Analysis
-
max time kernel
18s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 00:25
Behavioral task
behavioral1
Sample
3b916e61e687275166389664685371f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b916e61e687275166389664685371f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3b916e61e687275166389664685371f0_NeikiAnalytics.exe
-
Size
86KB
-
MD5
3b916e61e687275166389664685371f0
-
SHA1
a0a9553c0aca93503312ab892bce1266122adb00
-
SHA256
afe03e821dd6caa938827ed53da9309ad0e1820a7c41209893d8572f59e63b4d
-
SHA512
6e1f7f64817f1be7699519366dc252c8c865e174fa213fb66db1c22169c8bad28b78debe517d0ec160a0719dc19ea5b681fe8666420eba56ef33331edb64ef0f
-
SSDEEP
1536:TYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nxy:0dEUfKj8BYbDiC1ZTK7sxtLUIG3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemrdhdo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtflzp.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemdaqqp.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtywaq.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemlduny.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemnckwt.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemnvhvl.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemdvioo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemeheuw.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemdockh.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtamgw.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqembqeei.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemeibrz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemzptmz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqizzi.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemlgggm.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemjcxai.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqshpb.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemgxrcz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemlkjxy.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemympnk.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemiwodj.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqyivk.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemwwpae.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemyomsn.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqembfmcw.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemlqbns.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtjcle.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemyfbjv.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqembwttf.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemedheu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemiqxod.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemhwvgd.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemmjqti.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqotzh.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemymqsv.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemyztlp.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqembnxjs.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemjoinj.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemgygqk.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemvhbwx.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemlateb.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemopiuc.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemzduij.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemjnlgi.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtkisf.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemlxnee.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 3b916e61e687275166389664685371f0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemycizy.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemgatul.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemdqksk.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemafhwe.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqembficq.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemohhhr.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtmpda.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemrfozz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqcwxb.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemjktrd.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemvnjgr.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtpopj.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemoecjp.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqembgiza.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqembkwpu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemwzcts.exe -
Executes dropped EXE 64 IoCs
pid Process 4248 Sysqemwagea.exe 376 Sysqemykybt.exe 1188 Sysqemlateb.exe 2256 Sysqembqeei.exe 2992 Sysqemohhhr.exe 1944 Sysqemycizy.exe 1560 Sysqemopiuc.exe 2296 Sysqemyomsn.exe 2792 Sysqemlepuv.exe 2700 Sysqembfmcw.exe 2316 Sysqemlqbns.exe 4796 Sysqemwirkw.exe 5072 Sysqemjcxai.exe 3416 Sysqemzduij.exe 4892 Sysqemjynar.exe 3160 Sysqemtjcle.exe 376 Sysqemjnlgi.exe 824 Sysqemtmpda.exe 4920 Sysqemhwvgd.exe 3336 Sysqemrdhdo.exe 1992 Sysqembnxjs.exe 4752 Sysqemmjqti.exe 820 Sysqemqzuow.exe 4856 Sysqemeibrz.exe 2280 Sysqemoecjp.exe 2088 Sysqembgiza.exe 2800 Sysqemqotzh.exe 4384 Sysqemgatul.exe 4240 Sysqemwinck.exe 3108 Sysqemjktrd.exe 3104 Sysqemzptmz.exe 3056 Sysqemlukhv.exe 4944 Sysqembkwpu.exe 2296 Sysqemqshpb.exe 2032 Sysqemdqksk.exe 2052 Sysqemtywaq.exe 2984 Sysqemgxrcz.exe 692 Sysqemtkisf.exe 3752 Sysqemjoinj.exe 1468 Sysqemlkjxy.exe 3572 Sysqemympnk.exe 1128 Sysqemilbku.exe 2184 Sysqemymqsv.exe 4244 Sysqemiwodj.exe 3724 Sysqemvnjgr.exe 208 Sysqemlduny.exe 5012 Sysqemblgvf.exe 4488 Sysqemlgggm.exe 4676 Sysqemyfbjv.exe 3052 Sysqemlvele.exe 648 Sysqembwttf.exe 4740 Sysqemnckwt.exe 4168 Sysqemedheu.exe 2364 Sysqemqizzi.exe 5024 Sysqemdvioo.exe 1848 Sysqemrfozz.exe 372 Sysqemdhvhl.exe 4084 Sysqemtpopj.exe 3036 Sysqemeheuw.exe 3372 Sysqemocwfe.exe 548 Sysqemaiohs.exe 692 Sysqemqmwcw.exe 3492 Sysqemdockh.exe 4288 Sysqemqyivk.exe -
resource yara_rule behavioral2/memory/2108-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000700000002349d-6.dat upx behavioral2/memory/4248-37-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0009000000023496-42.dat upx behavioral2/files/0x000700000002349f-73.dat upx behavioral2/memory/376-74-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1188-110-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00070000000234a0-109.dat upx behavioral2/files/0x00070000000234a1-144.dat upx behavioral2/files/0x00070000000234a2-180.dat upx behavioral2/memory/2992-181-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000b00000002340f-215.dat upx behavioral2/memory/1944-217-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0009000000023410-252.dat upx behavioral2/files/0x00030000000229de-287.dat upx behavioral2/files/0x000f000000023404-322.dat upx behavioral2/memory/2108-358-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x000e000000023411-357.dat upx behavioral2/memory/4248-395-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x0004000000022a49-394.dat upx behavioral2/files/0x000900000002340e-430.dat upx behavioral2/memory/376-432-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1188-469-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00070000000234a4-468.dat upx behavioral2/memory/2256-506-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00070000000234a5-505.dat upx behavioral2/memory/2992-548-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4892-543-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1944-581-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00070000000234a7-580.dat upx behavioral2/memory/1560-619-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00070000000234a8-618.dat upx behavioral2/memory/824-656-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2296-657-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00080000000234a9-655.dat upx behavioral2/files/0x00070000000234ae-692.dat upx behavioral2/memory/2792-694-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3336-733-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2700-729-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2316-759-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00070000000234a6-542.dat upx behavioral2/memory/4796-793-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4752-799-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/5072-827-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3416-837-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4892-866-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3160-905-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2280-900-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/376-963-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/824-997-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4920-1035-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3104-1106-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/1992-1102-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3056-1137-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4752-1136-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/820-1175-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4944-1174-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4856-1206-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2280-1239-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2032-1240-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2088-1274-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2800-1313-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/2984-1312-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/4384-1348-0x0000000000400000-0x0000000000492000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvhaql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 3b916e61e687275166389664685371f0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrdhdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembkwpu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdqksk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemedheu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwzcts.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiqxod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdpazi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvele.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnckwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdhvhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtmpda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoecjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlkjxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembwttf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrfozz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdockh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembficq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjcxai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjoinj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemilbku.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvnjgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlgggm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyomsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgatul.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzptmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqmwcw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwwpae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxnee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemowdez.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembqeei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembnxjs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlduny.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemocwfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhwvgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeheuw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiukgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlqbns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzuow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqotzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtpopj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemggwsx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgygqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemykybt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwinck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjktrd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtywaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqizzi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaiohs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembxnsd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyztlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhetw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjynar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlukhv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqcwxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtflzp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtjcle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjnlgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgxrcz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemympnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblgvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtamgw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlepuv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4248 2108 3b916e61e687275166389664685371f0_NeikiAnalytics.exe 85 PID 2108 wrote to memory of 4248 2108 3b916e61e687275166389664685371f0_NeikiAnalytics.exe 85 PID 2108 wrote to memory of 4248 2108 3b916e61e687275166389664685371f0_NeikiAnalytics.exe 85 PID 4248 wrote to memory of 376 4248 Sysqemwagea.exe 188 PID 4248 wrote to memory of 376 4248 Sysqemwagea.exe 188 PID 4248 wrote to memory of 376 4248 Sysqemwagea.exe 188 PID 376 wrote to memory of 1188 376 Sysqemykybt.exe 88 PID 376 wrote to memory of 1188 376 Sysqemykybt.exe 88 PID 376 wrote to memory of 1188 376 Sysqemykybt.exe 88 PID 1188 wrote to memory of 2256 1188 Sysqemlateb.exe 89 PID 1188 wrote to memory of 2256 1188 Sysqemlateb.exe 89 PID 1188 wrote to memory of 2256 1188 Sysqemlateb.exe 89 PID 2256 wrote to memory of 2992 2256 Sysqembqeei.exe 90 PID 2256 wrote to memory of 2992 2256 Sysqembqeei.exe 90 PID 2256 wrote to memory of 2992 2256 Sysqembqeei.exe 90 PID 2992 wrote to memory of 1944 2992 Sysqemohhhr.exe 91 PID 2992 wrote to memory of 1944 2992 Sysqemohhhr.exe 91 PID 2992 wrote to memory of 1944 2992 Sysqemohhhr.exe 91 PID 1944 wrote to memory of 1560 1944 Sysqemycizy.exe 92 PID 1944 wrote to memory of 1560 1944 Sysqemycizy.exe 92 PID 1944 wrote to memory of 1560 1944 Sysqemycizy.exe 92 PID 1560 wrote to memory of 2296 1560 Sysqemopiuc.exe 126 PID 1560 wrote to memory of 2296 1560 Sysqemopiuc.exe 126 PID 1560 wrote to memory of 2296 1560 Sysqemopiuc.exe 126 PID 2296 wrote to memory of 2792 2296 Sysqemyomsn.exe 94 PID 2296 wrote to memory of 2792 2296 Sysqemyomsn.exe 94 PID 2296 wrote to memory of 2792 2296 Sysqemyomsn.exe 94 PID 2792 wrote to memory of 2700 2792 Sysqemlepuv.exe 95 PID 2792 wrote to memory of 2700 2792 Sysqemlepuv.exe 95 PID 2792 wrote to memory of 2700 2792 Sysqemlepuv.exe 95 PID 2700 wrote to memory of 2316 2700 Sysqembfmcw.exe 96 PID 2700 wrote to memory of 2316 2700 Sysqembfmcw.exe 96 PID 2700 wrote to memory of 2316 2700 Sysqembfmcw.exe 96 PID 2316 wrote to memory of 4796 2316 Sysqemlqbns.exe 97 PID 2316 wrote to memory of 4796 2316 Sysqemlqbns.exe 97 PID 2316 wrote to memory of 4796 2316 Sysqemlqbns.exe 97 PID 4796 wrote to memory of 5072 4796 Sysqemwirkw.exe 98 PID 4796 wrote to memory of 5072 4796 Sysqemwirkw.exe 98 PID 4796 wrote to memory of 5072 4796 Sysqemwirkw.exe 98 PID 5072 wrote to memory of 3416 5072 Sysqemjcxai.exe 101 PID 5072 wrote to memory of 3416 5072 Sysqemjcxai.exe 101 PID 5072 wrote to memory of 3416 5072 Sysqemjcxai.exe 101 PID 3416 wrote to memory of 4892 3416 Sysqemzduij.exe 102 PID 3416 wrote to memory of 4892 3416 Sysqemzduij.exe 102 PID 3416 wrote to memory of 4892 3416 Sysqemzduij.exe 102 PID 4892 wrote to memory of 3160 4892 Sysqemjynar.exe 103 PID 4892 wrote to memory of 3160 4892 Sysqemjynar.exe 103 PID 4892 wrote to memory of 3160 4892 Sysqemjynar.exe 103 PID 3160 wrote to memory of 376 3160 Sysqemtjcle.exe 188 PID 3160 wrote to memory of 376 3160 Sysqemtjcle.exe 188 PID 3160 wrote to memory of 376 3160 Sysqemtjcle.exe 188 PID 376 wrote to memory of 824 376 Sysqemjnlgi.exe 106 PID 376 wrote to memory of 824 376 Sysqemjnlgi.exe 106 PID 376 wrote to memory of 824 376 Sysqemjnlgi.exe 106 PID 824 wrote to memory of 4920 824 Sysqemtmpda.exe 108 PID 824 wrote to memory of 4920 824 Sysqemtmpda.exe 108 PID 824 wrote to memory of 4920 824 Sysqemtmpda.exe 108 PID 4920 wrote to memory of 3336 4920 Sysqemhwvgd.exe 229 PID 4920 wrote to memory of 3336 4920 Sysqemhwvgd.exe 229 PID 4920 wrote to memory of 3336 4920 Sysqemhwvgd.exe 229 PID 3336 wrote to memory of 1992 3336 Sysqemrdhdo.exe 203 PID 3336 wrote to memory of 1992 3336 Sysqemrdhdo.exe 203 PID 3336 wrote to memory of 1992 3336 Sysqemrdhdo.exe 203 PID 1992 wrote to memory of 4752 1992 Sysqembnxjs.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b916e61e687275166389664685371f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3b916e61e687275166389664685371f0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwagea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwagea.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemykybt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemykybt.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlateb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlateb.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqeei.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqeei.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohhhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohhhr.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycizy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycizy.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopiuc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopiuc.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyomsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyomsn.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlepuv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlepuv.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfmcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfmcw.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqbns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqbns.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwirkw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwirkw.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcxai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcxai.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzduij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzduij.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjynar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjynar.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjcle.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjcle.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjnlgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnlgi.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmpda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmpda.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhwvgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwvgd.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrdhdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdhdo.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnxjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnxjs.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjqti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjqti.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzuow.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzuow.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeibrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeibrz.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoecjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoecjp.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgiza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgiza.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqotzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqotzh.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgatul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgatul.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwinck.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwinck.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjktrd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjktrd.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzptmz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzptmz.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlukhv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlukhv.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkwpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkwpu.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqshpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqshpb.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqksk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqksk.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtywaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtywaq.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxrcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxrcz.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkisf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkisf.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjoinj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjoinj.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlkjxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlkjxy.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemympnk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemympnk.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilbku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilbku.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemymqsv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemymqsv.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwodj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwodj.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvnjgr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvnjgr.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlduny.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlduny.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblgvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblgvf.exe"48⤵
- Executes dropped EXE
- Modifies registry class
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgggm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgggm.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfbjv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfbjv.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvele.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvele.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwttf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwttf.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnckwt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnckwt.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemedheu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedheu.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqizzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqizzi.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrfozz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfozz.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhvhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhvhl.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpopj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpopj.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeheuw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeheuw.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemocwfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemocwfe.exe"61⤵
- Executes dropped EXE
- Modifies registry class
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaiohs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaiohs.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdockh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdockh.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqyivk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyivk.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxnsd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxnsd.exe"66⤵
- Modifies registry class
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnvhvl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnvhvl.exe"67⤵
- Checks computer location settings
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdaqqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdaqqp.exe"68⤵
- Checks computer location settings
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcwxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcwxb.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemggwsx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemggwsx.exe"70⤵
- Modifies registry class
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwwpae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwpae.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrilt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrilt.exe"72⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwzcts.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzcts.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgygqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgygqk.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtamgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtamgw.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiqxod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqxod.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvhaql.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhaql.exe"77⤵
- Modifies registry class
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiukgr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiukgr.exe"78⤵
- Modifies registry class
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvhbwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhbwx.exe"79⤵
- Checks computer location settings
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxnee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxnee.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyztlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyztlp.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhetw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhetw.exe"82⤵
- Modifies registry class
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafhwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafhwe.exe"83⤵
- Checks computer location settings
PID:316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosrmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosrmk.exe"84⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\Sysqembficq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembficq.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemowdez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowdez.exe"86⤵
- Modifies registry class
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpazi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpazi.exe"87⤵
- Modifies registry class
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtflzp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtflzp.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjjuut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjuut.exe"89⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemydqpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydqpd.exe"90⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnwncm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnwncm.exe"91⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvqkxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqkxo.exe"92⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\Sysqemolbpq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolbpq.exe"93⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkqka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkqka.exe"94⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Sysqembgsib.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgsib.exe"95⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxsonl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxsonl.exe"96⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyhnyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhnyw.exe"97⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"98⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnbvwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnbvwx.exe"99⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\Sysqemssbxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssbxe.exe"100⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvyqnf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvyqnf.exe"101⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdofsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdofsl.exe"102⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdgpqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgpqr.exe"103⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkolww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkolww.exe"104⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvcqgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcqgy.exe"105⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvvqys.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvvqys.exe"106⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsitmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsitmx.exe"107⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiyfue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyfue.exe"108⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\Sysqemycfpi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycfpi.exe"109⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkhwjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhwjw.exe"110⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaitzx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaitzx.exe"111⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnokum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnokum.exe"112⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcwwct.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwwct.exe"113⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\Sysqempurfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempurfb.exe"114⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiqqxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqqxd.exe"115⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Sysqemygbfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygbfc.exe"116⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfzbpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzbpl.exe"117⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemndmio.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndmio.exe"118⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsusiv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsusiv.exe"119⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsjrby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsjrby.exe"120⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\Sysqempkkuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkkuo.exe"121⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxkkzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkkzg.exe"122⤵PID:3344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-