Analysis
-
max time kernel
104s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 06:31
Behavioral task
behavioral1
Sample
b1abd08b647d7ff05d4f880c93d54cd0_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
b1abd08b647d7ff05d4f880c93d54cd0_NeikiAnalytics.exe
-
Size
209KB
-
MD5
b1abd08b647d7ff05d4f880c93d54cd0
-
SHA1
d4620495e1e5ab7f990048e77eadf0d82ee3d4aa
-
SHA256
07dbc2f4122a8548b412728898dfd9650a1a6c0b2eb5657321da92b2df97a179
-
SHA512
dcda87740695479489d2bcd8250463be6f97d6f03247c9ee535d839725622f8ac9b1b06fa865334e6b6ed50cefce89455a499177e30aacf7c8b37599e34a0ba2
-
SSDEEP
3072:BdEUfKj8BYbDiC1ZTK7sxtLUIGWCQPCBCkjTS4V4JqaEu3EwrtJgYCA2SWI:BUSiZTK40OOOu47rTJCA2SWI
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 19 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0007000000023452-6.dat family_berbew behavioral2/files/0x0007000000023451-41.dat family_berbew behavioral2/files/0x0007000000023453-71.dat family_berbew behavioral2/files/0x0007000000023454-106.dat family_berbew behavioral2/files/0x000800000002344e-142.dat family_berbew behavioral2/files/0x0007000000023455-177.dat family_berbew behavioral2/files/0x0007000000023456-212.dat family_berbew behavioral2/files/0x0007000000023457-251.dat family_berbew behavioral2/files/0x0007000000023459-288.dat family_berbew behavioral2/files/0x000700000002345a-324.dat family_berbew behavioral2/files/0x0003000000021e1b-361.dat family_berbew behavioral2/files/0x0003000000021ebc-398.dat family_berbew behavioral2/files/0x000b00000002338c-434.dat family_berbew behavioral2/files/0x000700000002345b-472.dat family_berbew behavioral2/files/0x000700000002345c-510.dat family_berbew behavioral2/files/0x000a00000002338a-548.dat family_berbew behavioral2/files/0x000700000002345d-583.dat family_berbew behavioral2/files/0x000a000000023384-620.dat family_berbew behavioral2/files/0x0009000000023385-656.dat family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemnyick.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemkzzry.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemgyflz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemxxito.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqempkmrt.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemmcvod.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemlzxei.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemiprng.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemkpyfx.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemyotkl.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemydppj.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemsrmlt.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemzbzwx.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemqtrvk.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqembhupg.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemtepfd.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqempctsc.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemlbjuy.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemyhnyw.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemzyrmz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemopicy.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqembomka.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemazedt.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemkdzih.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemsnsvu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemthdin.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemyywka.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemarkbt.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemcdwfi.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemwhzbn.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemgvocy.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemhafgg.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemwrzop.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemykjss.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemvzbga.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemwywlz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemukttu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemkjefg.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemgftpg.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemadwbi.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemxfoue.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemalack.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemceiyd.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemvagtl.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemnckqn.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemegayu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqempyurb.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemhljoz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemhouvc.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemekawn.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemyeviz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemdgidb.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemnquhz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemdkmme.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation b1abd08b647d7ff05d4f880c93d54cd0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqembwttf.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemjpcrz.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemimpbo.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemivvrm.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemdzuro.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemmrahe.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemyzcsa.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqemzhcym.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation Sysqempruxo.exe -
Executes dropped EXE 64 IoCs
pid Process 3984 Sysqemlukhv.exe 4616 Sysqemmrahe.exe 4128 Sysqemlgyfv.exe 3672 Sysqemdjmpx.exe 2580 Sysqemdgidb.exe 3052 Sysqemgfonq.exe 2420 Sysqemofnnf.exe 2168 Sysqemthdin.exe 2584 Sysqemqbzvm.exe 1312 Sysqemwywlz.exe 2540 Sysqembwttf.exe 4384 Sysqemdgtjx.exe 1684 Sysqemgykhp.exe 4644 Sysqemjpcrz.exe 412 Sysqemqumeq.exe 4548 Sysqemyywka.exe 2580 Sysqemllgzg.exe 2860 Sysqemwghsv.exe 2296 Sysqemgftpg.exe 1616 Sysqemgnuvr.exe 4916 Sysqemdaqqp.exe 2384 Sysqemgyflz.exe 2164 Sysqemiflvo.exe 2944 Sysqemgndvc.exe 3160 Sysqemfctbt.exe 2332 Sysqemqrftv.exe 3852 Sysqembqkrn.exe 4468 Sysqemiuuex.exe 3708 Sysqemosrmk.exe 4720 Sysqembficq.exe 2212 Sysqemlbjuy.exe 2396 Sysqemyotkl.exe 2540 Sysqemgvocy.exe 2296 Sysqemydppj.exe 2788 Sysqemywqad.exe 1504 Sysqemyzcsa.exe 3680 Sysqemqwclo.exe 3864 Sysqemlnwfl.exe 4632 Sysqemydawf.exe 2416 Sysqemnijbd.exe 4880 Sysqemyhnyw.exe 920 Sysqemszpbl.exe 1480 Sysqemljdhe.exe 3376 Sysqemtzamk.exe 2176 Sysqemnquhz.exe 4808 Sysqemdkriv.exe 2072 Sysqemgfvyj.exe 2824 Sysqemkvbyr.exe 3944 Sysqemxxito.exe 3972 Sysqemnrolj.exe 2180 Sysqemdkmme.exe 2800 Sysqemnnawg.exe 1640 Sysqemfgpcz.exe 1808 Sysqemfkbuo.exe 4052 Sysqemxnqxq.exe 4032 Sysqemkpfan.exe 4552 Sysqemkajsb.exe 5000 Sysqemsfule.exe 3392 Sysqemvagtl.exe 1644 Sysqemnpibn.exe 3272 Sysqempkmrt.exe 2720 Sysqemajzux.exe 552 Sysqemftjdz.exe 1480 Sysqemsrmlt.exe -
resource yara_rule behavioral2/memory/376-0-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x0007000000023452-6.dat upx behavioral2/files/0x0007000000023451-41.dat upx behavioral2/files/0x0007000000023453-71.dat upx behavioral2/files/0x0007000000023454-106.dat upx behavioral2/memory/4128-108-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x000800000002344e-142.dat upx behavioral2/files/0x0007000000023455-177.dat upx behavioral2/files/0x0007000000023456-212.dat upx behavioral2/memory/3052-214-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/376-235-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x0007000000023457-251.dat upx behavioral2/memory/2420-252-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/3984-282-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x0007000000023459-288.dat upx behavioral2/memory/4616-318-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x000700000002345a-324.dat upx behavioral2/memory/4128-355-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x0003000000021e1b-361.dat upx behavioral2/memory/3672-392-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x0003000000021ebc-398.dat upx behavioral2/memory/2580-428-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x000b00000002338c-434.dat upx behavioral2/memory/4384-436-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/3052-466-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x000700000002345b-472.dat upx behavioral2/memory/1684-474-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2420-504-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x000700000002345c-510.dat upx behavioral2/memory/4644-512-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2168-542-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x000a00000002338a-548.dat upx behavioral2/files/0x000700000002345d-583.dat upx behavioral2/memory/2584-614-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x000a000000023384-620.dat upx behavioral2/memory/1312-650-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/files/0x0009000000023385-656.dat upx behavioral2/memory/2860-658-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2540-688-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4384-721-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/1684-731-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4644-757-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/412-759-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4548-793-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2580-800-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2384-801-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2860-830-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2296-864-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/1616-961-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4916-998-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2384-1063-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2164-1125-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2944-1159-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/3160-1165-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2332-1195-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/3852-1229-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4468-1239-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/3708-1264-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4720-1270-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2212-1300-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2396-1310-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2540-1335-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/2296-1369-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/4632-1375-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyflz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrgftq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemunujr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvtmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemusmbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmayhw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqumeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyywka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdhfxk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkdzih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvgxtg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemttdsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmcvod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemimpbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemilozz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmqozj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfkbuo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnlvze.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtlcez.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemajzsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdkmme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemutkiq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemowikx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvyulo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfaqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhnxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemesxtm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyotkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnckqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempruxo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiuuex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemosrmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgnuvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdkriv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlconc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhupg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkpyfx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemthdin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembwttf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgvocy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkpfan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsfule.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemewnrx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqtrvk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvrrae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmrahe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgykhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhljoz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzhcym.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnyick.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltbwb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfpkox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkvbyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxfoue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtzamk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnpibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhouvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmtodw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlnwfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyhnyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemminga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhzbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlmbqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyyhaz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 376 wrote to memory of 3984 376 b1abd08b647d7ff05d4f880c93d54cd0_NeikiAnalytics.exe 87 PID 376 wrote to memory of 3984 376 b1abd08b647d7ff05d4f880c93d54cd0_NeikiAnalytics.exe 87 PID 376 wrote to memory of 3984 376 b1abd08b647d7ff05d4f880c93d54cd0_NeikiAnalytics.exe 87 PID 3984 wrote to memory of 4616 3984 Sysqemlukhv.exe 88 PID 3984 wrote to memory of 4616 3984 Sysqemlukhv.exe 88 PID 3984 wrote to memory of 4616 3984 Sysqemlukhv.exe 88 PID 4616 wrote to memory of 4128 4616 Sysqemmrahe.exe 89 PID 4616 wrote to memory of 4128 4616 Sysqemmrahe.exe 89 PID 4616 wrote to memory of 4128 4616 Sysqemmrahe.exe 89 PID 4128 wrote to memory of 3672 4128 Sysqemlgyfv.exe 91 PID 4128 wrote to memory of 3672 4128 Sysqemlgyfv.exe 91 PID 4128 wrote to memory of 3672 4128 Sysqemlgyfv.exe 91 PID 3672 wrote to memory of 2580 3672 Sysqemdjmpx.exe 109 PID 3672 wrote to memory of 2580 3672 Sysqemdjmpx.exe 109 PID 3672 wrote to memory of 2580 3672 Sysqemdjmpx.exe 109 PID 2580 wrote to memory of 3052 2580 Sysqemdgidb.exe 95 PID 2580 wrote to memory of 3052 2580 Sysqemdgidb.exe 95 PID 2580 wrote to memory of 3052 2580 Sysqemdgidb.exe 95 PID 3052 wrote to memory of 2420 3052 Sysqemgfonq.exe 96 PID 3052 wrote to memory of 2420 3052 Sysqemgfonq.exe 96 PID 3052 wrote to memory of 2420 3052 Sysqemgfonq.exe 96 PID 2420 wrote to memory of 2168 2420 Sysqemofnnf.exe 97 PID 2420 wrote to memory of 2168 2420 Sysqemofnnf.exe 97 PID 2420 wrote to memory of 2168 2420 Sysqemofnnf.exe 97 PID 2168 wrote to memory of 2584 2168 Sysqemthdin.exe 98 PID 2168 wrote to memory of 2584 2168 Sysqemthdin.exe 98 PID 2168 wrote to memory of 2584 2168 Sysqemthdin.exe 98 PID 2584 wrote to memory of 1312 2584 Sysqemqbzvm.exe 99 PID 2584 wrote to memory of 1312 2584 Sysqemqbzvm.exe 99 PID 2584 wrote to memory of 1312 2584 Sysqemqbzvm.exe 99 PID 1312 wrote to memory of 2540 1312 Sysqemwywlz.exe 129 PID 1312 wrote to memory of 2540 1312 Sysqemwywlz.exe 129 PID 1312 wrote to memory of 2540 1312 Sysqemwywlz.exe 129 PID 2540 wrote to memory of 4384 2540 Sysqembwttf.exe 101 PID 2540 wrote to memory of 4384 2540 Sysqembwttf.exe 101 PID 2540 wrote to memory of 4384 2540 Sysqembwttf.exe 101 PID 4384 wrote to memory of 1684 4384 Sysqemdgtjx.exe 104 PID 4384 wrote to memory of 1684 4384 Sysqemdgtjx.exe 104 PID 4384 wrote to memory of 1684 4384 Sysqemdgtjx.exe 104 PID 1684 wrote to memory of 4644 1684 Sysqemgykhp.exe 105 PID 1684 wrote to memory of 4644 1684 Sysqemgykhp.exe 105 PID 1684 wrote to memory of 4644 1684 Sysqemgykhp.exe 105 PID 4644 wrote to memory of 412 4644 Sysqemjpcrz.exe 106 PID 4644 wrote to memory of 412 4644 Sysqemjpcrz.exe 106 PID 4644 wrote to memory of 412 4644 Sysqemjpcrz.exe 106 PID 412 wrote to memory of 4548 412 Sysqemqumeq.exe 107 PID 412 wrote to memory of 4548 412 Sysqemqumeq.exe 107 PID 412 wrote to memory of 4548 412 Sysqemqumeq.exe 107 PID 4548 wrote to memory of 2580 4548 Sysqemyywka.exe 109 PID 4548 wrote to memory of 2580 4548 Sysqemyywka.exe 109 PID 4548 wrote to memory of 2580 4548 Sysqemyywka.exe 109 PID 2580 wrote to memory of 2860 2580 Sysqemllgzg.exe 111 PID 2580 wrote to memory of 2860 2580 Sysqemllgzg.exe 111 PID 2580 wrote to memory of 2860 2580 Sysqemllgzg.exe 111 PID 2860 wrote to memory of 2296 2860 Sysqemwghsv.exe 132 PID 2860 wrote to memory of 2296 2860 Sysqemwghsv.exe 132 PID 2860 wrote to memory of 2296 2860 Sysqemwghsv.exe 132 PID 2296 wrote to memory of 1616 2296 Sysqemgftpg.exe 113 PID 2296 wrote to memory of 1616 2296 Sysqemgftpg.exe 113 PID 2296 wrote to memory of 1616 2296 Sysqemgftpg.exe 113 PID 1616 wrote to memory of 4916 1616 Sysqemgnuvr.exe 114 PID 1616 wrote to memory of 4916 1616 Sysqemgnuvr.exe 114 PID 1616 wrote to memory of 4916 1616 Sysqemgnuvr.exe 114 PID 4916 wrote to memory of 2384 4916 Sysqemdaqqp.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1abd08b647d7ff05d4f880c93d54cd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b1abd08b647d7ff05d4f880c93d54cd0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlukhv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlukhv.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrahe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrahe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgyfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgyfv.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdjmpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjmpx.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgidb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgidb.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfonq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfonq.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofnnf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofnnf.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemthdin.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemthdin.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbzvm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbzvm.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwywlz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwywlz.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwttf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwttf.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgtjx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgtjx.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgykhp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgykhp.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpcrz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpcrz.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqumeq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqumeq.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyywka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyywka.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllgzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllgzg.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwghsv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwghsv.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgftpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgftpg.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnuvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnuvr.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdaqqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdaqqp.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyflz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyflz.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiflvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiflvo.exe"24⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgndvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgndvc.exe"25⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfctbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfctbt.exe"26⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqrftv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrftv.exe"27⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqkrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqkrn.exe"28⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiuuex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiuuex.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosrmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosrmk.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\Sysqembficq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembficq.exe"31⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbjuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbjuy.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyotkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyotkl.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvocy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvocy.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemydppj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydppj.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywqad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywqad.exe"36⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyzcsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyzcsa.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwclo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwclo.exe"38⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnwfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnwfl.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemydawf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydawf.exe"40⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnijbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnijbd.exe"41⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhnyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhnyw.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszpbl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszpbl.exe"43⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemljdhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljdhe.exe"44⤵
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtzamk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtzamk.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnquhz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnquhz.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdkriv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkriv.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfvyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfvyj.exe"48⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkvbyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvbyr.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxxito.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxxito.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrolj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrolj.exe"51⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdkmme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkmme.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnnawg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnnawg.exe"53⤵
- Executes dropped EXE
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgpcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgpcz.exe"54⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfkbuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfkbuo.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnqxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnqxq.exe"56⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkpfan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpfan.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkajsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkajsb.exe"58⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsfule.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsfule.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvagtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvagtl.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnlvze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlvze.exe"61⤵
- Modifies registry class
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnpibn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnpibn.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Sysqempkmrt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkmrt.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajzux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajzux.exe"64⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemftjdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemftjdz.exe"65⤵
- Executes dropped EXE
PID:552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrmlt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrmlt.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrqis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrqis.exe"67⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\Sysqemarkbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemarkbt.exe"68⤵
- Checks computer location settings
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemadwbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemadwbi.exe"69⤵
- Checks computer location settings
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhafgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhafgg.exe"70⤵
- Checks computer location settings
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxfoue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxfoue.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"72⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrzvpp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzvpp.exe"73⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcdwfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdwfi.exe"74⤵
- Checks computer location settings
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnckqn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnckqn.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhcym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhcym.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemegayu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemegayu.exe"77⤵
- Checks computer location settings
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhryw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhryw.exe"78⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmcvod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmcvod.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbzwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbzwx.exe"80⤵
- Checks computer location settings
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrbcuw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrbcuw.exe"81⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\Sysqemclbkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemclbkd.exe"82⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuwppo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwppo.exe"83⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Sysqempruxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempruxo.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhgln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhgln.exe"85⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhouvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhouvc.exe"86⤵
- Checks computer location settings
- Modifies registry class
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtodw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtodw.exe"87⤵
- Modifies registry class
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwogol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwogol.exe"88⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemesrbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemesrbv.exe"89⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrfira.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrfira.exe"90⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemminga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemminga.exe"91⤵
- Modifies registry class
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemewnrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewnrx.exe"92⤵
- Modifies registry class
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcbmmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbmmh.exe"93⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwidnw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwidnw.exe"94⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\Sysqemucinx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucinx.exe"95⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrgftq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgftq.exe"96⤵
- Modifies registry class
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemunujr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemunujr.exe"97⤵
- Modifies registry class
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemukttu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukttu.exe"98⤵
- Checks computer location settings
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvtmc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvtmc.exe"99⤵
- Modifies registry class
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzeff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzeff.exe"100⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemugrhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugrhb.exe"101⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcoonh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcoonh.exe"102⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Sysqembhnxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhnxq.exe"103⤵
- Modifies registry class
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"104⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\Sysqemusmbp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemusmbp.exe"105⤵
- Modifies registry class
PID:920 -
C:\Users\Admin\AppData\Local\Temp\Sysqempyurb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempyurb.exe"106⤵
- Checks computer location settings
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemekawn.exe"107⤵
- Checks computer location settings
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzyrmz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzyrmz.exe"108⤵
- Checks computer location settings
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmayhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmayhw.exe"109⤵
- Modifies registry class
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwhuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwhuu.exe"110⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoyopz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoyopz.exe"111⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\Sysqembavlw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembavlw.exe"112⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\Sysqemutkiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutkiq.exe"113⤵
- Modifies registry class
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemesxtm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemesxtm.exe"114⤵
- Modifies registry class
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmitzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmitzr.exe"115⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwhzbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhzbn.exe"116⤵
- Checks computer location settings
- Modifies registry class
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexvht.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexvht.exe"117⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\Sysqemowikx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowikx.exe"118⤵
- Modifies registry class
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopicy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopicy.exe"119⤵
- Checks computer location settings
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\Sysqembomka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembomka.exe"120⤵
- Checks computer location settings
PID:700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlconc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlconc.exe"121⤵
- Modifies registry class
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyeviz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyeviz.exe"122⤵
- Checks computer location settings
PID:2212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-