Analysis
-
max time kernel
87s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe
-
Size
518KB
-
MD5
a0c916e3200d232249ee13612a41b4b0
-
SHA1
93297a4dfc2bd11ec2d3cb6576bd10d94f559709
-
SHA256
8d30b7904e53e7c657bf5cc6a7f0b76e07d9e9d39f7227b04200501f0b2ec589
-
SHA512
446d1742b92390a6223a079528728710144a081ab10c6b12963fa5393d0a160780e9c9cec9f35de9006db0759c07709634e5b43098aca1c364330aa8bdab7848
-
SSDEEP
3072:FCaoAs101Pol0xPTM7mRCAdJSSxPUkl3VyFNdQMQTCk/dN92sdNhavtrVdewnAxs:FqDAwl0xPTMiR9JSSxPUKYGdodHr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtjrrn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdnxxx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgnuvr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempsxyp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemmspyo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtyqfu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemojlir.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembcljy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemruoqp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemamcrg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnfhpl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvjdfu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempiqsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemmykze.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtwgeo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemoodbc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemopeex.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdtblb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwekad.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgptax.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembsvxa.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembkxuo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnugaw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdvcyc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemynbva.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtfaqv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemoehff.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyxryz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwlcvp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyhhtr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempkvxf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfigiq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemedeeh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlfagq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemiygzq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemorfhj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemrvysz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyiuks.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtsbza.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdfyzv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdsfjl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfeyii.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnebyz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzlqoo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkioal.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzreqz.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgwfej.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemigwhj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemexfne.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvuzsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyytwf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhperi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemztoqb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhbnlm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxckpm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemednxj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhokzh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemffdwf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzzoqk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhxmkk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgrmov.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlxsiy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemybnsb.exe -
Executes dropped EXE 64 IoCs
pid Process 688 Sysqembbews.exe 1200 Sysqemwoulm.exe 1392 Sysqemwdkrd.exe 3428 Sysqemzvbbn.exe 2804 Sysqemzkzhe.exe 3228 Sysqemycizy.exe 4980 Sysqemhokzh.exe 3396 Sysqemggtsb.exe 4020 Sysqemoehff.exe 1692 Sysqemtiany.exe 3252 Sysqembgoak.exe 2492 Sysqemghwvs.exe 5048 Sysqemyhhtr.exe 508 Sysqemtybvp.exe 4196 Sysqembcljy.exe 4776 Sysqemgwfej.exe 2136 Sysqemopeex.exe 3048 Sysqemywibi.exe 4024 Sysqemydghz.exe 4456 Sysqemghqur.exe 3140 Sysqemrwums.exe 3880 Sysqembsvxa.exe 960 Sysqemdfyzv.exe 3628 Sysqembkxuo.exe 3552 Sysqemwbzxd.exe 232 Sysqemgyziz.exe 1052 Sysqemybnsb.exe 3104 Sysqemofnnf.exe 2492 Sysqemqecio.exe 4684 Sysqemyiobr.exe 3196 Sysqemdsfjl.exe 908 Sysqemieyjf.exe 3880 Sysqemtarcu.exe 2200 Sysqemybhxd.exe 1848 Sysqemtsbza.exe 1692 Sysqemgnuvr.exe 2960 Sysqemimjyb.exe 1724 Sysqemoosyd.exe 4204 Sysqemdtblb.exe 3988 Sysqemoodbc.exe 4456 Sysqemweaha.exe 3092 Sysqemsixms.exe 632 Sysqemqoehd.exe 1660 Sysqemscfkm.exe 2412 Sysqemlmuig.exe 2116 Sysqemvuzsc.exe 3560 Sysqemfeyii.exe 660 Sysqemvxwje.exe 5084 Sysqemgxjta.exe 1936 Sysqemidyoj.exe 4084 Sysqemnfhpl.exe 4472 Sysqemnugaw.exe 4124 Sysqemvjdfu.exe 4720 Sysqemdvcyc.exe 4736 Sysqemqxjtz.exe 2936 Sysqemyxryz.exe 3040 Sysqemyytwf.exe 3500 Sysqemiygzq.exe 1240 Sysqemiqqxd.exe 4976 Sysqemxycxe.exe 4092 Sysqemigqgm.exe 4528 Sysqemdxkij.exe 1596 Sysqemqzzdg.exe 1804 Sysqemvmuzl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemluqlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnfhpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempsxyp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwlcvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemednxj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlfagq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjuju.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemopeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemweaha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsixms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjtiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdnxxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhryiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuxagt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzzoqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdfyzv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyiobr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyxryz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempiqsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzlqoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyjefy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemycizy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemobfqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembutps.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtnzjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlmuig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemigqgm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemguoll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemieyjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjdfu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemggwia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfaqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtyqfu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrvysz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemojlir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwbzxd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyziz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoosyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiygzq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemktpuc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkiku.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemntrug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxkij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhbnlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeqxuj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemedeeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvxwje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemffdwf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqecio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnugaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzreqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoatxh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgptax.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyytwf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnyxxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemumyzv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfpfqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemamcrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwekad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjaskb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemydghz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhxmkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwvrzm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4724 wrote to memory of 688 4724 a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe 83 PID 4724 wrote to memory of 688 4724 a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe 83 PID 4724 wrote to memory of 688 4724 a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe 83 PID 688 wrote to memory of 1200 688 Sysqembbews.exe 84 PID 688 wrote to memory of 1200 688 Sysqembbews.exe 84 PID 688 wrote to memory of 1200 688 Sysqembbews.exe 84 PID 1200 wrote to memory of 1392 1200 Sysqemwoulm.exe 85 PID 1200 wrote to memory of 1392 1200 Sysqemwoulm.exe 85 PID 1200 wrote to memory of 1392 1200 Sysqemwoulm.exe 85 PID 1392 wrote to memory of 3428 1392 Sysqemwdkrd.exe 88 PID 1392 wrote to memory of 3428 1392 Sysqemwdkrd.exe 88 PID 1392 wrote to memory of 3428 1392 Sysqemwdkrd.exe 88 PID 3428 wrote to memory of 2804 3428 Sysqemzvbbn.exe 90 PID 3428 wrote to memory of 2804 3428 Sysqemzvbbn.exe 90 PID 3428 wrote to memory of 2804 3428 Sysqemzvbbn.exe 90 PID 2804 wrote to memory of 3228 2804 Sysqemzkzhe.exe 91 PID 2804 wrote to memory of 3228 2804 Sysqemzkzhe.exe 91 PID 2804 wrote to memory of 3228 2804 Sysqemzkzhe.exe 91 PID 3228 wrote to memory of 4980 3228 Sysqemycizy.exe 94 PID 3228 wrote to memory of 4980 3228 Sysqemycizy.exe 94 PID 3228 wrote to memory of 4980 3228 Sysqemycizy.exe 94 PID 4980 wrote to memory of 3396 4980 Sysqemhokzh.exe 95 PID 4980 wrote to memory of 3396 4980 Sysqemhokzh.exe 95 PID 4980 wrote to memory of 3396 4980 Sysqemhokzh.exe 95 PID 3396 wrote to memory of 4020 3396 Sysqemggtsb.exe 96 PID 3396 wrote to memory of 4020 3396 Sysqemggtsb.exe 96 PID 3396 wrote to memory of 4020 3396 Sysqemggtsb.exe 96 PID 4020 wrote to memory of 1692 4020 Sysqemoehff.exe 97 PID 4020 wrote to memory of 1692 4020 Sysqemoehff.exe 97 PID 4020 wrote to memory of 1692 4020 Sysqemoehff.exe 97 PID 1692 wrote to memory of 3252 1692 Sysqemtiany.exe 100 PID 1692 wrote to memory of 3252 1692 Sysqemtiany.exe 100 PID 1692 wrote to memory of 3252 1692 Sysqemtiany.exe 100 PID 3252 wrote to memory of 2492 3252 Sysqembgoak.exe 123 PID 3252 wrote to memory of 2492 3252 Sysqembgoak.exe 123 PID 3252 wrote to memory of 2492 3252 Sysqembgoak.exe 123 PID 2492 wrote to memory of 5048 2492 Sysqemghwvs.exe 103 PID 2492 wrote to memory of 5048 2492 Sysqemghwvs.exe 103 PID 2492 wrote to memory of 5048 2492 Sysqemghwvs.exe 103 PID 5048 wrote to memory of 508 5048 Sysqemyhhtr.exe 104 PID 5048 wrote to memory of 508 5048 Sysqemyhhtr.exe 104 PID 5048 wrote to memory of 508 5048 Sysqemyhhtr.exe 104 PID 508 wrote to memory of 4196 508 Sysqemtybvp.exe 105 PID 508 wrote to memory of 4196 508 Sysqemtybvp.exe 105 PID 508 wrote to memory of 4196 508 Sysqemtybvp.exe 105 PID 4196 wrote to memory of 4776 4196 Sysqembcljy.exe 106 PID 4196 wrote to memory of 4776 4196 Sysqembcljy.exe 106 PID 4196 wrote to memory of 4776 4196 Sysqembcljy.exe 106 PID 4776 wrote to memory of 2136 4776 Sysqemgwfej.exe 107 PID 4776 wrote to memory of 2136 4776 Sysqemgwfej.exe 107 PID 4776 wrote to memory of 2136 4776 Sysqemgwfej.exe 107 PID 2136 wrote to memory of 3048 2136 Sysqemopeex.exe 109 PID 2136 wrote to memory of 3048 2136 Sysqemopeex.exe 109 PID 2136 wrote to memory of 3048 2136 Sysqemopeex.exe 109 PID 3048 wrote to memory of 4024 3048 Sysqemywibi.exe 111 PID 3048 wrote to memory of 4024 3048 Sysqemywibi.exe 111 PID 3048 wrote to memory of 4024 3048 Sysqemywibi.exe 111 PID 4024 wrote to memory of 4456 4024 Sysqemydghz.exe 135 PID 4024 wrote to memory of 4456 4024 Sysqemydghz.exe 135 PID 4024 wrote to memory of 4456 4024 Sysqemydghz.exe 135 PID 4456 wrote to memory of 3140 4456 Sysqemghqur.exe 113 PID 4456 wrote to memory of 3140 4456 Sysqemghqur.exe 113 PID 4456 wrote to memory of 3140 4456 Sysqemghqur.exe 113 PID 3140 wrote to memory of 3880 3140 Sysqemrwums.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a0c916e3200d232249ee13612a41b4b0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqembbews.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembbews.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwoulm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwoulm.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdkrd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdkrd.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzvbbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvbbn.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzkzhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkzhe.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycizy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycizy.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhokzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhokzh.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemggtsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemggtsb.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoehff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoehff.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtiany.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtiany.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgoak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgoak.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghwvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghwvs.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhhtr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhhtr.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtybvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtybvp.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\Sysqembcljy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembcljy.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgwfej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgwfej.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemopeex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemopeex.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywibi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywibi.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemydghz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemydghz.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemghqur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemghqur.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwums.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwums.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\Sysqembsvxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembsvxa.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfyzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfyzv.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkxuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkxuo.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbzxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbzxd.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyziz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyziz.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofnnf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofnnf.exe"29⤵
- Executes dropped EXE
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqecio.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqecio.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyiobr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyiobr.exe"31⤵
- Executes dropped EXE
- Modifies registry class
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdsfjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdsfjl.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemieyjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemieyjf.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtarcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtarcu.exe"34⤵
- Executes dropped EXE
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybhxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybhxd.exe"35⤵
- Executes dropped EXE
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsbza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsbza.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnuvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnuvr.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemimjyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemimjyb.exe"38⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoosyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoosyd.exe"39⤵
- Executes dropped EXE
- Modifies registry class
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtblb.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoodbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoodbc.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemweaha.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemweaha.exe"42⤵
- Executes dropped EXE
- Modifies registry class
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsixms.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsixms.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqoehd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqoehd.exe"44⤵
- Executes dropped EXE
PID:632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemscfkm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscfkm.exe"45⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmuig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmuig.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuzsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuzsc.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfeyii.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfeyii.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxwje.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxwje.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgxjta.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgxjta.exe"50⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidyoj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidyoj.exe"51⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfhpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfhpl.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnugaw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnugaw.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjdfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjdfu.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvcyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvcyc.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxjtz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxjtz.exe"56⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyxryz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxryz.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyytwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyytwf.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiygzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiygzq.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiqqxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqqxd.exe"60⤵
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxycxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxycxe.exe"61⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemigqgm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemigqgm.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxkij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxkij.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzzdg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzzdg.exe"64⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvmuzl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvmuzl.exe"65⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsqqwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqqwd.exe"66⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Sysqempkvxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkvxf.exe"67⤵
- Checks computer location settings
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfetxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfetxa.exe"68⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfpfqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpfqo.exe"69⤵
- Modifies registry class
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfigiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfigiq.exe"70⤵
- Checks computer location settings
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\Sysqempsxyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsxyp.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnebyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnebyz.exe"72⤵
- Checks computer location settings
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemffdwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemffdwf.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhperi.exe"74⤵
- Checks computer location settings
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcozzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcozzr.exe"75⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnyxxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnyxxy.exe"76⤵
- Modifies registry class
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqempiqsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempiqsc.exe"77⤵
- Checks computer location settings
- Modifies registry class
PID:908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztoqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztoqb.exe"78⤵
- Checks computer location settings
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlqoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlqoo.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbnlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbnlm.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemamcrg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamcrg.exe"81⤵
- Checks computer location settings
- Modifies registry class
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemktpuc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemktpuc.exe"82⤵
- Modifies registry class
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxckpm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxckpm.exe"83⤵
- Checks computer location settings
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkeakj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkeakj.exe"84⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\Sysqemruoqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemruoqp.exe"85⤵
- Checks computer location settings
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkioal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkioal.exe"86⤵
- Checks computer location settings
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhryiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhryiz.exe"87⤵
- Modifies registry class
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwlcvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlcvp.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmbpjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbpjh.exe"89⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxagt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxagt.exe"90⤵
- Modifies registry class
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemumyzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumyzv.exe"91⤵
- Modifies registry class
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhdchy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhdchy.exe"92⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrkiku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkiku.exe"93⤵
- Modifies registry class
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzreqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzreqz.exe"94⤵
- Checks computer location settings
- Modifies registry class
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemroeaw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemroeaw.exe"95⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwekad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwekad.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzzoqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzoqk.exe"97⤵
- Checks computer location settings
- Modifies registry class
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmykze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmykze.exe"98⤵
- Checks computer location settings
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjrrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjrrn.exe"99⤵
- Checks computer location settings
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqxuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqxuj.exe"100⤵
- Modifies registry class
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhxmkk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxmkk.exe"101⤵
- Checks computer location settings
- Modifies registry class
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbxdn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbxdn.exe"102⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwjtiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjtiz.exe"103⤵
- Modifies registry class
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemobfqs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemobfqs.exe"104⤵
- Modifies registry class
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmspyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmspyo.exe"105⤵
- Checks computer location settings
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemedeeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemedeeh.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemorfhj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemorfhj.exe"107⤵
- Checks computer location settings
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwvrzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvrzm.exe"108⤵
- Modifies registry class
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemednxj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemednxj.exe"109⤵
- Checks computer location settings
- Modifies registry class
PID:528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyjefy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjefy.exe"110⤵
- Modifies registry class
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnqyb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnqyb.exe"111⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemynbva.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemynbva.exe"112⤵
- Checks computer location settings
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrmov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrmov.exe"113⤵
- Checks computer location settings
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlehba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlehba.exe"114⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Sysqembutps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembutps.exe"115⤵
- Modifies registry class
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemohmxa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemohmxa.exe"116⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoatxh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoatxh.exe"117⤵
- Modifies registry class
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtyqfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtyqfu.exe"118⤵
- Checks computer location settings
- Modifies registry class
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgdfg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgdfg.exe"119⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgptax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgptax.exe"120⤵
- Checks computer location settings
- Modifies registry class
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvysz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvysz.exe"121⤵
- Checks computer location settings
- Modifies registry class
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtravu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtravu.exe"122⤵PID:3688
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-