnyif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtlsyp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempnmgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmgxav.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyiryb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembagla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdodxt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxydau.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemphdtx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgnegs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemywcts.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhlesa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4340 wrote to memory of 2924 4340 09b4334c4205996925e222e507ae2860_NeikiAnalytics.exe 85 PID 4340 wrote to memory of 2924 4340 09b4334c4205996925e222e507ae2860_NeikiAnalytics.exe 85 PID 4340 wrote to memory of 2924 4340 09b4334c4205996925e222e507ae2860_NeikiAnalytics.exe 85 PID 2924 wrote to memory of 3084 2924 Sysqemjzxyw.exe 87 PID 2924 wrote to memory of 3084 2924 Sysqemjzxyw.exe 87 PID 2924 wrote to memory of 3084 2924 Sysqemjzxyw.exe 87 PID 3084 wrote to memory of 2632 3084 Sysqemgltlu.exe 88 PID 3084 wrote to memory of 2632 3084 Sysqemgltlu.exe 88 PID 3084 wrote to memory of 2632 3084 Sysqemgltlu.exe 88 PID 2632 wrote to memory of 4088 2632 Sysqemjgxbb.exe 90 PID 2632 wrote to memory of 4088 2632 Sysqemjgxbb.exe 90 PID 2632 wrote to memory of 4088 2632 Sysqemjgxbb.exe 90 PID 4088 wrote to memory of 1904 4088 Sysqemlqort.exe 92 PID 4088 wrote to memory of 1904 4088 Sysqemlqort.exe 92 PID 4088 wrote to memory of 1904 4088 Sysqemlqort.exe 92 PID 1904 wrote to memory of 1652 1904 Sysqemtnkef.exe 93 PID 1904 wrote to memory of 1652 1904 Sysqemtnkef.exe 93 PID 1904 wrote to memory of 1652 1904 Sysqemtnkef.exe 93 PID 1652 wrote to memory of 856 1652 Sysqemzlhml.exe 94 PID 1652 wrote to memory of 856 1652 Sysqemzlhml.exe 94 PID 1652 wrote to memory of 856 1652 Sysqemzlhml.exe 94 PID 856 wrote to memory of 3764 856 Sysqemgprzc.exe 95 PID 856 wrote to memory of 3764 856 Sysqemgprzc.exe 95 PID 856 wrote to memory of 3764 856 Sysqemgprzc.exe 95 PID 3764 wrote to memory of 1864 3764 Sysqemombmm.exe 98 PID 3764 wrote to memory of 1864 3764 Sysqemombmm.exe 98 PID 3764 wrote to memory of 1864 3764 Sysqemombmm.exe 98 PID 1864 wrote to memory of 2468 1864 Sysqemtryuz.exe 119 PID 1864 wrote to memory of 2468 1864 Sysqemtryuz.exe 119 PID 1864 wrote to memory of 2468 1864 Sysqemtryuz.exe 119 PID 2468 wrote to memory of 3632 2468 Sysqemboihr.exe 100 PID 2468 wrote to memory of 3632 2468 Sysqemboihr.exe 100 PID 2468 wrote to memory of 3632 2468 Sysqemboihr.exe 100 PID 3632 wrote to memory of 4856 3632 Sysqemljjsy.exe 101 PID 3632 wrote to memory of 4856 3632 Sysqemljjsy.exe 101 PID 3632 wrote to memory of 4856 3632 Sysqemljjsy.exe 101 PID 4856 wrote to memory of 1120 4856 Sysqemwfkkg.exe 103 PID 4856 wrote to memory of 1120 4856 Sysqemwfkkg.exe 103 PID 4856 wrote to memory of 1120 4856 Sysqemwfkkg.exe 103 PID 1120 wrote to memory of 1992 1120 Sysqemjoinj.exe 105 PID 1120 wrote to memory of 1992 1120 Sysqemjoinj.exe 105 PID 1120 wrote to memory of 1992 1120 Sysqemjoinj.exe 105 PID 1992 wrote to memory of 1104 1992 Sysqemgfnif.exe 106 PID 1992 wrote to memory of 1104 1992 Sysqemgfnif.exe 106 PID 1992 wrote to memory of 1104 1992 Sysqemgfnif.exe 106 PID 1104 wrote to memory of 2244 1104 Sysqemjefsp.exe 107 PID 1104 wrote to memory of 2244 1104 Sysqemjefsp.exe 107 PID 1104 wrote to memory of 2244 1104 Sysqemjefsp.exe 107 PID 2244 wrote to memory of 4756 2244 Sysqemlowih.exe 108 PID 2244 wrote to memory of 4756 2244 Sysqemlowih.exe 108 PID 2244 wrote to memory of 4756 2244 Sysqemlowih.exe 108 PID 4756 wrote to memory of 224 4756 Sysqemorzgt.exe 109 PID 4756 wrote to memory of 224 4756 Sysqemorzgt.exe 109 PID 4756 wrote to memory of 224 4756 Sysqemorzgt.exe 109 PID 224 wrote to memory of 4700 224 Sysqemymaqb.exe 110 PID 224 wrote to memory of 4700 224 Sysqemymaqb.exe 110 PID 224 wrote to memory of 4700 224 Sysqemymaqb.exe 110 PID 4700 wrote to memory of 2856 4700 Sysqemgfzqq.exe 112 PID 4700 wrote to memory of 2856 4700 Sysqemgfzqq.exe 112 PID 4700 wrote to memory of 2856 4700 Sysqemgfzqq.exe 112 PID 2856 wrote to memory of 2132 2856 Sysqemiactl.exe 114 PID 2856 wrote to memory of 2132 2856 Sysqemiactl.exe 114 PID 2856 wrote to memory of 2132 2856 Sysqemiactl.exe 114 PID 2132 wrote to memory of 1620 2132 Sysqemtlsyp.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\09b4334c4205996925e222e507ae2860_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\09b4334c4205996925e222e507ae2860_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzxyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzxyw.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgltlu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgltlu.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgxbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgxbb.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqort.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqort.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnkef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnkef.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgprzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgprzc.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemombmm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemombmm.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtryuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtryuz.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemboihr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemboihr.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljjsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljjsy.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwfkkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwfkkg.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjoinj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjoinj.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfnif.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfnif.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjefsp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjefsp.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlowih.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlowih.exe"17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemymaqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemymaqb.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfzqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfzqq.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiactl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiactl.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlsyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlsyp.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgtjx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgtjx.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnnxop.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnnxop.exe"24⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\Sysqembaoev.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembaoev.exe"25⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlseba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlseba.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:60 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwofui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwofui.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnjra.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnjra.exe"28⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtaahg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtaahg.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\Sysqembedup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembedup.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhgsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhgsc.exe"31⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdodxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdodxt.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyrift.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyrift.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyuvxh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyuvxh.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwcte.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwcte.exe"35⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpqyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpqyy.exe"36⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvhbwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhbwx.exe"37⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhetw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhetw.exe"38⤵
- Executes dropped EXE
- Modifies registry class
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmlpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmlpg.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemijsph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijsph.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqzrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqzrx.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacumn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacumn.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlfwkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlfwkg.exe"43⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbknx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbknx.exe"44⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmgtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmgtq.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemniivs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemniivs.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnbktf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnbktf.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqtkwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqtkwj.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgdrb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgdrb.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvfgpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfgpa.exe"50⤵
- Executes dropped EXE
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzepv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzepv.exe"51⤵
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxiicx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxiicx.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaaafb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaaafb.exe"53⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhoqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhoqf.exe"54⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnegs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnegs.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsawoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsawoz.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsitmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsitmx.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpyxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpyxb.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqspj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqspj.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnszko.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnszko.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqdsi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqdsi.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnmgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnmgg.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyomlg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyomlg.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbgzd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbgzd.exe"64⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkugrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkugrm.exe"65⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfdpf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfdpf.exe"66⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\Sysqemscecd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscecd.exe"67⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfpwkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpwkd.exe"68⤵
- Checks computer location settings
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcbsxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbsxb.exe"69⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\Sysqempawfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempawfv.exe"70⤵
- Checks computer location settings
PID:448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkubvv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkubvv.exe"71⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxwiqs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwiqs.exe"72⤵
- Checks computer location settings
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsoktp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsoktp.exe"73⤵
- Modifies registry class
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffdwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffdwf.exe"74⤵
- Checks computer location settings
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Sysqempafmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempafmg.exe"75⤵
- Checks computer location settings
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswjcm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswjcm.exe"76⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\Sysqempxduu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxduu.exe"77⤵
- Checks computer location settings
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxydau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxydau.exe"78⤵
- Modifies registry class
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgxav.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\Sysqempmldk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempmldk.exe"80⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxfkdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxfkdz.exe"81⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmobj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmobj.exe"82⤵
- Modifies registry class
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemstttl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemstttl.exe"83⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemevzjx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevzjx.exe"84⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaipzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaipzr.exe"85⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemudugj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemudugj.exe"86⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfchrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfchrn.exe"87⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjansv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjansv.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxrjap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxrjap.exe"89⤵
- Modifies registry class
PID:848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfvuss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfvuss.exe"90⤵
- Checks computer location settings
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmlryy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlryy.exe"91⤵
- Modifies registry class
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkymlv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkymlv.exe"92⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\Sysqemphdtx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphdtx.exe"93⤵
- Modifies registry class
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxprrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxprrc.exe"94⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzohum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzohum.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphemh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphemh.exe"96⤵
- Modifies registry class
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhatsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhatsa.exe"97⤵
- Checks computer location settings
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrodvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrodvk.exe"98⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmfwyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfwyz.exe"99⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwekad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwekad.exe"100⤵
- Modifies registry class
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcntjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcntjf.exe"101⤵
- Checks computer location settings
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbwrt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbwrt.exe"102⤵
- Checks computer location settings
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmuhz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmuhz.exe"103⤵
- Checks computer location settings
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqgzu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqgzu.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzsad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzsad.exe"105⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmkess.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkess.exe"106⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeyedg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyedg.exe"107⤵
- Checks computer location settings
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwvenc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvenc.exe"108⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgfulj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfulj.exe"109⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemreiof.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemreiof.exe"110⤵
- Checks computer location settings
- Modifies registry class
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblnzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblnzj.exe"111⤵
- Modifies registry class
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoncug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoncug.exe"112⤵
- Modifies registry class
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteiun.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteiun.exe"113⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgceci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgceci.exe"114⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrfcsp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfcsp.exe"115⤵
- Modifies registry class
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyvrym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyvrym.exe"116⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlxgtr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxgtr.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcfoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcfoc.exe"118⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\Sysqembbqlb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbqlb.exe"119⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjjfrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjfrh.exe"120⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\Sysqemygowf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygowf.exe"121⤵
- Modifies registry class
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdidrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdidrc.exe"122⤵PID:1672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-