Analysis
-
max time kernel
89s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe
-
Size
534KB
-
MD5
cf4d5870dca7ff111f25367288fa7bd0
-
SHA1
66e4c9475623fdad1569b728eb03ccdd48269406
-
SHA256
3b3496a3fd50e4c79c96e2f10e7029424cc5fe77fe8d82a138ae1ff832eb1da5
-
SHA512
fa232af6e29dd6861c9e2b580300d71fec90b81e8cb7c6a7d402919998cd3b70dbc88b44d4c7e5561b0107f5137134d3a4aeeb046c9a67436411543ff504813e
-
SSDEEP
3072:XCaoAs101Pol0xPTM7mRCAdJSSxPUkl3V4Vh1q+MQTCk/dN92sdNhavtrVdewnAc:XqDAwl0xPTMiR9JSSxPUKuqododHYk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdtwsh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemokvpu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjnjqu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemuxwbe.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemfctbt.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnmral.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemltpaq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemkfuul.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemvhguf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemtxfuz.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemkasyn.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnxtij.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemexlyy.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemybuzc.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemlzkqk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwhhur.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemysulg.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemiaxic.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhhrxs.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqembwhuu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemijnpc.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemtrnri.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemiwamx.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemptrhr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzgwoq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgeqkf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwcsct.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdaocw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemcthrf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemplhbv.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemkioal.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzhetw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemuyfwu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwbetb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdhvhl.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemlyxkn.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemofhqe.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemqnyif.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemsusiv.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzxdgd.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrrujp.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqempimzw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemlvmzg.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzjgdo.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwbomm.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnerkd.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemexnus.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemspedr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemcduro.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemttidx.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwkdip.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemqzgcl.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqembiusc.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemowwzj.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqembhtdq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzvlzt.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqembynnq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgrswu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemleukf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemurizt.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemtyada.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzusvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwdtwp.exe -
Executes dropped EXE 64 IoCs
pid Process 3284 Sysqembavcb.exe 1816 Sysqemzjgdo.exe 2692 Sysqemzusvc.exe 440 Sysqemrudtb.exe 3304 Sysqemozwav.exe 1172 Sysqemttidx.exe 2772 Sysqembbews.exe 3208 Sysqemgvxyc.exe 224 Sysqemowwzj.exe 2004 Sysqemtxfuz.exe 3068 Sysqemwdtwp.exe 4976 Sysqembnbzf.exe 4316 Sysqemzvlzt.exe 5024 Sysqemwhhur.exe 2684 Sysqemzovxy.exe 2520 Sysqembynnq.exe 4744 Sysqembgoak.exe 4396 Sysqemghwvs.exe 1296 Sysqemjrwll.exe 3824 Sysqemqvyyc.exe 4104 Sysqemysulg.exe 3980 Sysqemmfdbm.exe 3436 Sysqemwbetb.exe 3356 Sysqembcmok.exe 1544 Sysqemtrnri.exe 1104 Sysqemwbomm.exe 1240 Sysqemgeqkf.exe 3248 Sysqemqsrnp.exe 4480 Sysqemyieah.exe 2100 Sysqembhtdq.exe 3800 Sysqemjwpqu.exe 4224 Sysqemteuty.exe 2936 Sysqembpcmh.exe 4736 Sysqemwcsct.exe 1048 Sysqemdhvhl.exe 752 Sysqemitpcp.exe 548 Sysqemdaocw.exe 2668 Sysqemwkdip.exe 1148 Sysqemltpaq.exe 432 Sysqemvsdlu.exe 4560 Sysqemfctbt.exe 2416 Sysqemvwrbo.exe 600 Sysqemdacur.exe 1232 Sysqemqzgcl.exe 1420 Sysqemacumn.exe 3264 Sysqemyhciy.exe 548 Sysqemacfqm.exe 2820 Sysqemavpns.exe 2692 Sysqemgikbx.exe 3864 Sysqemnxhgd.exe 900 Sysqemlvhuh.exe 3916 Sysqemiwamx.exe 600 Sysqemdyfpg.exe 2144 Sysqemyphsd.exe 2824 Sysqemiaxic.exe 2948 Sysqemlsqlg.exe 3524 Sysqemfndtg.exe 3164 Sysqemnusym.exe 4544 Sysqemapkbd.exe 1792 Sysqemgrswu.exe 1120 Sysqempuphv.exe 1652 Sysqemleukf.exe 3996 Sysqemqrpxk.exe 1644 Sysqemdtwsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuvpns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfsnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemerrel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgvxyc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjrwll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdyfpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemleukf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdtwsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybuzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgmdre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqtrvk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzovxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiaxic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcduro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhhqsg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembcmok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdacur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiwamx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemplhbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxfkdz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhtdq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemteuty.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwkdip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfguhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtyada.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtixqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembutps.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvmzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyrxwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqojlw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembnbzf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemacumn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemruixv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhrtpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyrny.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwbomm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyphsd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmruzf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcirkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnusym.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnxtij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnmral.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhhrxs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembvnti.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvwrbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempimzw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltpaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemurizt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqxrwd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzgwoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembwhuu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemberby.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemowikx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemveple.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcthrf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzxdgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuyfwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrudtb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwdtwp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembpcmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdityg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkasyn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjwgxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeokyb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 3284 1020 cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe 83 PID 1020 wrote to memory of 3284 1020 cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe 83 PID 1020 wrote to memory of 3284 1020 cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe 83 PID 3284 wrote to memory of 1816 3284 Sysqembavcb.exe 84 PID 3284 wrote to memory of 1816 3284 Sysqembavcb.exe 84 PID 3284 wrote to memory of 1816 3284 Sysqembavcb.exe 84 PID 1816 wrote to memory of 2692 1816 Sysqemzjgdo.exe 85 PID 1816 wrote to memory of 2692 1816 Sysqemzjgdo.exe 85 PID 1816 wrote to memory of 2692 1816 Sysqemzjgdo.exe 85 PID 2692 wrote to memory of 440 2692 Sysqemzusvc.exe 87 PID 2692 wrote to memory of 440 2692 Sysqemzusvc.exe 87 PID 2692 wrote to memory of 440 2692 Sysqemzusvc.exe 87 PID 440 wrote to memory of 3304 440 Sysqemrudtb.exe 90 PID 440 wrote to memory of 3304 440 Sysqemrudtb.exe 90 PID 440 wrote to memory of 3304 440 Sysqemrudtb.exe 90 PID 3304 wrote to memory of 1172 3304 Sysqemozwav.exe 91 PID 3304 wrote to memory of 1172 3304 Sysqemozwav.exe 91 PID 3304 wrote to memory of 1172 3304 Sysqemozwav.exe 91 PID 1172 wrote to memory of 2772 1172 Sysqemttidx.exe 94 PID 1172 wrote to memory of 2772 1172 Sysqemttidx.exe 94 PID 1172 wrote to memory of 2772 1172 Sysqemttidx.exe 94 PID 2772 wrote to memory of 3208 2772 Sysqembbews.exe 95 PID 2772 wrote to memory of 3208 2772 Sysqembbews.exe 95 PID 2772 wrote to memory of 3208 2772 Sysqembbews.exe 95 PID 3208 wrote to memory of 224 3208 Sysqemgvxyc.exe 96 PID 3208 wrote to memory of 224 3208 Sysqemgvxyc.exe 96 PID 3208 wrote to memory of 224 3208 Sysqemgvxyc.exe 96 PID 224 wrote to memory of 2004 224 Sysqemowwzj.exe 98 PID 224 wrote to memory of 2004 224 Sysqemowwzj.exe 98 PID 224 wrote to memory of 2004 224 Sysqemowwzj.exe 98 PID 2004 wrote to memory of 3068 2004 Sysqemtxfuz.exe 100 PID 2004 wrote to memory of 3068 2004 Sysqemtxfuz.exe 100 PID 2004 wrote to memory of 3068 2004 Sysqemtxfuz.exe 100 PID 3068 wrote to memory of 4976 3068 Sysqemwdtwp.exe 101 PID 3068 wrote to memory of 4976 3068 Sysqemwdtwp.exe 101 PID 3068 wrote to memory of 4976 3068 Sysqemwdtwp.exe 101 PID 4976 wrote to memory of 4316 4976 Sysqembnbzf.exe 102 PID 4976 wrote to memory of 4316 4976 Sysqembnbzf.exe 102 PID 4976 wrote to memory of 4316 4976 Sysqembnbzf.exe 102 PID 4316 wrote to memory of 5024 4316 Sysqemzvlzt.exe 103 PID 4316 wrote to memory of 5024 4316 Sysqemzvlzt.exe 103 PID 4316 wrote to memory of 5024 4316 Sysqemzvlzt.exe 103 PID 5024 wrote to memory of 2684 5024 Sysqemwhhur.exe 104 PID 5024 wrote to memory of 2684 5024 Sysqemwhhur.exe 104 PID 5024 wrote to memory of 2684 5024 Sysqemwhhur.exe 104 PID 2684 wrote to memory of 2520 2684 Sysqemzovxy.exe 106 PID 2684 wrote to memory of 2520 2684 Sysqemzovxy.exe 106 PID 2684 wrote to memory of 2520 2684 Sysqemzovxy.exe 106 PID 2520 wrote to memory of 4744 2520 Sysqembynnq.exe 107 PID 2520 wrote to memory of 4744 2520 Sysqembynnq.exe 107 PID 2520 wrote to memory of 4744 2520 Sysqembynnq.exe 107 PID 4744 wrote to memory of 4396 4744 Sysqembgoak.exe 109 PID 4744 wrote to memory of 4396 4744 Sysqembgoak.exe 109 PID 4744 wrote to memory of 4396 4744 Sysqembgoak.exe 109 PID 4396 wrote to memory of 1296 4396 Sysqemghwvs.exe 110 PID 4396 wrote to memory of 1296 4396 Sysqemghwvs.exe 110 PID 4396 wrote to memory of 1296 4396 Sysqemghwvs.exe 110 PID 1296 wrote to memory of 3824 1296 Sysqemjrwll.exe 112 PID 1296 wrote to memory of 3824 1296 Sysqemjrwll.exe 112 PID 1296 wrote to memory of 3824 1296 Sysqemjrwll.exe 112 PID 3824 wrote to memory of 4104 3824 Sysqemqvyyc.exe 113 PID 3824 wrote to memory of 4104 3824 Sysqemqvyyc.exe 113 PID 3824 wrote to memory of 4104 3824 Sysqemqvyyc.exe 113 PID 4104 wrote to memory of 3980 4104 Sysqemysulg.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cf4d5870dca7ff111f25367288fa7bd0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Sysqembavcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembavcb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzjgdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjgdo.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzusvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzusvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrudtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrudtb.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemozwav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozwav.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemttidx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemttidx.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Sysqembbews.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbews.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgvxyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgvxyc.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemowwzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowwzj.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtxfuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtxfuz.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqembnbzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnbzf.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvlzt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvlzt.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhhur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhhur.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzovxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzovxy.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Sysqembynnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembynnq.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgoak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgoak.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghwvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghwvs.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjrwll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjrwll.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvyyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvyyc.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemysulg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemysulg.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfdbm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfdbm.exe"23⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbetb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbetb.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\Sysqembcmok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembcmok.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrnri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrnri.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbomm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbomm.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgeqkf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgeqkf.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqsrnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqsrnp.exe"29⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyieah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyieah.exe"30⤵
- Executes dropped EXE
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhtdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhtdq.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwpqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwpqu.exe"32⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteuty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteuty.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\Sysqembpcmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembpcmh.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwcsct.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwcsct.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhvhl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhvhl.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitpcp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitpcp.exe"37⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdaocw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdaocw.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkdip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkdip.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltpaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltpaq.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvsdlu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvsdlu.exe"41⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfctbt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfctbt.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvwrbo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwrbo.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdacur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdacur.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzgcl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzgcl.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacumn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacumn.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhciy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhciy.exe"47⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacfqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacfqm.exe"48⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemavpns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavpns.exe"49⤵
- Executes dropped EXE
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgikbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgikbx.exe"50⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxhgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxhgd.exe"51⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvhuh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvhuh.exe"52⤵
- Executes dropped EXE
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwamx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwamx.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdyfpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdyfpg.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyphsd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyphsd.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiaxic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiaxic.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsqlg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsqlg.exe"57⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfndtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfndtg.exe"58⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnusym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnusym.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemapkbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapkbd.exe"60⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrswu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrswu.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Sysqempuphv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempuphv.exe"62⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\Sysqemleukf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemleukf.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqrpxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrpxk.exe"64⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtwsh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtwsh.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdityg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdityg.exe"66⤵
- Modifies registry class
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkasyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkasyn.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsusiv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsusiv.exe"68⤵
- Checks computer location settings
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvahyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvahyw.exe"69⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcthrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcthrf.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnauub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnauub.exe"71⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdusuw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdusuw.exe"72⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnerkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnerkd.exe"73⤵
- Checks computer location settings
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxtij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxtij.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnmral.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmral.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqdto.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqdto.exe"76⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Sysqemplhbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplhbv.exe"77⤵
- Checks computer location settings
- Modifies registry class
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexnus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexnus.exe"78⤵
- Checks computer location settings
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkdlhj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkdlhj.exe"79⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\Sysqemptrhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptrhr.exe"80⤵
- Checks computer location settings
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecmis.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecmis.exe"81⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\Sysqemspedr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspedr.exe"82⤵
- Checks computer location settings
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxfkdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxfkdz.exe"83⤵
- Modifies registry class
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzxdgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxdgd.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfguhf.exe"85⤵
- Modifies registry class
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmruzf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmruzf.exe"86⤵
- Modifies registry class
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgjpg.exe"87⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcirkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcirkl.exe"88⤵
- Modifies registry class
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkioal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkioal.exe"89⤵
- Checks computer location settings
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgwoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgwoq.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjnjqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnjqu.exe"91⤵
- Checks computer location settings
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrujp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrujp.exe"92⤵
- Checks computer location settings
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkfuul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfuul.exe"93⤵
- Checks computer location settings
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemewoxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewoxi.exe"94⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemufipj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemufipj.exe"95⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhhqsg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhhqsg.exe"96⤵
- Modifies registry class
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhhrxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhhrxs.exe"97⤵
- Checks computer location settings
- Modifies registry class
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgcvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgcvr.exe"98⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzhetw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhetw.exe"99⤵
- Checks computer location settings
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwu.exe"100⤵
- Checks computer location settings
- Modifies registry class
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemexlyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexlyy.exe"101⤵
- Checks computer location settings
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemurizt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemurizt.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcduro.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcduro.exe"103⤵
- Checks computer location settings
- Modifies registry class
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\Sysqempimzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempimzw.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"105⤵
- Modifies registry class
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofhqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofhqe.exe"106⤵
- Checks computer location settings
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfsnv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfsnv.exe"107⤵
- Modifies registry class
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfulj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfulj.exe"108⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\Sysqemerrel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemerrel.exe"109⤵
- Modifies registry class
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybuzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybuzc.exe"110⤵
- Checks computer location settings
- Modifies registry class
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemruixv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemruixv.exe"111⤵
- Modifies registry class
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwhuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwhuu.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhrtpf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhrtpf.exe"113⤵
- Modifies registry class
PID:920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrmtim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmtim.exe"114⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\Sysqembiusc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembiusc.exe"115⤵
- Checks computer location settings
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyrny.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyrny.exe"116⤵
- Modifies registry class
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtixqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtixqb.exe"117⤵
- Modifies registry class
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemedyij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedyij.exe"118⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemozztq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozztq.exe"119⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxwbe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxwbe.exe"120⤵
- Checks computer location settings
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemberby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemberby.exe"121⤵
- Modifies registry class
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjcfoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcfoc.exe"122⤵PID:3968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-