Analysis
-
max time kernel
51s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 20:59
Behavioral task
behavioral1
Sample
382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe
-
Size
87KB
-
MD5
382ca403ffec9918920316ae2e406a70
-
SHA1
d870bf1604586c14958fa7a9b4d4c35c5c00203f
-
SHA256
5c0105abe6db823834816bf095c4329dd5faca28f2dc0a380d80646e1a8e4fb4
-
SHA512
ab75be328454cc8cfab135dd2bbf7648ab182552fbf531b4bee6b7406fbb804c8d4499584991cdf1887af741533e54f9fc797cf15419132476c549813514f6cb
-
SSDEEP
1536:TYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nxx:0dEUfKj8BYbDiC1ZTK7sxtLUIG+
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2628 Sysqemxnlvg.exe 2716 Sysqemngiqq.exe 2744 Sysqemhimno.exe 2508 Sysqemzaoxb.exe 2820 Sysqemrwndm.exe 2332 Sysqemmvgnh.exe 2420 Sysqemenifu.exe 1744 Sysqemwbgkx.exe 664 Sysqemrazva.exe 1492 Sysqemjwyad.exe 764 Sysqembhdsl.exe 1388 Sysqemtvcyv.exe 1668 Sysqemiskfi.exe 2904 Sysqemdugdg.exe 892 Sysqemwfuvn.exe 1620 Sysqemotsaq.exe 2860 Sysqemgegty.exe 2616 Sysqemxeill.exe 2012 Sysqemqdkqi.exe 1440 Sysqemfmvdy.exe 2272 Sysqemxxjvf.exe 2284 Sysqemphwnn.exe 2288 Sysqemeeeva.exe 2588 Sysqemzgity.exe 2316 Sysqemkrolf.exe 2988 Sysqemccbdf.exe 2368 Sysqemrvyqp.exe 2692 Sysqemjkwvz.exe 2716 Sysqembukwh.exe 2228 Sysqemrohir.exe 1756 Sysqemachgh.exe 1568 Sysqemwbaqc.exe 3024 Sysqemivggn.exe 2136 Sysqemauiqb.exe 2392 Sysqemvxmoh.exe 1632 Sysqemnldtj.exe 1316 Sysqemfzcyu.exe 836 Sysqemajgws.exe 2056 Sysqemsywbd.exe 888 Sysqemkmvgn.exe 1676 Sysqemcxjyn.exe 2864 Sysqemulzdy.exe 2828 Sysqempvdbe.exe 856 Sysqemhkugg.exe 1144 Sysqemcmyem.exe 840 Sysqemteiws.exe 1484 Sysqemooety.exe 2532 Sysqemjqirw.exe 2288 Sysqembikjj.exe 2956 Sysqemwkoyh.exe 3028 Sysqemokqrv.exe 1988 Sysqemjmuot.exe 2396 Sysqembattd.exe 2892 Sysqemvobem.exe 2604 Sysqemqqfbk.exe 2920 Sysqemlwmml.exe 1156 Sysqemdwwwy.exe 964 Sysqemyyste.exe 704 Sysqemtawrc.exe 2476 Sysqemkagjq.exe 1960 Sysqemfccho.exe 2456 Sysqemxumzb.exe 1520 Sysqemswiwz.exe 2368 Sysqemngmmf.exe -
Loads dropped DLL 64 IoCs
pid Process 2356 382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe 2356 382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe 2628 Sysqemxnlvg.exe 2628 Sysqemxnlvg.exe 2716 Sysqemngiqq.exe 2716 Sysqemngiqq.exe 2744 Sysqemhimno.exe 2744 Sysqemhimno.exe 2508 Sysqemzaoxb.exe 2508 Sysqemzaoxb.exe 2820 Sysqemrwndm.exe 2820 Sysqemrwndm.exe 2332 Sysqemmvgnh.exe 2332 Sysqemmvgnh.exe 2420 Sysqemenifu.exe 2420 Sysqemenifu.exe 1744 Sysqemwbgkx.exe 1744 Sysqemwbgkx.exe 664 Sysqemrazva.exe 664 Sysqemrazva.exe 1492 Sysqemjwyad.exe 1492 Sysqemjwyad.exe 764 Sysqembhdsl.exe 764 Sysqembhdsl.exe 1388 Sysqemtvcyv.exe 1388 Sysqemtvcyv.exe 1668 Sysqemiskfi.exe 1668 Sysqemiskfi.exe 2904 Sysqemdugdg.exe 2904 Sysqemdugdg.exe 892 Sysqemwfuvn.exe 892 Sysqemwfuvn.exe 1620 Sysqemotsaq.exe 1620 Sysqemotsaq.exe 2860 Sysqemgegty.exe 2860 Sysqemgegty.exe 2616 Sysqemxeill.exe 2616 Sysqemxeill.exe 2012 Sysqemqdkqi.exe 2012 Sysqemqdkqi.exe 1440 Sysqemfmvdy.exe 1440 Sysqemfmvdy.exe 2272 Sysqemxxjvf.exe 2272 Sysqemxxjvf.exe 2284 Sysqemphwnn.exe 2284 Sysqemphwnn.exe 2288 Sysqemeeeva.exe 2288 Sysqemeeeva.exe 2588 Sysqemzgity.exe 2588 Sysqemzgity.exe 2316 Sysqemkrolf.exe 2316 Sysqemkrolf.exe 2988 Sysqemccbdf.exe 2988 Sysqemccbdf.exe 2368 Sysqemrvyqp.exe 2368 Sysqemrvyqp.exe 2692 Sysqemjkwvz.exe 2692 Sysqemjkwvz.exe 2716 Sysqembukwh.exe 2716 Sysqembukwh.exe 2228 Sysqemrohir.exe 2228 Sysqemrohir.exe 1756 Sysqemachgh.exe 1756 Sysqemachgh.exe -
resource yara_rule behavioral1/memory/2356-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0007000000014367-13.dat upx behavioral1/memory/2628-21-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x00070000000143fb-29.dat upx behavioral1/memory/2716-35-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0007000000014457-47.dat upx behavioral1/memory/2744-44-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2508-64-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x00070000000144e9-60.dat upx behavioral1/memory/2820-76-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x00090000000144f1-75.dat upx behavioral1/files/0x000800000001507a-92.dat upx behavioral1/memory/2420-110-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0006000000015083-107.dat upx behavioral1/files/0x00060000000150d9-112.dat upx behavioral1/memory/2356-124-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1744-126-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x00060000000153ee-134.dat upx behavioral1/memory/664-141-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1492-156-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0036000000014251-153.dat upx behavioral1/memory/2744-165-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/764-173-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x000600000001565a-168.dat upx behavioral1/files/0x0006000000015662-184.dat upx behavioral1/memory/1388-187-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x00060000000158d9-195.dat upx behavioral1/memory/1668-203-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2904-216-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/892-229-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2420-223-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1620-239-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2860-249-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2616-260-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2012-269-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2272-289-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2904-319-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2288-318-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2368-371-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2692-383-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2284-403-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2228-413-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2716-397-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2272-395-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1440-380-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2012-379-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2988-358-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2588-334-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2332-209-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2820-199-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/704-1016-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2476-1025-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1960-1034-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2456-1043-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/1520-1052-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2716-150-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2332-88-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/files/0x0036000000014183-19.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2628 2356 382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe 28 PID 2356 wrote to memory of 2628 2356 382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe 28 PID 2356 wrote to memory of 2628 2356 382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe 28 PID 2356 wrote to memory of 2628 2356 382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe 28 PID 2628 wrote to memory of 2716 2628 Sysqemxnlvg.exe 29 PID 2628 wrote to memory of 2716 2628 Sysqemxnlvg.exe 29 PID 2628 wrote to memory of 2716 2628 Sysqemxnlvg.exe 29 PID 2628 wrote to memory of 2716 2628 Sysqemxnlvg.exe 29 PID 2716 wrote to memory of 2744 2716 Sysqemngiqq.exe 30 PID 2716 wrote to memory of 2744 2716 Sysqemngiqq.exe 30 PID 2716 wrote to memory of 2744 2716 Sysqemngiqq.exe 30 PID 2716 wrote to memory of 2744 2716 Sysqemngiqq.exe 30 PID 2744 wrote to memory of 2508 2744 Sysqemhimno.exe 31 PID 2744 wrote to memory of 2508 2744 Sysqemhimno.exe 31 PID 2744 wrote to memory of 2508 2744 Sysqemhimno.exe 31 PID 2744 wrote to memory of 2508 2744 Sysqemhimno.exe 31 PID 2508 wrote to memory of 2820 2508 Sysqemzaoxb.exe 32 PID 2508 wrote to memory of 2820 2508 Sysqemzaoxb.exe 32 PID 2508 wrote to memory of 2820 2508 Sysqemzaoxb.exe 32 PID 2508 wrote to memory of 2820 2508 Sysqemzaoxb.exe 32 PID 2820 wrote to memory of 2332 2820 Sysqemrwndm.exe 33 PID 2820 wrote to memory of 2332 2820 Sysqemrwndm.exe 33 PID 2820 wrote to memory of 2332 2820 Sysqemrwndm.exe 33 PID 2820 wrote to memory of 2332 2820 Sysqemrwndm.exe 33 PID 2332 wrote to memory of 2420 2332 Sysqemmvgnh.exe 34 PID 2332 wrote to memory of 2420 2332 Sysqemmvgnh.exe 34 PID 2332 wrote to memory of 2420 2332 Sysqemmvgnh.exe 34 PID 2332 wrote to memory of 2420 2332 Sysqemmvgnh.exe 34 PID 2420 wrote to memory of 1744 2420 Sysqemenifu.exe 35 PID 2420 wrote to memory of 1744 2420 Sysqemenifu.exe 35 PID 2420 wrote to memory of 1744 2420 Sysqemenifu.exe 35 PID 2420 wrote to memory of 1744 2420 Sysqemenifu.exe 35 PID 1744 wrote to memory of 664 1744 Sysqemwbgkx.exe 36 PID 1744 wrote to memory of 664 1744 Sysqemwbgkx.exe 36 PID 1744 wrote to memory of 664 1744 Sysqemwbgkx.exe 36 PID 1744 wrote to memory of 664 1744 Sysqemwbgkx.exe 36 PID 664 wrote to memory of 1492 664 Sysqemrazva.exe 37 PID 664 wrote to memory of 1492 664 Sysqemrazva.exe 37 PID 664 wrote to memory of 1492 664 Sysqemrazva.exe 37 PID 664 wrote to memory of 1492 664 Sysqemrazva.exe 37 PID 1492 wrote to memory of 764 1492 Sysqemjwyad.exe 38 PID 1492 wrote to memory of 764 1492 Sysqemjwyad.exe 38 PID 1492 wrote to memory of 764 1492 Sysqemjwyad.exe 38 PID 1492 wrote to memory of 764 1492 Sysqemjwyad.exe 38 PID 764 wrote to memory of 1388 764 Sysqembhdsl.exe 162 PID 764 wrote to memory of 1388 764 Sysqembhdsl.exe 162 PID 764 wrote to memory of 1388 764 Sysqembhdsl.exe 162 PID 764 wrote to memory of 1388 764 Sysqembhdsl.exe 162 PID 1388 wrote to memory of 1668 1388 Sysqemtvcyv.exe 40 PID 1388 wrote to memory of 1668 1388 Sysqemtvcyv.exe 40 PID 1388 wrote to memory of 1668 1388 Sysqemtvcyv.exe 40 PID 1388 wrote to memory of 1668 1388 Sysqemtvcyv.exe 40 PID 1668 wrote to memory of 2904 1668 Sysqemiskfi.exe 145 PID 1668 wrote to memory of 2904 1668 Sysqemiskfi.exe 145 PID 1668 wrote to memory of 2904 1668 Sysqemiskfi.exe 145 PID 1668 wrote to memory of 2904 1668 Sysqemiskfi.exe 145 PID 2904 wrote to memory of 892 2904 Sysqemdugdg.exe 42 PID 2904 wrote to memory of 892 2904 Sysqemdugdg.exe 42 PID 2904 wrote to memory of 892 2904 Sysqemdugdg.exe 42 PID 2904 wrote to memory of 892 2904 Sysqemdugdg.exe 42 PID 892 wrote to memory of 1620 892 Sysqemwfuvn.exe 43 PID 892 wrote to memory of 1620 892 Sysqemwfuvn.exe 43 PID 892 wrote to memory of 1620 892 Sysqemwfuvn.exe 43 PID 892 wrote to memory of 1620 892 Sysqemwfuvn.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\382ca403ffec9918920316ae2e406a70_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnlvg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnlvg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngiqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngiqq.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhimno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhimno.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzaoxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzaoxb.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwndm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwndm.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmvgnh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvgnh.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemenifu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemenifu.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbgkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbgkx.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrazva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrazva.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjwyad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwyad.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhdsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhdsl.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvcyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvcyv.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiskfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiskfi.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdugdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdugdg.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwfuvn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwfuvn.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotsaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotsaq.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgegty.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgegty.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxeill.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxeill.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdkqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdkqi.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmvdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmvdy.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxxjvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxxjvf.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphwnn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphwnn.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeeeva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeeeva.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzgity.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzgity.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrolf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrolf.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemccbdf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccbdf.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvyqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvyqp.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjkwvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjkwvz.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Sysqembukwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembukwh.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrohir.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrohir.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemachgh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemachgh.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbaqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbaqc.exe"33⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemivggn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivggn.exe"34⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemauiqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemauiqb.exe"35⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxmoh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxmoh.exe"36⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnldtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnldtj.exe"37⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzcyu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzcyu.exe"38⤵
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajgws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajgws.exe"39⤵
- Executes dropped EXE
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsywbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsywbd.exe"40⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkmvgn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkmvgn.exe"41⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcxjyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxjyn.exe"42⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemulzdy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemulzdy.exe"43⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Sysqempvdbe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempvdbe.exe"44⤵
- Executes dropped EXE
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkugg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkugg.exe"45⤵
- Executes dropped EXE
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcmyem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmyem.exe"46⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteiws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteiws.exe"47⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemooety.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemooety.exe"48⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqirw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqirw.exe"49⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqembikjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembikjj.exe"50⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkoyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkoyh.exe"51⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokqrv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokqrv.exe"52⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmuot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmuot.exe"53⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Sysqembattd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembattd.exe"54⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvobem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvobem.exe"55⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqqfbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqqfbk.exe"56⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwmml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwmml.exe"57⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdwwwy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdwwwy.exe"58⤵
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyyste.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyyste.exe"59⤵
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtawrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtawrc.exe"60⤵
- Executes dropped EXE
PID:704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkagjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkagjq.exe"61⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfccho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfccho.exe"62⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxumzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxumzb.exe"63⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswiwz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswiwz.exe"64⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngmmf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngmmf.exe"65⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfyoek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyoek.exe"66⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzmeot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzmeot.exe"67⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrauue.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrauue.exe"68⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmgkef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgkef.exe"69⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhiobd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhiobd.exe"70⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcwvel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwvel.exe"71⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxyzbj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyzbj.exe"72⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrehms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrehms.exe"73⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjdrey.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdrey.exe"74⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemejyhg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejyhg.exe"75⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzlcee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlcee.exe"76⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuzkpn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzkpn.exe"77⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlruht.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlruht.exe"78⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgpmrw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpmrw.exe"79⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\Sysqemypojj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemypojj.exe"80⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtvemk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvemk.exe"81⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoxaji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxaji.exe"82⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgxkcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxkcw.exe"83⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemadrme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemadrme.exe"84⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvfvkc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfvkc.exe"85⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqpzha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpzha.exe"86⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\Sysqemihbro.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihbro.exe"87⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdjgpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjgpu.exe"88⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvjhhz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjhhz.exe"89⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemplmef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplmef.exe"90⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhzcki.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzcki.exe"91⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcnsur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnsur.exe"92⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemubizb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemubizb.exe"93⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Sysqempabkw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempabkw.exe"94⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhslck.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhslck.exe"95⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcgtel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcgtel.exe"96⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuurkv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuurkv.exe"97⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemptkcq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemptkcq.exe"98⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkyrfz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkyrfz.exe"99⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\Sysqembytxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembytxf.exe"100⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwaxul.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaxul.exe"101⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoshmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoshmq.exe"102⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjcekw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjcekw.exe"103⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeitmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeitmx.exe"104⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzkxkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkxkd.exe"105⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkzci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkzci.exe"106⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlmdao.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmdao.exe"107⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdefsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdefsc.exe"108⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\Sysqemysmuc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemysmuc.exe"109⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtursa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtursa.exe"110⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemowvpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowvpg.exe"111⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiccah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiccah.exe"112⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Sysqemacmsv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacmsv.exe"113⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvhtcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhtcv.exe"114⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqrxab.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqrxab.exe"115⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhjzkp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjzkp.exe"116⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcppuq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcppuq.exe"117⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxzlso.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxzlso.exe"118⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsbppu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbppu.exe"119⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnheau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnheau.exe"120⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\Sysqemehgki.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehgki.exe"121⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzjkig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjkig.exe"122⤵PID:1628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-