Analysis
-
max time kernel
94s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
cb172c57749f56c77a42e5488708cdc0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cb172c57749f56c77a42e5488708cdc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
cb172c57749f56c77a42e5488708cdc0_NeikiAnalytics.exe
-
Size
537KB
-
MD5
cb172c57749f56c77a42e5488708cdc0
-
SHA1
d398746fe88bd5f5f5521e775b470428e7783d59
-
SHA256
23984adaaff88a2b0fcc122bbd74033144c7a6c8ed00d1e5b6d47662db124713
-
SHA512
eab7f6d5f8dd47890851040daf6c263b20ce7d4659c4edb1512f69de979e56b6700cfaa797a65f1df5d061453929d7d12e8fc4c391d73280436fbfd38d9ca1f8
-
SSDEEP
3072:wCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxu:wqDAwl0xPTMiR9JSSxPUKYGdodHN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemdthpv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemixfeu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembqzgh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemzvsgu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkjtdm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemadrjz.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcpzyc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkdviu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempkruw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfmcgo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcagml.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnqnru.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemrxili.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfzcfa.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmpsna.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempzkqe.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemswufe.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuqwvj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembpzrx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemesslr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnkuwj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemfeokt.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqftgo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemddczr.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemxlwye.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuweex.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemufqdd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwhuwp.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhmyzo.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemtxzie.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqempucbm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcqqvm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemjgllh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnstnn.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcjbgj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembutps.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemyszpa.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemttzfq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemefpua.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemikdac.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemefvfu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemlktyh.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemltesw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemyqcfx.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemepqum.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemwcvfl.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuttkl.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemsknlj.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemcbsxb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemhahel.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemgkoje.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemmiins.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqembsuzk.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemijnpc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkbaxq.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemplsro.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemraenv.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemuqlrs.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemyjsbw.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqdwis.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemqmmep.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemiufah.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemnuplb.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Sysqemkhhav.exe -
Executes dropped EXE 64 IoCs
pid Process 1144 Sysqemcbsxb.exe 2064 Sysqempdhsy.exe 4316 Sysqemxlwye.exe 4924 Sysqemcjbgj.exe 1136 Sysqemdrctd.exe 4448 Sysqemnqnru.exe 4852 Sysqemkzxrp.exe 1848 Sysqemhahel.exe 1248 Sysqemixfeu.exe 3932 Sysqemmnkrq.exe 884 Sysqemslhhe.exe 4268 Sysqemraenv.exe 2296 Sysqemswufe.exe 3104 Sysqemkdviu.exe 3440 Sysqempmmqw.exe 4004 Sysqemnkuwj.exe 1400 Sysqempcnzm.exe 4260 Sysqemuweex.exe 4296 Sysqemkeakj.exe 232 Sysqemrildm.exe 3732 Sysqemueptt.exe 556 Sysqemuialw.exe 2600 Sysqemuicbb.exe 2172 Sysqembqzgh.exe 4196 Sysqemuqlrs.exe 884 Sysqemmjzpd.exe 3832 Sysqemuqwvj.exe 2264 Sysqemzkfiu.exe 2964 Sysqemzvsgu.exe 3948 Sysqemzzoqk.exe 1828 Sysqemjhttg.exe 2684 Sysqemzdche.exe 4872 Sysqemefvfu.exe 4700 Sysqemuzafv.exe 2204 Sysqemrxili.exe 4788 Sysqemcwnwe.exe 5104 Sysqemyjsbw.exe 4940 Sysqembpzrx.exe 2172 Sysqemteiun.exe 4852 Sysqemttzfq.exe 2152 Sysqemwlziu.exe 3256 Sysqemmiins.exe 3452 Sysqemberby.exe 220 Sysqemgkoje.exe 5024 Sysqemyczgd.exe 3204 Sysqemwtkoq.exe 2232 Sysqembutps.exe 4700 Sysqemyszpa.exe 4512 Sysqemwbsxv.exe 2680 Sysqemqzasq.exe 2152 Sysqemjgllh.exe 996 Sysqemqdwis.exe 2264 Sysqemwjcdr.exe 5048 Sysqemgihon.exe 232 Sysqemefpua.exe 3440 Sysqembsuzk.exe 4004 Sysqemyqcfx.exe 3184 Sysqemgunxa.exe 1352 Sysqemlktyh.exe 600 Sysqemlzkqk.exe 2252 Sysqemqmmep.exe 884 Sysqemdouzm.exe 2776 Sysqemdsfrp.exe 3084 Sysqemltesw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemijnpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqdwis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemddrhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemixfeu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempmmqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemddczr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxlwye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxkzgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsbtbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcagml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcpzyc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyqcfx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtxoxn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltesw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmyzo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfzcfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfpylg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsknlj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefjjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzasq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfeokt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdthpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaullb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlzexq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembsphv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkdviu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhinzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgunxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuttkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemraenv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemueptt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjzpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjhttg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjcdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgihon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcjbgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemslhhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczlfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembsuzk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempkruw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemptwsu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemepqum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemplsro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnqnru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhahel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwbsxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemywdyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaiyqr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuwaec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemufqdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkuboh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkfiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiyxde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrxili.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqqvm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhuwp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrilm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcbsxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuialw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemurmlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiwqti.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzbfar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefvfu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfofbl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 1144 220 cb172c57749f56c77a42e5488708cdc0_NeikiAnalytics.exe 90 PID 220 wrote to memory of 1144 220 cb172c57749f56c77a42e5488708cdc0_NeikiAnalytics.exe 90 PID 220 wrote to memory of 1144 220 cb172c57749f56c77a42e5488708cdc0_NeikiAnalytics.exe 90 PID 1144 wrote to memory of 2064 1144 Sysqemcbsxb.exe 93 PID 1144 wrote to memory of 2064 1144 Sysqemcbsxb.exe 93 PID 1144 wrote to memory of 2064 1144 Sysqemcbsxb.exe 93 PID 2064 wrote to memory of 4316 2064 Sysqempdhsy.exe 94 PID 2064 wrote to memory of 4316 2064 Sysqempdhsy.exe 94 PID 2064 wrote to memory of 4316 2064 Sysqempdhsy.exe 94 PID 4316 wrote to memory of 4924 4316 Sysqemxlwye.exe 95 PID 4316 wrote to memory of 4924 4316 Sysqemxlwye.exe 95 PID 4316 wrote to memory of 4924 4316 Sysqemxlwye.exe 95 PID 4924 wrote to memory of 1136 4924 Sysqemcjbgj.exe 96 PID 4924 wrote to memory of 1136 4924 Sysqemcjbgj.exe 96 PID 4924 wrote to memory of 1136 4924 Sysqemcjbgj.exe 96 PID 1136 wrote to memory of 4448 1136 Sysqemdrctd.exe 98 PID 1136 wrote to memory of 4448 1136 Sysqemdrctd.exe 98 PID 1136 wrote to memory of 4448 1136 Sysqemdrctd.exe 98 PID 4448 wrote to memory of 4852 4448 Sysqemnqnru.exe 99 PID 4448 wrote to memory of 4852 4448 Sysqemnqnru.exe 99 PID 4448 wrote to memory of 4852 4448 Sysqemnqnru.exe 99 PID 4852 wrote to memory of 1848 4852 Sysqemkzxrp.exe 100 PID 4852 wrote to memory of 1848 4852 Sysqemkzxrp.exe 100 PID 4852 wrote to memory of 1848 4852 Sysqemkzxrp.exe 100 PID 1848 wrote to memory of 1248 1848 Sysqemhahel.exe 101 PID 1848 wrote to memory of 1248 1848 Sysqemhahel.exe 101 PID 1848 wrote to memory of 1248 1848 Sysqemhahel.exe 101 PID 1248 wrote to memory of 3932 1248 Sysqemixfeu.exe 103 PID 1248 wrote to memory of 3932 1248 Sysqemixfeu.exe 103 PID 1248 wrote to memory of 3932 1248 Sysqemixfeu.exe 103 PID 3932 wrote to memory of 884 3932 Sysqemmnkrq.exe 105 PID 3932 wrote to memory of 884 3932 Sysqemmnkrq.exe 105 PID 3932 wrote to memory of 884 3932 Sysqemmnkrq.exe 105 PID 884 wrote to memory of 4268 884 Sysqemslhhe.exe 106 PID 884 wrote to memory of 4268 884 Sysqemslhhe.exe 106 PID 884 wrote to memory of 4268 884 Sysqemslhhe.exe 106 PID 4268 wrote to memory of 2296 4268 Sysqemraenv.exe 107 PID 4268 wrote to memory of 2296 4268 Sysqemraenv.exe 107 PID 4268 wrote to memory of 2296 4268 Sysqemraenv.exe 107 PID 2296 wrote to memory of 3104 2296 Sysqemswufe.exe 108 PID 2296 wrote to memory of 3104 2296 Sysqemswufe.exe 108 PID 2296 wrote to memory of 3104 2296 Sysqemswufe.exe 108 PID 3104 wrote to memory of 3440 3104 Sysqemkdviu.exe 109 PID 3104 wrote to memory of 3440 3104 Sysqemkdviu.exe 109 PID 3104 wrote to memory of 3440 3104 Sysqemkdviu.exe 109 PID 3440 wrote to memory of 4004 3440 Sysqempmmqw.exe 110 PID 3440 wrote to memory of 4004 3440 Sysqempmmqw.exe 110 PID 3440 wrote to memory of 4004 3440 Sysqempmmqw.exe 110 PID 4004 wrote to memory of 1400 4004 Sysqemnkuwj.exe 111 PID 4004 wrote to memory of 1400 4004 Sysqemnkuwj.exe 111 PID 4004 wrote to memory of 1400 4004 Sysqemnkuwj.exe 111 PID 1400 wrote to memory of 4260 1400 Sysqempcnzm.exe 112 PID 1400 wrote to memory of 4260 1400 Sysqempcnzm.exe 112 PID 1400 wrote to memory of 4260 1400 Sysqempcnzm.exe 112 PID 4260 wrote to memory of 4296 4260 Sysqemuweex.exe 113 PID 4260 wrote to memory of 4296 4260 Sysqemuweex.exe 113 PID 4260 wrote to memory of 4296 4260 Sysqemuweex.exe 113 PID 4296 wrote to memory of 232 4296 Sysqemkeakj.exe 114 PID 4296 wrote to memory of 232 4296 Sysqemkeakj.exe 114 PID 4296 wrote to memory of 232 4296 Sysqemkeakj.exe 114 PID 232 wrote to memory of 3732 232 Sysqemrildm.exe 115 PID 232 wrote to memory of 3732 232 Sysqemrildm.exe 115 PID 232 wrote to memory of 3732 232 Sysqemrildm.exe 115 PID 3732 wrote to memory of 556 3732 Sysqemueptt.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb172c57749f56c77a42e5488708cdc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cb172c57749f56c77a42e5488708cdc0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcbsxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbsxb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdhsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdhsy.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxlwye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxlwye.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcjbgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjbgj.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdrctd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdrctd.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnqnru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnqnru.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkzxrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkzxrp.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhahel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhahel.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixfeu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixfeu.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnkrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnkrq.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemslhhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslhhe.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemraenv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemraenv.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswufe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswufe.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdviu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdviu.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqempmmqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempmmqw.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnkuwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkuwj.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqempcnzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempcnzm.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuweex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuweex.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkeakj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkeakj.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrildm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrildm.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemueptt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemueptt.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuialw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuialw.exe"23⤵
- Executes dropped EXE
- Modifies registry class
PID:556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuicbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuicbb.exe"24⤵
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqzgh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqzgh.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuqlrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuqlrs.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjzpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjzpd.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuqwvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuqwvj.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzkfiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkfiu.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvsgu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvsgu.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzoqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzoqk.exe"31⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjhttg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjhttg.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdche.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdche.exe"33⤵
- Executes dropped EXE
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhinzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhinzh.exe"34⤵
- Modifies registry class
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefvfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefvfu.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzafv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzafv.exe"36⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxili.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxili.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcwnwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwnwe.exe"38⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjsbw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjsbw.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqembpzrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembpzrx.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteiun.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteiun.exe"41⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttzfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttzfq.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"43⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmiins.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmiins.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemberby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemberby.exe"45⤵
- Executes dropped EXE
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkoje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkoje.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyczgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyczgd.exe"47⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwtkoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtkoq.exe"48⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\Sysqembutps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembutps.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyszpa.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbsxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbsxv.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzasq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzasq.exe"52⤵
- Executes dropped EXE
- Modifies registry class
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgllh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgllh.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdwis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdwis.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjcdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjcdr.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgihon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgihon.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemefpua.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemefpua.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqembsuzk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembsuzk.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyqcfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyqcfx.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgunxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgunxa.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlktyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlktyh.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzkqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzkqk.exe"62⤵
- Executes dropped EXE
PID:600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmmep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmmep.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdouzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdouzm.exe"64⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdsfrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdsfrp.exe"65⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltesw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltesw.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxoxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxoxn.exe"67⤵
- Modifies registry class
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdthpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdthpv.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnstnn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnstnn.exe"69⤵
- Checks computer location settings
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemynuxv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemynuxv.exe"70⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemijnpc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijnpc.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxzie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxzie.exe"72⤵
- Checks computer location settings
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxdfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxdfx.exe"73⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlbnkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbnkg.exe"74⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaullb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaullb.exe"75⤵
- Modifies registry class
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyxde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyxde.exe"76⤵
- Modifies registry class
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsmygo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsmygo.exe"77⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfofbl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfofbl.exe"78⤵
- Modifies registry class
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkbaxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbaxq.exe"79⤵
- Checks computer location settings
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfeokt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfeokt.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemikdac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikdac.exe"81⤵
- Checks computer location settings
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkjtdm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjtdm.exe"82⤵
- Checks computer location settings
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywdyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywdyd.exe"83⤵
- Modifies registry class
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemadrjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemadrjz.exe"84⤵
- Checks computer location settings
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwqti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwqti.exe"85⤵
- Modifies registry class
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalqee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalqee.exe"86⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\Sysqemddrhi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddrhi.exe"87⤵
- Modifies registry class
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfyvxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyvxo.exe"88⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlzexq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzexq.exe"89⤵
- Modifies registry class
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaiyqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaiyqr.exe"90⤵
- Modifies registry class
PID:972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfutlw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfutlw.exe"91⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Sysqemstxtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemstxtq.exe"92⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqftgo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqftgo.exe"93⤵
- Checks computer location settings
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgveu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgveu.exe"94⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuwaec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwaec.exe"95⤵
- Modifies registry class
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Sysqempkruw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkruw.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiufah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiufah.exe"97⤵
- Checks computer location settings
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzcfa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzcfa.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfpylg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpylg.exe"99⤵
- Modifies registry class
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemntkdj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntkdj.exe"100⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnewwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnewwx.exe"101⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Sysqempsaee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsaee.exe"102⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxhxjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhxjj.exe"103⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuttkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuttkl.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemptwsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptwsu.exe"105⤵
- Modifies registry class
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnuplb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnuplb.exe"106⤵
- Checks computer location settings
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsknlj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsknlj.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmcgo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmcgo.exe"108⤵
- Checks computer location settings
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemurmlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemurmlm.exe"109⤵
- Modifies registry class
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiewpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiewpd.exe"110⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxmrhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmrhe.exe"111⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\Sysqempmcfd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempmcfd.exe"112⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\Sysqempjrfm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjrfm.exe"113⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkhhav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhhav.exe"114⤵
- Checks computer location settings
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbfar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbfar.exe"115⤵
- Modifies registry class
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Sysqempucbm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempucbm.exe"116⤵
- Checks computer location settings
PID:600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxkzgs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkzgs.exe"117⤵
- Modifies registry class
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsbtbp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbtbp.exe"118⤵
- Modifies registry class
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcagml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcagml.exe"119⤵
- Checks computer location settings
- Modifies registry class
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemctqkr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctqkr.exe"120⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmpsna.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmpsna.exe"121⤵
- Checks computer location settings
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\Sysqempzkqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempzkqe.exe"122⤵
- Checks computer location settings
PID:3876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-