Analysis
-
max time kernel
75s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe
-
Size
602KB
-
MD5
1213d3826baed14609b60ff4e4a770f0
-
SHA1
ed852fcc6f9333e8ac41814a1990db4a71296663
-
SHA256
1a822f257e6c9484ebca959c4897db70697b2f88d860e63cbd63813b9dcb188e
-
SHA512
c352a2290b7a39bb9914e3afad62677ea309cdbee6eeb1611bf87c6ae41ca5440534facb243e95d72730e1f7bbd39f804bfa510406aaad8ce62e968d8d4c313e
-
SSDEEP
6144:FqDAwl0xPTMiR9JSSxPUKYGdodH/baqE7Al8jks:F+67XR9JSSxvYGdodH/1C1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Sysqemgpvcm.exeSysqemehuyd.exeSysqemteiun.exeSysqemqkknz.exeSysqemjgcpz.exeSysqemtorxn.exeSysqemugjsf.exe1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exeSysqemqzmiq.exeSysqembmmot.exeSysqemmfdbm.exeSysqemlzsbg.exeSysqemsjrby.exeSysqemaexwd.exeSysqemkcadt.exeSysqemeehte.exeSysqemrzjpg.exeSysqemtbium.exeSysqemxulmh.exeSysqemebnms.exeSysqemfjsod.exeSysqemfevvo.exeSysqemqgknv.exeSysqemdxyuu.exeSysqemyymje.exeSysqemmmzzp.exeSysqemmjlob.exeSysqemlnleq.exeSysqemorzgt.exeSysqemuqlrs.exeSysqemryole.exeSysqemoruit.exeSysqemyjsbw.exeSysqempkyfi.exeSysqemksozo.exeSysqemolxkd.exeSysqemrwiob.exeSysqemkajsb.exeSysqemxjpsj.exeSysqemjygpe.exeSysqemyomzr.exeSysqemnokum.exeSysqemajfqo.exeSysqemrlclf.exeSysqemsokzi.exeSysqemwlziu.exeSysqemqhfus.exeSysqemawnvt.exeSysqemdfdpf.exeSysqemumfpb.exeSysqemcyxlp.exeSysqemmgsef.exeSysqemcmnaf.exeSysqemrdtgn.exeSysqemzdwgp.exeSysqemqntel.exeSysqemtkrwu.exeSysqemgceci.exeSysqemdkuvp.exeSysqemfthpg.exeSysqemgfulj.exeSysqemrftze.exeSysqemwhghx.exeSysqemgjlds.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemgpvcm.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemehuyd.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemteiun.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqkknz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemjgcpz.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtorxn.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemugjsf.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqzmiq.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqembmmot.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemmfdbm.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemlzsbg.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemsjrby.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemaexwd.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemkcadt.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemeehte.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemrzjpg.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtbium.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemxulmh.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemebnms.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemfjsod.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemfevvo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqgknv.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemdxyuu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemyymje.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemmmzzp.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemmjlob.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemlnleq.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemorzgt.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemuqlrs.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemryole.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemoruit.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemyjsbw.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqempkyfi.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemksozo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemolxkd.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemrwiob.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemkajsb.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemxjpsj.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemjygpe.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemyomzr.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemnokum.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemajfqo.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemrlclf.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemsokzi.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemwlziu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqhfus.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemawnvt.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemdfdpf.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemumfpb.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemcyxlp.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemmgsef.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemcmnaf.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemrdtgn.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemzdwgp.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemqntel.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemtkrwu.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemgceci.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemdkuvp.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemfthpg.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemgfulj.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemrftze.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemwhghx.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation Sysqemgjlds.exe -
Executes dropped EXE 64 IoCs
Processes:
Sysqemzftka.exeSysqemulkam.exeSysqemrmcnq.exeSysqemrisoz.exeSysqemjbbyt.exeSysqemryole.exeSysqemzcyyo.exeSysqemeehte.exeSysqemyymje.exeSysqemhkwjf.exeSysqemjqcuv.exeSysqemumdec.exeSysqemwhghx.exeSysqemjgcpz.exeSysqemrzjpg.exeSysqemtfpav.exeSysqemwxqdz.exeSysqemzdwgp.exeSysqemhwvgd.exeSysqemmfdbm.exeSysqemwbetb.exeSysqemdjaln.exeSysqemlnleq.exeSysqemoipux.exeSysqemebnms.exeSysqemqhfus.exeSysqemecyxs.exeSysqemdkuvp.exeSysqemorzgt.exeSysqemwjyga.exeSysqemgjlds.exeSysqemieolz.exeSysqemlzsbg.exeSysqemtaahg.exeSysqemgftpg.exeSysqemokeij.exeSysqemqcxlm.exeSysqemqgknv.exeSysqembqkrn.exeSysqemqntel.exeSysqemtbium.exeSysqemvbnxi.exeSysqemdxyuu.exeSysqemavgig.exeSysqemqonon.exeSysqemtkrwu.exeSysqemaocox.exeSysqemyxwpe.exeSysqemtorxn.exeSysqemawnvt.exeSysqemdvcyc.exeSysqemfjsod.exeSysqemaexwd.exeSysqemiltbb.exeSysqemdajrk.exeSysqemnokum.exeSysqemiffcv.exeSysqemkajsb.exeSysqemajfqo.exeSysqemsjrby.exeSysqemuevjf.exeSysqemdfdpf.exeSysqemisxkk.exeSysqemfthpg.exepid process 4080 Sysqemzftka.exe 3324 Sysqemulkam.exe 4748 Sysqemrmcnq.exe 1320 Sysqemrisoz.exe 772 Sysqemjbbyt.exe 1464 Sysqemryole.exe 4736 Sysqemzcyyo.exe 5040 Sysqemeehte.exe 4464 Sysqemyymje.exe 2660 Sysqemhkwjf.exe 3900 Sysqemjqcuv.exe 4896 Sysqemumdec.exe 1372 Sysqemwhghx.exe 2584 Sysqemjgcpz.exe 4504 Sysqemrzjpg.exe 1016 Sysqemtfpav.exe 2940 Sysqemwxqdz.exe 4124 Sysqemzdwgp.exe 3280 Sysqemhwvgd.exe 776 Sysqemmfdbm.exe 1008 Sysqemwbetb.exe 1420 Sysqemdjaln.exe 1976 Sysqemlnleq.exe 3772 Sysqemoipux.exe 1068 Sysqemebnms.exe 4636 Sysqemqhfus.exe 5104 Sysqemecyxs.exe 1188 Sysqemdkuvp.exe 4804 Sysqemorzgt.exe 4716 Sysqemwjyga.exe 1304 Sysqemgjlds.exe 2592 Sysqemieolz.exe 1480 Sysqemlzsbg.exe 3620 Sysqemtaahg.exe 1252 Sysqemgftpg.exe 2932 Sysqemokeij.exe 3124 Sysqemqcxlm.exe 2304 Sysqemqgknv.exe 2116 Sysqembqkrn.exe 4516 Sysqemqntel.exe 3172 Sysqemtbium.exe 3712 Sysqemvbnxi.exe 4012 Sysqemdxyuu.exe 2628 Sysqemavgig.exe 4616 Sysqemqonon.exe 5108 Sysqemtkrwu.exe 1984 Sysqemaocox.exe 1512 Sysqemyxwpe.exe 1192 Sysqemtorxn.exe 4948 Sysqemawnvt.exe 2256 Sysqemdvcyc.exe 4504 Sysqemfjsod.exe 2484 Sysqemaexwd.exe 4260 Sysqemiltbb.exe 4792 Sysqemdajrk.exe 4560 Sysqemnokum.exe 4452 Sysqemiffcv.exe 4240 Sysqemkajsb.exe 5088 Sysqemajfqo.exe 3772 Sysqemsjrby.exe 3840 Sysqemuevjf.exe 4720 Sysqemdfdpf.exe 760 Sysqemisxkk.exe 2436 Sysqemfthpg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
Sysqemqntel.exeSysqemdxyuu.exeSysqemcyxlp.exeSysqemhwvgd.exeSysqemmfdbm.exeSysqemdvcyc.exeSysqemkcadt.exeSysqemrdrfj.exeSysqemjygpe.exeSysqemkajsb.exeSysqemtbium.exeSysqemxulmh.exeSysqemeshus.exeSysqemmmzzp.exeSysqemgfulj.exeSysqemeplbx.exeSysqemjgcpz.exeSysqemecyxs.exeSysqemavgig.exeSysqemdajrk.exeSysqemmmwff.exeSysqemrftze.exeSysqemoipux.exeSysqemieolz.exeSysqemisxkk.exeSysqemfevvo.exeSysqemwjyga.exeSysqemgjlds.exeSysqemqgknv.exeSysqemvbnxi.exeSysqemiltbb.exeSysqemcmnaf.exeSysqemebnms.exeSysqemdkuvp.exeSysqemtaahg.exeSysqemmgsef.exeSysqemmjlob.exeSysqemypxdh.exeSysqemoruit.exeSysqemwlziu.exeSysqemyomzr.exeSysqemzftka.exeSysqemkjybm.exeSysqembmmot.exeSysqemaexwd.exeSysqemrwiob.exeSysqemuqlrs.exeSysqemtyada.exeSysqemryole.exeSysqemwxqdz.exeSysqemawnvt.exeSysqemrdtgn.exeSysqemjqcuv.exeSysqemajfqo.exeSysqempkyfi.exeSysqemsokzi.exeSysqemuialw.exeSysqemqkknz.exeSysqemeehte.exeSysqemiffcv.exeSysqemjbbyt.exeSysqemzdwgp.exeSysqemyxwpe.exe1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqntel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxyuu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcyxlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhwvgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmfdbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdvcyc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkcadt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrdrfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjygpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkajsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtbium.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxulmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeshus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmzzp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgfulj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeplbx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgcpz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemecyxs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemavgig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdajrk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmwff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrftze.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoipux.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemieolz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemisxkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfevvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjyga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjlds.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqgknv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvbnxi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiltbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcmnaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemebnms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdkuvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtaahg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmgsef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjlob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemypxdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoruit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlziu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyomzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzftka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkjybm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembmmot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaexwd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrwiob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuqlrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtyada.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemryole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwxqdz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemawnvt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrdtgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjqcuv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemajfqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempkyfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsokzi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuialw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqkknz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeehte.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiffcv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjbbyt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdwgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyxwpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exeSysqemzftka.exeSysqemulkam.exeSysqemrmcnq.exeSysqemrisoz.exeSysqemjbbyt.exeSysqemryole.exeSysqemzcyyo.exeSysqemeehte.exeSysqemyymje.exeSysqemhkwjf.exeSysqemjqcuv.exeSysqemumdec.exeSysqemwhghx.exeSysqemjgcpz.exeSysqemrzjpg.exeSysqemtfpav.exeSysqemwxqdz.exeSysqemzdwgp.exeSysqemhwvgd.exeSysqemmfdbm.exeSysqemwbetb.exedescription pid process target process PID 1480 wrote to memory of 4080 1480 1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe Sysqemzftka.exe PID 1480 wrote to memory of 4080 1480 1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe Sysqemzftka.exe PID 1480 wrote to memory of 4080 1480 1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe Sysqemzftka.exe PID 4080 wrote to memory of 3324 4080 Sysqemzftka.exe Sysqemulkam.exe PID 4080 wrote to memory of 3324 4080 Sysqemzftka.exe Sysqemulkam.exe PID 4080 wrote to memory of 3324 4080 Sysqemzftka.exe Sysqemulkam.exe PID 3324 wrote to memory of 4748 3324 Sysqemulkam.exe Sysqemrmcnq.exe PID 3324 wrote to memory of 4748 3324 Sysqemulkam.exe Sysqemrmcnq.exe PID 3324 wrote to memory of 4748 3324 Sysqemulkam.exe Sysqemrmcnq.exe PID 4748 wrote to memory of 1320 4748 Sysqemrmcnq.exe Sysqemrisoz.exe PID 4748 wrote to memory of 1320 4748 Sysqemrmcnq.exe Sysqemrisoz.exe PID 4748 wrote to memory of 1320 4748 Sysqemrmcnq.exe Sysqemrisoz.exe PID 1320 wrote to memory of 772 1320 Sysqemrisoz.exe Sysqemjbbyt.exe PID 1320 wrote to memory of 772 1320 Sysqemrisoz.exe Sysqemjbbyt.exe PID 1320 wrote to memory of 772 1320 Sysqemrisoz.exe Sysqemjbbyt.exe PID 772 wrote to memory of 1464 772 Sysqemjbbyt.exe Sysqemryole.exe PID 772 wrote to memory of 1464 772 Sysqemjbbyt.exe Sysqemryole.exe PID 772 wrote to memory of 1464 772 Sysqemjbbyt.exe Sysqemryole.exe PID 1464 wrote to memory of 4736 1464 Sysqemryole.exe Sysqemzcyyo.exe PID 1464 wrote to memory of 4736 1464 Sysqemryole.exe Sysqemzcyyo.exe PID 1464 wrote to memory of 4736 1464 Sysqemryole.exe Sysqemzcyyo.exe PID 4736 wrote to memory of 5040 4736 Sysqemzcyyo.exe Sysqemeehte.exe PID 4736 wrote to memory of 5040 4736 Sysqemzcyyo.exe Sysqemeehte.exe PID 4736 wrote to memory of 5040 4736 Sysqemzcyyo.exe Sysqemeehte.exe PID 5040 wrote to memory of 4464 5040 Sysqemeehte.exe Sysqemyymje.exe PID 5040 wrote to memory of 4464 5040 Sysqemeehte.exe Sysqemyymje.exe PID 5040 wrote to memory of 4464 5040 Sysqemeehte.exe Sysqemyymje.exe PID 4464 wrote to memory of 2660 4464 Sysqemyymje.exe Sysqemhkwjf.exe PID 4464 wrote to memory of 2660 4464 Sysqemyymje.exe Sysqemhkwjf.exe PID 4464 wrote to memory of 2660 4464 Sysqemyymje.exe Sysqemhkwjf.exe PID 2660 wrote to memory of 3900 2660 Sysqemhkwjf.exe Sysqemjqcuv.exe PID 2660 wrote to memory of 3900 2660 Sysqemhkwjf.exe Sysqemjqcuv.exe PID 2660 wrote to memory of 3900 2660 Sysqemhkwjf.exe Sysqemjqcuv.exe PID 3900 wrote to memory of 4896 3900 Sysqemjqcuv.exe Sysqemumdec.exe PID 3900 wrote to memory of 4896 3900 Sysqemjqcuv.exe Sysqemumdec.exe PID 3900 wrote to memory of 4896 3900 Sysqemjqcuv.exe Sysqemumdec.exe PID 4896 wrote to memory of 1372 4896 Sysqemumdec.exe Sysqemwhghx.exe PID 4896 wrote to memory of 1372 4896 Sysqemumdec.exe Sysqemwhghx.exe PID 4896 wrote to memory of 1372 4896 Sysqemumdec.exe Sysqemwhghx.exe PID 1372 wrote to memory of 2584 1372 Sysqemwhghx.exe Sysqemjgcpz.exe PID 1372 wrote to memory of 2584 1372 Sysqemwhghx.exe Sysqemjgcpz.exe PID 1372 wrote to memory of 2584 1372 Sysqemwhghx.exe Sysqemjgcpz.exe PID 2584 wrote to memory of 4504 2584 Sysqemjgcpz.exe Sysqemrzjpg.exe PID 2584 wrote to memory of 4504 2584 Sysqemjgcpz.exe Sysqemrzjpg.exe PID 2584 wrote to memory of 4504 2584 Sysqemjgcpz.exe Sysqemrzjpg.exe PID 4504 wrote to memory of 1016 4504 Sysqemrzjpg.exe Sysqemtfpav.exe PID 4504 wrote to memory of 1016 4504 Sysqemrzjpg.exe Sysqemtfpav.exe PID 4504 wrote to memory of 1016 4504 Sysqemrzjpg.exe Sysqemtfpav.exe PID 1016 wrote to memory of 2940 1016 Sysqemtfpav.exe Sysqemwxqdz.exe PID 1016 wrote to memory of 2940 1016 Sysqemtfpav.exe Sysqemwxqdz.exe PID 1016 wrote to memory of 2940 1016 Sysqemtfpav.exe Sysqemwxqdz.exe PID 2940 wrote to memory of 4124 2940 Sysqemwxqdz.exe Sysqemzdwgp.exe PID 2940 wrote to memory of 4124 2940 Sysqemwxqdz.exe Sysqemzdwgp.exe PID 2940 wrote to memory of 4124 2940 Sysqemwxqdz.exe Sysqemzdwgp.exe PID 4124 wrote to memory of 3280 4124 Sysqemzdwgp.exe Sysqemhwvgd.exe PID 4124 wrote to memory of 3280 4124 Sysqemzdwgp.exe Sysqemhwvgd.exe PID 4124 wrote to memory of 3280 4124 Sysqemzdwgp.exe Sysqemhwvgd.exe PID 3280 wrote to memory of 776 3280 Sysqemhwvgd.exe Sysqemmfdbm.exe PID 3280 wrote to memory of 776 3280 Sysqemhwvgd.exe Sysqemmfdbm.exe PID 3280 wrote to memory of 776 3280 Sysqemhwvgd.exe Sysqemmfdbm.exe PID 776 wrote to memory of 1008 776 Sysqemmfdbm.exe Sysqemwbetb.exe PID 776 wrote to memory of 1008 776 Sysqemmfdbm.exe Sysqemwbetb.exe PID 776 wrote to memory of 1008 776 Sysqemmfdbm.exe Sysqemwbetb.exe PID 1008 wrote to memory of 1420 1008 Sysqemwbetb.exe Sysqemdjaln.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1213d3826baed14609b60ff4e4a770f0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzftka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzftka.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemulkam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemulkam.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrmcnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmcnq.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrisoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrisoz.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemryole.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryole.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzcyyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcyyo.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeehte.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeehte.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyymje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyymje.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkwjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkwjf.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjqcuv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqcuv.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemumdec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumdec.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhghx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhghx.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgcpz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgcpz.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzjpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzjpg.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtfpav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfpav.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwxqdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwxqdz.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdwgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdwgp.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhwvgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwvgd.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfdbm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfdbm.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbetb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbetb.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdjaln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjaln.exe"23⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnleq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnleq.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoipux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoipux.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebnms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebnms.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqhfus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqhfus.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemecyxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemecyxs.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdkuvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkuvp.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorzgt.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjyga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjyga.exe"31⤵
- Executes dropped EXE
- Modifies registry class
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjlds.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjlds.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemieolz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemieolz.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzsbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzsbg.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtaahg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtaahg.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgftpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgftpg.exe"36⤵
- Executes dropped EXE
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokeij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokeij.exe"37⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcxlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcxlm.exe"38⤵
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqgknv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgknv.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqkrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqkrn.exe"40⤵
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqntel.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqntel.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtbium.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbium.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbnxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbnxi.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxyuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxyuu.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemavgig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavgig.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqonon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqonon.exe"46⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkrwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkrwu.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"48⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyxwpe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxwpe.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtorxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtorxn.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawnvt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawnvt.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvcyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvcyc.exe"52⤵
- Executes dropped EXE
- Modifies registry class
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfjsod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjsod.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaexwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaexwd.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiltbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiltbb.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdajrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdajrk.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnokum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnokum.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiffcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiffcv.exe"58⤵
- Executes dropped EXE
- Modifies registry class
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkajsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkajsb.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajfqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajfqo.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsjrby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsjrby.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuevjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuevjf.exe"62⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfdpf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfdpf.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemisxkk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemisxkk.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfthpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfthpg.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzmiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzmiq.exe"66⤵
- Checks computer location settings
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemumfpb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumfpb.exe"67⤵
- Checks computer location settings
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfevvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfevvo.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkcadt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkcadt.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkjybm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjybm.exe"70⤵
- Modifies registry class
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcyxlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcyxlp.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsokzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsokzi.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwiob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwiob.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugjsf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugjsf.exe"74⤵
- Checks computer location settings
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrdrfj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdrfj.exe"75⤵
- Modifies registry class
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjpsj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjpsj.exe"76⤵
- Checks computer location settings
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemukity.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemukity.exe"77⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrlclf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlclf.exe"78⤵
- Checks computer location settings
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxulmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxulmh.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmgsef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgsef.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeshus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeshus.exe"81⤵
- Modifies registry class
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Sysqempkyfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkyfi.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcmnaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmnaf.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuialw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuialw.exe"84⤵
- Modifies registry class
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmmot.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmmot.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmzzp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmzzp.exe"86⤵
- Checks computer location settings
- Modifies registry class
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuqlrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuqlrs.exe"87⤵
- Checks computer location settings
- Modifies registry class
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjygpe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjygpe.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmwff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmwff.exe"89⤵
- Modifies registry class
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrdtgn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdtgn.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmjlob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjlob.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghkwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghkwq.exe"92⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\Sysqemksozo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksozo.exe"93⤵
- Checks computer location settings
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzenkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzenkd.exe"94⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgpvcm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgpvcm.exe"95⤵
- Checks computer location settings
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoruit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoruit.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfulj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfulj.exe"97⤵
- Checks computer location settings
- Modifies registry class
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjsbw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjsbw.exe"98⤵
- Checks computer location settings
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrftze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrftze.exe"99⤵
- Checks computer location settings
- Modifies registry class
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteiun.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteiun.exe"100⤵
- Checks computer location settings
PID:464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgceci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgceci.exe"101⤵
- Checks computer location settings
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlziu.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeplbx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeplbx.exe"103⤵
- Modifies registry class
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehuyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehuyd.exe"104⤵
- Checks computer location settings
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyomzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyomzr.exe"105⤵
- Checks computer location settings
- Modifies registry class
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrnqkc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrnqkc.exe"106⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Sysqemolxkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolxkd.exe"107⤵
- Checks computer location settings
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemirlms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemirlms.exe"108⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkknz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkknz.exe"109⤵
- Checks computer location settings
- Modifies registry class
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvxfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvxfn.exe"110⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtyada.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyada.exe"111⤵
- Modifies registry class
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemypxdh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemypxdh.exe"112⤵
- Modifies registry class
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyplj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyplj.exe"113⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjovlr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjovlr.exe"114⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlvccs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvccs.exe"115⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlcarl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcarl.exe"116⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyerau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyerau.exe"117⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemldvio.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldvio.exe"118⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdvzyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvzyh.exe"119⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjbflg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbflg.exe"120⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\Sysqembecbu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembecbu.exe"121⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtttux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtttux.exe"122⤵PID:4092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-