Analysis
-
max time kernel
80s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 07:56
Behavioral task
behavioral1
Sample
c232582eb75163a52ad77c3c5c709c10_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c232582eb75163a52ad77c3c5c709c10_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c232582eb75163a52ad77c3c5c709c10_NeikiAnalytics.exe
-
Size
96KB
-
MD5
c232582eb75163a52ad77c3c5c709c10
-
SHA1
a9492eb8ceea3ff236ab2b019c56936a10eda34d
-
SHA256
ce632cd742c658ba4c7878d6c9d7b6898e2b5fc93d141d9f4dbc57cfc57f5219
-
SHA512
8ee9327a11e2b95dcc1a62321a130e1c41dd3ace7b43ea4dc629950685a8af687210501bc01dc23b350a9bce110c8f1091b97a1b9e1a455755fe8a140a449be8
-
SSDEEP
1536:mYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nL:jdEUfKj8BYbDiC1ZTK7sxtLUIGW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqempwndy.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjaocl.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtlywi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrrpdy.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemlxqry.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemgxrcz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemwjeru.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqembhtdq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemezbxa.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjqbgj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemonrjp.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtttja.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtfpav.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrnxnj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqembecsn.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemoftyz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemaocox.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemxamqf.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemvvaee.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemktyef.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemmbpls.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemalptk.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemgxyfe.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemaydby.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemcoiac.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemsibcc.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjukzc.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrhzxr.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemeignx.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqembzwfr.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemnjhqe.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemkxgfy.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemzxdgd.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemmjlob.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemoucsx.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtsibk.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemlxmqs.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemizdeb.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemugzru.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemrzccq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemxfbco.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqempugbh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjfrgq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemboyjq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemeyaef.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemyuvxh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemubtxm.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtsnnp.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemihxlh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemvmuzl.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemmtpbj.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemzjgdo.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqembyyyq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemytyws.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemoalpl.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtsiyf.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemctvnv.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemdxfml.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemtjnod.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemxydau.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemebhps.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemjmtuu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqempfcmk.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Sysqemgssor.exe -
Executes dropped EXE 64 IoCs
pid Process 1480 Sysqemoftyz.exe 2520 Sysqempfcmk.exe 3580 Sysqemwjeru.exe 1264 Sysqemeyaef.exe 1908 Sysqemezbxa.exe 2156 Sysqemovchh.exe 4888 Sysqemzqczx.exe 1668 Sysqemmsbca.exe 3888 Sysqemokaas.exe 2300 Sysqemrtspk.exe 1632 Sysqemzjgdo.exe 3184 Sysqemevzkh.exe 4168 Sysqemmlvyl.exe 3852 Sysqemtsiyf.exe 2716 Sysqemtpelj.exe 4268 Sysqemryole.exe 4592 Sysqemrrpdy.exe 3380 Sysqemwljyj.exe 2756 Sysqemeeizq.exe 3656 Sysqemjqbgj.exe 1444 Sysqemlxqry.exe 1104 Sysqemoalpl.exe 3732 Sysqemostzf.exe 2452 Sysqemeignx.exe 2696 Sysqemtfpav.exe 3788 Sysqemmbpls.exe 2196 Sysqembyyyq.exe 1964 Sysqemysulg.exe 2980 Sysqemtjnod.exe 1168 Sysqemopeex.exe 1544 Sysqemgssor.exe 5024 Sysqemzlhml.exe 3024 Sysqemmnwhi.exe 4948 Sysqemoucsx.exe 4112 Sysqemgxrcz.exe 3644 Sysqembzwfr.exe 3756 Sysqemgblao.exe 412 Sysqembhtdq.exe 3968 Sysqemtsibk.exe 2316 Sysqemytyws.exe 2516 Sysqemalptk.exe 5020 Sysqemjmqzl.exe 1704 Sysqemtpopj.exe 2976 Sysqemdzeeq.exe 4988 Sysqemqbman.exe 444 Sysqemddbvs.exe 4888 Sysqemyuvxh.exe 2816 Sysqemiflvo.exe 3580 Sysqemlxmqs.exe 3396 Sysqemauveq.exe 1444 Sysqemosrmk.exe 3468 Sysqemyrexo.exe 1704 Sysqemdqafi.exe 3120 Sysqemnayvh.exe 4820 Sysqemgxyfe.exe 4544 Sysqemxamqf.exe 4232 Sysqemlnftx.exe 1556 Sysqemdqtdz.exe 2200 Sysqemizdeb.exe 4876 Sysqemaocox.exe 1752 Sysqemlytmw.exe 3268 Sysqemvjrcc.exe 2544 Sysqemkobha.exe 3948 Sysqemdcsax.exe -
resource yara_rule behavioral2/memory/864-0-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233e6-6.dat upx behavioral2/memory/1480-37-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233e5-42.dat upx behavioral2/files/0x00070000000233e7-72.dat upx behavioral2/memory/2520-74-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233e8-108.dat upx behavioral2/memory/3580-110-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00080000000233e2-144.dat upx behavioral2/files/0x00070000000233ea-179.dat upx behavioral2/files/0x00080000000233eb-214.dat upx behavioral2/files/0x000a00000002335c-249.dat upx behavioral2/memory/4888-255-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00080000000233ed-287.dat upx behavioral2/memory/864-288-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1668-289-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1480-319-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233ee-325.dat upx behavioral2/memory/2520-356-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233ef-362.dat upx behavioral2/memory/2300-364-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3580-394-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233f0-400.dat upx behavioral2/memory/1632-402-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1264-432-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233f1-438.dat upx behavioral2/memory/1908-469-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233f2-475.dat upx behavioral2/memory/4168-477-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/2156-482-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233f4-512.dat upx behavioral2/memory/4888-519-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233f5-549.dat upx behavioral2/memory/1668-552-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3888-587-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00070000000233f6-589.dat upx behavioral2/memory/2300-620-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00080000000233f7-626.dat upx behavioral2/memory/1632-657-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/files/0x00080000000233f9-663.dat upx behavioral2/memory/3184-694-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/4168-728-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3852-762-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1444-768-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/2716-797-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/4268-810-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/4592-833-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3380-867-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/2756-877-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3656-902-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1444-936-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1104-970-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/2196-976-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3732-1005-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/2452-1042-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/2696-1077-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3788-1106-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/2196-1139-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/5024-1145-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1964-1174-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/3024-1180-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/2980-1209-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1168-1244-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral2/memory/1544-1281-0x0000000000400000-0x0000000000494000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrtspk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxfml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxydau.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmzffb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempwndy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembdmlx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemokaas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytyws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlnftx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemizdeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjeru.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlxqry.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiflvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcxehz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvqod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoalpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnayvh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjqbgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdcsax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkonlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvmuzl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtttja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvqrdx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemovchh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmnwhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoucsx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrnxnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrhzxr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytfeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrrpdy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlytmw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfcmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdzeeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsibcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfodf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoqtfx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmlvyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembyyyq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemubtxm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshlrc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjaocl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemerixi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtjnod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgssor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdqafi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemalekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzpww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgxrcz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemddbvs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxamqf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkxgfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmobj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlziu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyaef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemysulg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnkauu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmtpbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwekad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoxuon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwljyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaocox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkbuws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkuzxi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscxbt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 1480 864 c232582eb75163a52ad77c3c5c709c10_NeikiAnalytics.exe 83 PID 864 wrote to memory of 1480 864 c232582eb75163a52ad77c3c5c709c10_NeikiAnalytics.exe 83 PID 864 wrote to memory of 1480 864 c232582eb75163a52ad77c3c5c709c10_NeikiAnalytics.exe 83 PID 1480 wrote to memory of 2520 1480 Sysqemoftyz.exe 85 PID 1480 wrote to memory of 2520 1480 Sysqemoftyz.exe 85 PID 1480 wrote to memory of 2520 1480 Sysqemoftyz.exe 85 PID 2520 wrote to memory of 3580 2520 Sysqempfcmk.exe 87 PID 2520 wrote to memory of 3580 2520 Sysqempfcmk.exe 87 PID 2520 wrote to memory of 3580 2520 Sysqempfcmk.exe 87 PID 3580 wrote to memory of 1264 3580 Sysqemwjeru.exe 88 PID 3580 wrote to memory of 1264 3580 Sysqemwjeru.exe 88 PID 3580 wrote to memory of 1264 3580 Sysqemwjeru.exe 88 PID 1264 wrote to memory of 1908 1264 Sysqemeyaef.exe 89 PID 1264 wrote to memory of 1908 1264 Sysqemeyaef.exe 89 PID 1264 wrote to memory of 1908 1264 Sysqemeyaef.exe 89 PID 1908 wrote to memory of 2156 1908 Sysqemezbxa.exe 90 PID 1908 wrote to memory of 2156 1908 Sysqemezbxa.exe 90 PID 1908 wrote to memory of 2156 1908 Sysqemezbxa.exe 90 PID 2156 wrote to memory of 4888 2156 Sysqemovchh.exe 91 PID 2156 wrote to memory of 4888 2156 Sysqemovchh.exe 91 PID 2156 wrote to memory of 4888 2156 Sysqemovchh.exe 91 PID 4888 wrote to memory of 1668 4888 Sysqemzqczx.exe 92 PID 4888 wrote to memory of 1668 4888 Sysqemzqczx.exe 92 PID 4888 wrote to memory of 1668 4888 Sysqemzqczx.exe 92 PID 1668 wrote to memory of 3888 1668 Sysqemmsbca.exe 94 PID 1668 wrote to memory of 3888 1668 Sysqemmsbca.exe 94 PID 1668 wrote to memory of 3888 1668 Sysqemmsbca.exe 94 PID 3888 wrote to memory of 2300 3888 Sysqemokaas.exe 96 PID 3888 wrote to memory of 2300 3888 Sysqemokaas.exe 96 PID 3888 wrote to memory of 2300 3888 Sysqemokaas.exe 96 PID 2300 wrote to memory of 1632 2300 Sysqemrtspk.exe 97 PID 2300 wrote to memory of 1632 2300 Sysqemrtspk.exe 97 PID 2300 wrote to memory of 1632 2300 Sysqemrtspk.exe 97 PID 1632 wrote to memory of 3184 1632 Sysqemzjgdo.exe 98 PID 1632 wrote to memory of 3184 1632 Sysqemzjgdo.exe 98 PID 1632 wrote to memory of 3184 1632 Sysqemzjgdo.exe 98 PID 3184 wrote to memory of 4168 3184 Sysqemevzkh.exe 100 PID 3184 wrote to memory of 4168 3184 Sysqemevzkh.exe 100 PID 3184 wrote to memory of 4168 3184 Sysqemevzkh.exe 100 PID 4168 wrote to memory of 3852 4168 Sysqemmlvyl.exe 102 PID 4168 wrote to memory of 3852 4168 Sysqemmlvyl.exe 102 PID 4168 wrote to memory of 3852 4168 Sysqemmlvyl.exe 102 PID 3852 wrote to memory of 2716 3852 Sysqemtsiyf.exe 103 PID 3852 wrote to memory of 2716 3852 Sysqemtsiyf.exe 103 PID 3852 wrote to memory of 2716 3852 Sysqemtsiyf.exe 103 PID 2716 wrote to memory of 4268 2716 Sysqemtpelj.exe 104 PID 2716 wrote to memory of 4268 2716 Sysqemtpelj.exe 104 PID 2716 wrote to memory of 4268 2716 Sysqemtpelj.exe 104 PID 4268 wrote to memory of 4592 4268 Sysqemryole.exe 105 PID 4268 wrote to memory of 4592 4268 Sysqemryole.exe 105 PID 4268 wrote to memory of 4592 4268 Sysqemryole.exe 105 PID 4592 wrote to memory of 3380 4592 Sysqemrrpdy.exe 106 PID 4592 wrote to memory of 3380 4592 Sysqemrrpdy.exe 106 PID 4592 wrote to memory of 3380 4592 Sysqemrrpdy.exe 106 PID 3380 wrote to memory of 2756 3380 Sysqemwljyj.exe 107 PID 3380 wrote to memory of 2756 3380 Sysqemwljyj.exe 107 PID 3380 wrote to memory of 2756 3380 Sysqemwljyj.exe 107 PID 2756 wrote to memory of 3656 2756 Sysqemeeizq.exe 108 PID 2756 wrote to memory of 3656 2756 Sysqemeeizq.exe 108 PID 2756 wrote to memory of 3656 2756 Sysqemeeizq.exe 108 PID 3656 wrote to memory of 1444 3656 Sysqemjqbgj.exe 142 PID 3656 wrote to memory of 1444 3656 Sysqemjqbgj.exe 142 PID 3656 wrote to memory of 1444 3656 Sysqemjqbgj.exe 142 PID 1444 wrote to memory of 1104 1444 Sysqemlxqry.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\c232582eb75163a52ad77c3c5c709c10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c232582eb75163a52ad77c3c5c709c10_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoftyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoftyz.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfcmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfcmk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjeru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjeru.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyaef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyaef.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemezbxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemezbxa.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemovchh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovchh.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzqczx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzqczx.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmsbca.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsbca.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokaas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokaas.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtspk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtspk.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzjgdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjgdo.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevzkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevzkh.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmlvyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlvyl.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsiyf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsiyf.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpelj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpelj.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemryole.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryole.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrpdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrpdy.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwljyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwljyj.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeeizq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeeizq.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqbgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqbgj.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxqry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxqry.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoalpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoalpl.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemostzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemostzf.exe"24⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeignx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeignx.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtfpav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfpav.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbpls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbpls.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\Sysqembyyyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembyyyq.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemysulg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemysulg.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjnod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjnod.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopeex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopeex.exe"31⤵
- Executes dropped EXE
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgssor.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgssor.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"33⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnwhi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnwhi.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoucsx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoucsx.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxrcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxrcz.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzwfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzwfr.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgblao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgblao.exe"38⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhtdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhtdq.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsibk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsibk.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytyws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytyws.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalptk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalptk.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmqzl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmqzl.exe"43⤵
- Executes dropped EXE
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpopj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpopj.exe"44⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdzeeq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdzeeq.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqbman.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbman.exe"46⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddbvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddbvs.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyuvxh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyuvxh.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiflvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiflvo.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxmqs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxmqs.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemauveq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemauveq.exe"51⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosrmk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosrmk.exe"52⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyrexo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyrexo.exe"53⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqafi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqafi.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnayvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnayvh.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxyfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxyfe.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxamqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxamqf.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnftx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnftx.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqtdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqtdz.exe"59⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizdeb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizdeb.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlytmw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlytmw.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjrcc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjrcc.exe"63⤵
- Executes dropped EXE
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkobha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkobha.exe"64⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcsax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcsax.exe"65⤵
- Executes dropped EXE
- Modifies registry class
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsnnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsnnp.exe"66⤵
- Checks computer location settings
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnjhqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnjhqe.exe"67⤵
- Checks computer location settings
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihxlh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihxlh.exe"68⤵
- Checks computer location settings
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcqgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcqgy.exe"69⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkonlc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkonlc.exe"70⤵
- Modifies registry class
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvvaee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvvaee.exe"71⤵
- Checks computer location settings
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemktyef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemktyef.exe"72⤵
- Checks computer location settings
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsavkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsavkl.exe"73⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnkauu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkauu.exe"74⤵
- Modifies registry class
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemctvnv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctvnv.exe"75⤵
- Checks computer location settings
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkxgfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxgfy.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemauplw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemauplw.exe"77⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkbuws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbuws.exe"78⤵
- Modifies registry class
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaydby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaydby.exe"79⤵
- Checks computer location settings
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvmuzl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvmuzl.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemirmzl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemirmzl.exe"81⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfliuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfliuj.exe"82⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcxehz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxehz.exe"83⤵
- Modifies registry class
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxfml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxfml.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemubtxm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubtxm.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuzxi.exe"86⤵
- Modifies registry class
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrqis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrqis.exe"87⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemscxbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscxbt.exe"88⤵
- Modifies registry class
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugzru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugzru.exe"89⤵
- Checks computer location settings
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemshlrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshlrc.exe"90⤵
- Modifies registry class
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalekf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalekf.exe"91⤵
- Modifies registry class
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxfbco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxfbco.exe"92⤵
- Checks computer location settings
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxydau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxydau.exe"93⤵
- Checks computer location settings
- Modifies registry class
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcoiac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcoiac.exe"94⤵
- Checks computer location settings
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmobj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmobj.exe"95⤵
- Modifies registry class
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzxdgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxdgd.exe"96⤵
- Checks computer location settings
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcpdbh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpdbh.exe"97⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsibcc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsibcc.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklqme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklqme.exe"99⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzizac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzizac.exe"100⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcarvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcarvf.exe"101⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmzffb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmzffb.exe"102⤵
- Modifies registry class
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrnxnj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrnxnj.exe"103⤵
- Checks computer location settings
- Modifies registry class
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwogol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwogol.exe"104⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmtpbj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtpbj.exe"105⤵
- Checks computer location settings
- Modifies registry class
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvfwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvfwg.exe"106⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjukzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjukzc.exe"107⤵
- Checks computer location settings
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxtohe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtohe.exe"108⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjcrch.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcrch.exe"109⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\Sysqembyjnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembyjnd.exe"110⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\Sysqempwndy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempwndy.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwekad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwekad.exe"112⤵
- Modifies registry class
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjlob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjlob.exe"113⤵
- Checks computer location settings
PID:912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzpww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzpww.exe"114⤵
- Modifies registry class
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucumw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucumw.exe"115⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\Sysqemebhps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebhps.exe"116⤵
- Checks computer location settings
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrhzxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrhzxr.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjaocl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjaocl.exe"118⤵
- Checks computer location settings
- Modifies registry class
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemerixi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemerixi.exe"119⤵
- Modifies registry class
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Sysqembecsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembecsn.exe"120⤵
- Checks computer location settings
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\Sysqempugbh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempugbh.exe"121⤵
- Checks computer location settings
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvqod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvqod.exe"122⤵
- Modifies registry class
PID:744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-