Analysis
-
max time kernel
106s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe
-
Size
556KB
-
MD5
f8f52b2695850904f8265611fb51bdf0
-
SHA1
7286261dfe100dd2586e788ef93d01c28e23a6a5
-
SHA256
749334d19368383b01566b07d4589964ede7f3c6112cd05f65910befa78c30e5
-
SHA512
ee2b335048953c0f5ec0c4d1f7b5747b56682624fbd422971dc365add135fa2536b108a44affedda11a8ec116a7c49f0873e84cfa857070e40e9ac12b997b3a7
-
SSDEEP
3072:dCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAx/:dqDAwl0xPTMiR9JSSxPUKYGdodHTu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemokaas.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempylnu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemapjos.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxgiks.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjmkbk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdizzv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrqhcz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmnwhi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemoalpl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemytutj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemswjmn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembxbwa.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwatic.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnzhtw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemkubvv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemszmoq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemegayu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemboyjq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvcyan.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqmzda.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemktyef.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemuaxve.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfzwek.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemweepk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwtorh.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemumzep.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwydcf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemeiqni.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemflxjk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqoiag.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgjddr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtswmw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjclmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhvkbc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembmrha.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwrdpv.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemiwowc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjiuym.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemepoas.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyfgva.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemktata.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemradfm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyjzue.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrkniu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqspag.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemablgc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmosqs.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvkeld.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemaquhm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrklkp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembzwfr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfngef.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrkiku.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhgkrr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtmczr.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemajzsn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfbwem.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwuukw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyiuks.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvlqmz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxyddq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemoorlc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqkscd.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe -
Executes dropped EXE 64 IoCs
pid Process 2656 Sysqemtswmw.exe 4916 Sysqemmdkrp.exe 380 Sysqemwydcf.exe 4824 Sysqemezccl.exe 2628 Sysqemeozhc.exe 4332 Sysqemokaas.exe 3944 Sysqemrqhcz.exe 3868 Sysqemoccyy.exe 3920 Sysqemhnrvr.exe 2324 Sysqemjiuym.exe 632 Sysqemznbtx.exe 532 Sysqembxbwa.exe 976 Sysqemhgkrr.exe 3300 Sysqemtmczr.exe 3588 Sysqemoalpl.exe 5096 Sysqemrklkp.exe 3000 Sysqemrkniu.exe 408 Sysqemwatic.exe 1996 Sysqemeiqni.exe 3540 Sysqemlubgl.exe 1896 Sysqemwtorh.exe 1324 Sysqembrlzu.exe 3140 Sysqemrzfrv.exe 804 Sysqemmnwhi.exe 900 Sysqemtvkno.exe 1128 Sysqembzwfr.exe 4732 Sysqemtotli.exe 4348 Sysqemvylaa.exe 3084 Sysqembhcic.exe 3076 Sysqemiactl.exe 3560 Sysqemgjwhk.exe 1028 Sysqemllfuu.exe 4856 Sysqemdlrxf.exe 3256 Sysqemvogvs.exe 2328 Sysqemepoas.exe 4488 Sysqemablgc.exe 1808 Sysqemjclmd.exe 4504 Sysqemvlqmz.exe 4860 Sysqemnaqpp.exe 1740 Sysqemqspag.exe 4320 Sysqemsrevp.exe 4516 Sysqemavpns.exe 4008 Sysqemakoyv.exe 3648 Sysqemdrvbe.exe 2016 Sysqemvqhep.exe 4352 Sysqemahnew.exe 1136 Sysqemlzepv.exe 3272 Sysqemqmzda.exe 3744 Sysqemyfgva.exe 3160 Sysqemfndtg.exe 1572 Sysqemapjos.exe 2368 Sysqemfngef.exe 4704 Sysqemktyef.exe 3088 Sysqemddnky.exe 4408 Sysqemvanuv.exe 2816 Sysqemnzysm.exe 4916 Sysqemxyddq.exe 3588 Sysqemnhxvr.exe 4728 Sysqemnzhtw.exe 348 Sysqemflxjk.exe 4288 Sysqemsjbzm.exe 2440 Sysqemphjeq.exe 1888 Sysqemvisns.exe 2328 Sysqemsjlfi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsjbzm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhvkbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembgutz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeusvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemboyjq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembxbwa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkniu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhxvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwuzcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemitgea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvkeld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemegayu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemktata.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjrbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemupvsn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjddr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtswmw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqspag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemszmoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemojegy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemweepk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgldcu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemswjmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvanuv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjupmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqoiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemznbtx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrklkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoorlc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlubgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyfgva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdqwn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytutj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgbnax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoccyy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoalpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdrvbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemckwin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemradfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeozhc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhnrvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhgkrr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemablgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfndtg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvisns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembsqay.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvqhep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemahnew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxyddq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwuukw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdzwtv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiwowc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnaqpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemurwxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyiuks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemokaas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvatvk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscqbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtotli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhcic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempylnu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemssmqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjwhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxgiks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2656 2552 f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe 82 PID 2552 wrote to memory of 2656 2552 f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe 82 PID 2552 wrote to memory of 2656 2552 f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe 82 PID 2656 wrote to memory of 4916 2656 Sysqemtswmw.exe 85 PID 2656 wrote to memory of 4916 2656 Sysqemtswmw.exe 85 PID 2656 wrote to memory of 4916 2656 Sysqemtswmw.exe 85 PID 4916 wrote to memory of 380 4916 Sysqemmdkrp.exe 87 PID 4916 wrote to memory of 380 4916 Sysqemmdkrp.exe 87 PID 4916 wrote to memory of 380 4916 Sysqemmdkrp.exe 87 PID 380 wrote to memory of 4824 380 Sysqemwydcf.exe 88 PID 380 wrote to memory of 4824 380 Sysqemwydcf.exe 88 PID 380 wrote to memory of 4824 380 Sysqemwydcf.exe 88 PID 4824 wrote to memory of 2628 4824 Sysqemezccl.exe 89 PID 4824 wrote to memory of 2628 4824 Sysqemezccl.exe 89 PID 4824 wrote to memory of 2628 4824 Sysqemezccl.exe 89 PID 2628 wrote to memory of 4332 2628 Sysqemeozhc.exe 90 PID 2628 wrote to memory of 4332 2628 Sysqemeozhc.exe 90 PID 2628 wrote to memory of 4332 2628 Sysqemeozhc.exe 90 PID 4332 wrote to memory of 3944 4332 Sysqemokaas.exe 91 PID 4332 wrote to memory of 3944 4332 Sysqemokaas.exe 91 PID 4332 wrote to memory of 3944 4332 Sysqemokaas.exe 91 PID 3944 wrote to memory of 3868 3944 Sysqemrqhcz.exe 92 PID 3944 wrote to memory of 3868 3944 Sysqemrqhcz.exe 92 PID 3944 wrote to memory of 3868 3944 Sysqemrqhcz.exe 92 PID 3868 wrote to memory of 3920 3868 Sysqemoccyy.exe 93 PID 3868 wrote to memory of 3920 3868 Sysqemoccyy.exe 93 PID 3868 wrote to memory of 3920 3868 Sysqemoccyy.exe 93 PID 3920 wrote to memory of 2324 3920 Sysqemhnrvr.exe 96 PID 3920 wrote to memory of 2324 3920 Sysqemhnrvr.exe 96 PID 3920 wrote to memory of 2324 3920 Sysqemhnrvr.exe 96 PID 2324 wrote to memory of 632 2324 Sysqemjiuym.exe 97 PID 2324 wrote to memory of 632 2324 Sysqemjiuym.exe 97 PID 2324 wrote to memory of 632 2324 Sysqemjiuym.exe 97 PID 632 wrote to memory of 532 632 Sysqemznbtx.exe 100 PID 632 wrote to memory of 532 632 Sysqemznbtx.exe 100 PID 632 wrote to memory of 532 632 Sysqemznbtx.exe 100 PID 532 wrote to memory of 976 532 Sysqembxbwa.exe 101 PID 532 wrote to memory of 976 532 Sysqembxbwa.exe 101 PID 532 wrote to memory of 976 532 Sysqembxbwa.exe 101 PID 976 wrote to memory of 3300 976 Sysqemhgkrr.exe 102 PID 976 wrote to memory of 3300 976 Sysqemhgkrr.exe 102 PID 976 wrote to memory of 3300 976 Sysqemhgkrr.exe 102 PID 3300 wrote to memory of 3588 3300 Sysqemtmczr.exe 103 PID 3300 wrote to memory of 3588 3300 Sysqemtmczr.exe 103 PID 3300 wrote to memory of 3588 3300 Sysqemtmczr.exe 103 PID 3588 wrote to memory of 5096 3588 Sysqemoalpl.exe 104 PID 3588 wrote to memory of 5096 3588 Sysqemoalpl.exe 104 PID 3588 wrote to memory of 5096 3588 Sysqemoalpl.exe 104 PID 5096 wrote to memory of 3000 5096 Sysqemrklkp.exe 106 PID 5096 wrote to memory of 3000 5096 Sysqemrklkp.exe 106 PID 5096 wrote to memory of 3000 5096 Sysqemrklkp.exe 106 PID 3000 wrote to memory of 408 3000 Sysqemrkniu.exe 107 PID 3000 wrote to memory of 408 3000 Sysqemrkniu.exe 107 PID 3000 wrote to memory of 408 3000 Sysqemrkniu.exe 107 PID 408 wrote to memory of 1996 408 Sysqemwatic.exe 108 PID 408 wrote to memory of 1996 408 Sysqemwatic.exe 108 PID 408 wrote to memory of 1996 408 Sysqemwatic.exe 108 PID 1996 wrote to memory of 3540 1996 Sysqemeiqni.exe 109 PID 1996 wrote to memory of 3540 1996 Sysqemeiqni.exe 109 PID 1996 wrote to memory of 3540 1996 Sysqemeiqni.exe 109 PID 3540 wrote to memory of 1896 3540 Sysqemlubgl.exe 112 PID 3540 wrote to memory of 1896 3540 Sysqemlubgl.exe 112 PID 3540 wrote to memory of 1896 3540 Sysqemlubgl.exe 112 PID 1896 wrote to memory of 1324 1896 Sysqemwtorh.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\f8f52b2695850904f8265611fb51bdf0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtswmw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtswmw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmdkrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdkrp.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwydcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwydcf.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemezccl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemezccl.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeozhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeozhc.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemokaas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemokaas.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrqhcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqhcz.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoccyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoccyy.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhnrvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhnrvr.exe"10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjiuym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjiuym.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznbtx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznbtx.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxbwa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxbwa.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhgkrr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhgkrr.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmczr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmczr.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoalpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoalpl.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrklkp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrklkp.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkniu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkniu.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwatic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwatic.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeiqni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeiqni.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlubgl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlubgl.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwtorh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtorh.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrlzu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrlzu.exe"23⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzfrv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzfrv.exe"24⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnwhi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnwhi.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvkno.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvkno.exe"26⤵
- Executes dropped EXE
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzwfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzwfr.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtotli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtotli.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvylaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvylaa.exe"29⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhcic.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhcic.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiactl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiactl.exe"31⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjwhk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjwhk.exe"32⤵
- Executes dropped EXE
- Modifies registry class
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllfuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllfuu.exe"33⤵
- Executes dropped EXE
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdlrxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlrxf.exe"34⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvogvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvogvs.exe"35⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemepoas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemepoas.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemablgc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemablgc.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjclmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjclmd.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvlqmz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvlqmz.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnaqpp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnaqpp.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqspag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqspag.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrevp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrevp.exe"42⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemavpns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemavpns.exe"43⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemakoyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakoyv.exe"44⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdrvbe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdrvbe.exe"45⤵
- Executes dropped EXE
- Modifies registry class
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqhep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqhep.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemahnew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemahnew.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzepv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzepv.exe"48⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmzda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmzda.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfgva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfgva.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfndtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfndtg.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemapjos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapjos.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfngef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfngef.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemktyef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemktyef.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddnky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddnky.exe"55⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvanuv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanuv.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnzysm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzysm.exe"57⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyddq.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhxvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhxvr.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnzhtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzhtw.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemflxjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemflxjk.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsjbzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsjbzm.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemphjeq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemphjeq.exe"63⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvisns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvisns.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsjlfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsjlfi.exe"65⤵
- Executes dropped EXE
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkubvv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkubvv.exe"66⤵
- Checks computer location settings
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszmoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszmoq.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkolzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkolzb.exe"68⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzwfrc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwfrc.exe"69⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\Sysqemccnhd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccnhd.exe"70⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhtshk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtshk.exe"71⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\Sysqemurwxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemurwxf.exe"72⤵
- Modifies registry class
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckwin.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckwin.exe"73⤵
- Modifies registry class
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemegayu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemegayu.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevzjx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevzjx.exe"75⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemenjgk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemenjgk.exe"76⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfzwek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzwek.exe"77⤵
- Checks computer location settings
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhrxho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhrxho.exe"78⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Sysqempylnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempylnu.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxgiks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgiks.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemktata.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemktata.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhvkbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvkbc.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoorlc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoorlc.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdqwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdqwn.exe"84⤵
- Modifies registry class
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemumzep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumzep.exe"85⤵
- Checks computer location settings
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkiku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkiku.exe"86⤵
- Checks computer location settings
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucinx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucinx.exe"87⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuukll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuukll.exe"88⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzkqlt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkqlt.exe"89⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\Sysqembgutz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgutz.exe"90⤵
- Modifies registry class
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucvrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucvrh.exe"91⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemradfm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemradfm.exe"92⤵
- Checks computer location settings
- Modifies registry class
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwuukw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuukw.exe"93⤵
- Checks computer location settings
- Modifies registry class
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\Sysqembsqay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembsqay.exe"94⤵
- Modifies registry class
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmosqs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmosqs.exe"95⤵
- Checks computer location settings
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojegy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojegy.exe"96⤵
- Modifies registry class
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkdgn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkdgn.exe"97⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjmkbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmkbk.exe"98⤵
- Checks computer location settings
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjrbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjrbd.exe"99⤵
- Modifies registry class
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrdpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrdpv.exe"100⤵
- Checks computer location settings
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrxvxk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrxvxk.exe"101⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\Sysqemupvsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupvsn.exe"102⤵
- Modifies registry class
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyrny.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyrny.exe"103⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdwztd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdwztd.exe"104⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjjcgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjcgi.exe"105⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjupmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjupmi.exe"106⤵
- Modifies registry class
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwaiup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaiup.exe"107⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemufhpa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemufhpa.exe"108⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoatxh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoatxh.exe"109⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\Sysqemweepk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemweepk.exe"110⤵
- Checks computer location settings
- Modifies registry class
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeusvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeusvp.exe"111⤵
- Modifies registry class
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqoiag.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqoiag.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytutj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytutj.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemboyjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemboyjq.exe"114⤵
- Checks computer location settings
- Modifies registry class
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyiuks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyiuks.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwuzcc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuzcc.exe"116⤵
- Modifies registry class
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcyan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcyan.exe"117⤵
- Checks computer location settings
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjddr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjddr.exe"118⤵
- Checks computer location settings
- Modifies registry class
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgbnax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbnax.exe"119⤵
- Modifies registry class
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemitgea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitgea.exe"120⤵
- Modifies registry class
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdzwtv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdzwtv.exe"121⤵
- Modifies registry class
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmrha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmrha.exe"122⤵
- Checks computer location settings
PID:4984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-