Analysis
-
max time kernel
87s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
1c0752ca7ae362b2fbc4430a3b041e10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1c0752ca7ae362b2fbc4430a3b041e10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1c0752ca7ae362b2fbc4430a3b041e10_NeikiAnalytics.exe
-
Size
592KB
-
MD5
1c0752ca7ae362b2fbc4430a3b041e10
-
SHA1
8a1368b2ec57043ec32f3a5cf52347f4588ac424
-
SHA256
0b58b9768f92ad9f26e44216d24ec90044f106370c17cca52073c731621aae03
-
SHA512
a5ae15efd66bd51387263c1019dc321467c36d9cbdd1619dfe20cc55cdf9f471472420cefa3daa9aa9ad7234a27c0aea7ed3399574a1341f61ce1d40e35c241e
-
SSDEEP
3072:+CaoAs101Pol0xPTM7mRCAdJSSxPUkl3VqMQTCk/dN92sdNhavtrVdewnAx3wmVb:+qDAwl0xPTMiR9JSSxPUKadodHZTY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemasbce.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemidlvj.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemzgedu.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemgkyko.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqwthc.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemdhsgh.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemmurix.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemtxbtt.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemumobq.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemhxlfy.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlkult.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjrzwk.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemitmrq.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemszbfv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemigngz.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemtwkky.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemewnrx.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemuxknp.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemtfzyb.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemaommc.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemddnky.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempgtir.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemzobyw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemmsaxg.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemwgmdh.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemrnmrw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemmjutn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqembrppz.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemhycgj.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemehgfv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemwtndv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemvfknk.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemcifww.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemihxjx.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemdtssu.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemgjdxj.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemgcxcz.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemrklkp.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjngdz.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqematubu.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemuvkan.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemhuxja.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemrubwn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemvozwn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemcjqzn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemkleng.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemgmffg.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemtmczr.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqembynnq.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemllgzg.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemazeem.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqhywv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemodxhy.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemrzlnm.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjgxbb.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlcmmh.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemzsqoq.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemtqhrm.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemmnwhi.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempgzhl.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqembmkqf.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemixgux.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemnlgpu.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempxttj.exe -
Executes dropped EXE 64 IoCs
pid Process 5016 Sysqemmdkrp.exe 3948 Sysqemmsaxg.exe 3996 Sysqemtwkky.exe 4868 Sysqemgmffg.exe 3272 Sysqemrbrxi.exe 2232 Sysqemzjexc.exe 2188 Sysqemgjdxj.exe 1596 Sysqemrfeiz.exe 3636 Sysqemwgmdh.exe 536 Sysqembhvyx.exe 3652 Sysqemuetyg.exe 2924 Sysqemznbtx.exe 4832 Sysqemhgatl.exe 2228 Sysqemrnmrw.exe 2388 Sysqemdhsgh.exe 3424 Sysqemrubwn.exe 2076 Sysqembqcgu.exe 1536 Sysqemgvzwi.exe 1008 Sysqemtmczr.exe 2016 Sysqemgcxcz.exe 4224 Sysqemtxorf.exe 3548 Sysqemgojuo.exe 3992 Sysqemteexe.exe 2360 Sysqemeafhm.exe 1544 Sysqemrklkp.exe 1744 Sysqembrppz.exe 3160 Sysqemohssi.exe 3652 Sysqembynnq.exe 2888 Sysqemrkniu.exe 1764 Sysqemebqkd.exe 3068 Sysqemrzlnm.exe 4064 Sysqemdtrdf.exe 4152 Sysqemtfzyb.exe 2428 Sysqemgzfnu.exe 4512 Sysqemzdwgp.exe 2712 Sysqemmurix.exe 5016 Sysqemysulg.exe 216 Sysqemlmabr.exe 4764 Sysqemeqrbt.exe 872 Sysqemtnzbg.exe 1116 Sysqemjrzwk.exe 3840 Sysqemwtndv.exe 972 Sysqemjgxbb.exe 2940 Sysqemzlfof.exe 212 Sysqemmjaro.exe 4444 Sysqemzauuw.exe 2956 Sysqemrwums.exe 2708 Sysqemmnwhi.exe 4104 Sysqemlcmmh.exe 3360 Sysqemjohix.exe 4712 Sysqemonlqr.exe 1856 Sysqemjefsp.exe 1696 Sysqemgumti.exe 3272 Sysqemtwton.exe 1048 Sysqemjlobf.exe 4184 Sysqemthgln.exe 3976 Sysqemedheu.exe 4568 Sysqemitmrq.exe 4460 Sysqemlseba.exe 5016 Sysqemnghmv.exe 2716 Sysqemllgzg.exe 2956 Sysqemiinzh.exe 1972 Sysqemguiux.exe 388 Sysqemamkxu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrmsub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjngdz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemssbxe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembqjen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvngsw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnjhqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwbdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemewnrx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnnlsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmurix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjefsp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjlobf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemthgln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitmrq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemknfah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemezoat.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwkky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembrppz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemidlvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhycgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzobyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlczqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemihxjx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgmgcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemteexe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeafhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemysulg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlmabr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjrzwk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgpadj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbbdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmqopr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgmffg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrfeiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxpmde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmzddu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuxknp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhxlfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjffqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrzccq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztvgv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqibrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuetyg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhyvxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvhhar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgjdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmnwhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemttzhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkleng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrtxtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuxgyk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdguwp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzlfof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnlull.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemasbce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjutn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemohssi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdwgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgtir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemulzct.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrbrxi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnlgpu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemazeem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemehgfv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3800 wrote to memory of 5016 3800 1c0752ca7ae362b2fbc4430a3b041e10_NeikiAnalytics.exe 84 PID 3800 wrote to memory of 5016 3800 1c0752ca7ae362b2fbc4430a3b041e10_NeikiAnalytics.exe 84 PID 3800 wrote to memory of 5016 3800 1c0752ca7ae362b2fbc4430a3b041e10_NeikiAnalytics.exe 84 PID 5016 wrote to memory of 3948 5016 Sysqemmdkrp.exe 86 PID 5016 wrote to memory of 3948 5016 Sysqemmdkrp.exe 86 PID 5016 wrote to memory of 3948 5016 Sysqemmdkrp.exe 86 PID 3948 wrote to memory of 3996 3948 Sysqemmsaxg.exe 88 PID 3948 wrote to memory of 3996 3948 Sysqemmsaxg.exe 88 PID 3948 wrote to memory of 3996 3948 Sysqemmsaxg.exe 88 PID 3996 wrote to memory of 4868 3996 Sysqemtwkky.exe 89 PID 3996 wrote to memory of 4868 3996 Sysqemtwkky.exe 89 PID 3996 wrote to memory of 4868 3996 Sysqemtwkky.exe 89 PID 4868 wrote to memory of 3272 4868 Sysqemgmffg.exe 90 PID 4868 wrote to memory of 3272 4868 Sysqemgmffg.exe 90 PID 4868 wrote to memory of 3272 4868 Sysqemgmffg.exe 90 PID 3272 wrote to memory of 2232 3272 Sysqemrbrxi.exe 91 PID 3272 wrote to memory of 2232 3272 Sysqemrbrxi.exe 91 PID 3272 wrote to memory of 2232 3272 Sysqemrbrxi.exe 91 PID 2232 wrote to memory of 2188 2232 Sysqemzjexc.exe 92 PID 2232 wrote to memory of 2188 2232 Sysqemzjexc.exe 92 PID 2232 wrote to memory of 2188 2232 Sysqemzjexc.exe 92 PID 2188 wrote to memory of 1596 2188 Sysqemgjdxj.exe 93 PID 2188 wrote to memory of 1596 2188 Sysqemgjdxj.exe 93 PID 2188 wrote to memory of 1596 2188 Sysqemgjdxj.exe 93 PID 1596 wrote to memory of 3636 1596 Sysqemrfeiz.exe 94 PID 1596 wrote to memory of 3636 1596 Sysqemrfeiz.exe 94 PID 1596 wrote to memory of 3636 1596 Sysqemrfeiz.exe 94 PID 3636 wrote to memory of 536 3636 Sysqemwgmdh.exe 97 PID 3636 wrote to memory of 536 3636 Sysqemwgmdh.exe 97 PID 3636 wrote to memory of 536 3636 Sysqemwgmdh.exe 97 PID 536 wrote to memory of 3652 536 Sysqembhvyx.exe 121 PID 536 wrote to memory of 3652 536 Sysqembhvyx.exe 121 PID 536 wrote to memory of 3652 536 Sysqembhvyx.exe 121 PID 3652 wrote to memory of 2924 3652 Sysqemuetyg.exe 99 PID 3652 wrote to memory of 2924 3652 Sysqemuetyg.exe 99 PID 3652 wrote to memory of 2924 3652 Sysqemuetyg.exe 99 PID 2924 wrote to memory of 4832 2924 Sysqemznbtx.exe 100 PID 2924 wrote to memory of 4832 2924 Sysqemznbtx.exe 100 PID 2924 wrote to memory of 4832 2924 Sysqemznbtx.exe 100 PID 4832 wrote to memory of 2228 4832 Sysqemhgatl.exe 102 PID 4832 wrote to memory of 2228 4832 Sysqemhgatl.exe 102 PID 4832 wrote to memory of 2228 4832 Sysqemhgatl.exe 102 PID 2228 wrote to memory of 2388 2228 Sysqemrnmrw.exe 104 PID 2228 wrote to memory of 2388 2228 Sysqemrnmrw.exe 104 PID 2228 wrote to memory of 2388 2228 Sysqemrnmrw.exe 104 PID 2388 wrote to memory of 3424 2388 Sysqemdhsgh.exe 105 PID 2388 wrote to memory of 3424 2388 Sysqemdhsgh.exe 105 PID 2388 wrote to memory of 3424 2388 Sysqemdhsgh.exe 105 PID 3424 wrote to memory of 2076 3424 Sysqemrubwn.exe 106 PID 3424 wrote to memory of 2076 3424 Sysqemrubwn.exe 106 PID 3424 wrote to memory of 2076 3424 Sysqemrubwn.exe 106 PID 2076 wrote to memory of 1536 2076 Sysqembqcgu.exe 107 PID 2076 wrote to memory of 1536 2076 Sysqembqcgu.exe 107 PID 2076 wrote to memory of 1536 2076 Sysqembqcgu.exe 107 PID 1536 wrote to memory of 1008 1536 Sysqemgvzwi.exe 109 PID 1536 wrote to memory of 1008 1536 Sysqemgvzwi.exe 109 PID 1536 wrote to memory of 1008 1536 Sysqemgvzwi.exe 109 PID 1008 wrote to memory of 2016 1008 Sysqemtmczr.exe 110 PID 1008 wrote to memory of 2016 1008 Sysqemtmczr.exe 110 PID 1008 wrote to memory of 2016 1008 Sysqemtmczr.exe 110 PID 2016 wrote to memory of 4224 2016 Sysqemgcxcz.exe 112 PID 2016 wrote to memory of 4224 2016 Sysqemgcxcz.exe 112 PID 2016 wrote to memory of 4224 2016 Sysqemgcxcz.exe 112 PID 4224 wrote to memory of 3548 4224 Sysqemtxorf.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0752ca7ae362b2fbc4430a3b041e10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1c0752ca7ae362b2fbc4430a3b041e10_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmdkrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdkrp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmsaxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsaxg.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwkky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwkky.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgmffg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgmffg.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrbrxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbrxi.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzjexc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjexc.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjdxj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjdxj.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrfeiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfeiz.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwgmdh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgmdh.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhvyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhvyx.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuetyg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuetyg.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznbtx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznbtx.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhgatl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhgatl.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrnmrw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrnmrw.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhsgh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhsgh.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrubwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrubwn.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqcgu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqcgu.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvzwi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvzwi.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmczr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmczr.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgcxcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgcxcz.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxorf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxorf.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgojuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgojuo.exe"23⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteexe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteexe.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeafhm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeafhm.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrklkp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrklkp.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrppz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrppz.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohssi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohssi.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqembynnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembynnq.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkniu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkniu.exe"30⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebqkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebqkd.exe"31⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzlnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzlnm.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtrdf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtrdf.exe"33⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtfzyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfzyb.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgzfnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgzfnu.exe"35⤵
- Executes dropped EXE
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdwgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdwgp.exe"36⤵
- Executes dropped EXE
- Modifies registry class
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmurix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmurix.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemysulg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemysulg.exe"38⤵
- Executes dropped EXE
- Modifies registry class
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmabr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmabr.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqrbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqrbt.exe"40⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtnzbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnzbg.exe"41⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjrzwk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrzwk.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwtndv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtndv.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgxbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgxbb.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlfof.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlfof.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjaro.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjaro.exe"46⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzauuw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzauuw.exe"47⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwums.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwums.exe"48⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnwhi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnwhi.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcmmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcmmh.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjohix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjohix.exe"51⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemonlqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemonlqr.exe"52⤵
- Executes dropped EXE
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjefsp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjefsp.exe"53⤵
- Executes dropped EXE
- Modifies registry class
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgumti.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgumti.exe"54⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwton.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwton.exe"55⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjlobf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjlobf.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthgln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthgln.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemedheu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedheu.exe"58⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitmrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitmrq.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlseba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlseba.exe"60⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnghmv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnghmv.exe"61⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllgzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllgzg.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiinzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiinzh.exe"63⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguiux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguiux.exe"64⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemamkxu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamkxu.exe"65⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmkdm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmkdm.exe"66⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtxbtt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxbtt.exe"67⤵
- Checks computer location settings
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyngtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyngtb.exe"68⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjfxer.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfxer.exe"69⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\Sysqemttzhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttzhb.exe"70⤵
- Modifies registry class
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajvmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajvmh.exe"71⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvqlci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqlci.exe"72⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvfknk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfknk.exe"73⤵
- Checks computer location settings
PID:472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgpadj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpadj.exe"74⤵
- Modifies registry class
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcvyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcvyo.exe"75⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemazeem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemazeem.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqhywv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqhywv.exe"77⤵
- Checks computer location settings
PID:968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfbwwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfbwwq.exe"78⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaommc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaommc.exe"79⤵
- Checks computer location settings
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemssbxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemssbxe.exe"80⤵
- Modifies registry class
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemasbce.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemasbce.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvngsw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvngsw.exe"82⤵
- Modifies registry class
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszbfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszbfv.exe"83⤵
- Checks computer location settings
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjhqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjhqe.exe"84⤵
- Modifies registry class
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwbdj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwbdj.exe"85⤵
- Modifies registry class
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqematubu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqematubu.exe"86⤵
- Checks computer location settings
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixgux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixgux.exe"87⤵
- Checks computer location settings
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvozwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvozwn.exe"88⤵
- Checks computer location settings
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddnky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddnky.exe"89⤵
- Checks computer location settings
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvanuv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanuv.exe"90⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfklsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfklsu.exe"91⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdityg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdityg.exe"92⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlmfqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmfqb.exe"93⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnlull.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlull.exe"94⤵
- Modifies registry class
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxpgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxpgj.exe"95⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\Sysqemutirq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutirq.exe"96⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfojbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfojbg.exe"97⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\Sysqempgzhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgzhl.exe"98⤵
- Checks computer location settings
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcifww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcifww.exe"99⤵
- Checks computer location settings
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"100⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcjqzn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcjqzn.exe"101⤵
- Checks computer location settings
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnlgpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlgpu.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbbdn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbbdn.exe"103⤵
- Modifies registry class
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdiyk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdiyk.exe"104⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\Sysqemidlvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidlvj.exe"105⤵
- Checks computer location settings
- Modifies registry class
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhggr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhggr.exe"106⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\Sysqempxttj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxttj.exe"107⤵
- Checks computer location settings
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawgen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawgen.exe"108⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmdct.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmdct.exe"109⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmcbcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmcbcb.exe"110⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Sysqemecmis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecmis.exe"111⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuvkan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvkan.exe"112⤵
- Checks computer location settings
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkleng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkleng.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgjdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgjdg.exe"114⤵
- Modifies registry class
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhycgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhycgj.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhuxja.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhuxja.exe"116⤵
- Checks computer location settings
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgsef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgsef.exe"117⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuldxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuldxa.exe"118⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhyvxz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhyvxz.exe"119⤵
- Modifies registry class
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehgfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehgfv.exe"120⤵
- Checks computer location settings
- Modifies registry class
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgtir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgtir.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmkqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmkqf.exe"122⤵
- Checks computer location settings
PID:4676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-