Analysis
-
max time kernel
114s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe
-
Size
2.4MB
-
MD5
e0a128024ccb798a1f1f7afc418e35e0
-
SHA1
2176a7dc8688807ba0a3e4c9aa44d65e9ac190fb
-
SHA256
2e427fb9a614962ed1e0183f685c0902c1d791c5823a69bb3ace2f49335b3337
-
SHA512
a3d771bf177b17f4f6e4fa3bbaeab9d5afeb56143e4ca4e6a1f55eb759bde78bf3d50c83183848af779a78e724d1fdc91b4d66063acec6ae483765e8b1f2129c
-
SSDEEP
49152:1k47b5v+2me2n7tzYRnIXNy3Xe98MwsUUTiz19c2AtsNLELahbIfj5qYH:1v7bl+2yn7BYGNy3XFwUU+Xc2A+uLahg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemejqos.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjghcf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemugqcq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyvlnb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtildx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemuznbb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdqeec.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlegme.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqembzlmu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemaccpy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvvpom.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkzixk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemrmsmf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlnwfl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtjrrn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnqjme.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqempnnsg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemlgcde.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemigqwp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfuema.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkkihp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemidkri.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyiuks.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemczesy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemayvqv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemwdtwp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdpdnd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemgnzum.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemindfh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemnuplb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkglya.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemyhhtr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvtzhg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvtkjb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjclmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemeedtj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvbupx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtfgbo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdpqeg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemacaho.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemuffpo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemifuba.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemdqkdo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqmzda.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemmijqo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvvfqy.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemfjrtl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemimthb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemidzrh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemxskcl.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemsdhez.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemmjauc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemqgedb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemenjgk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemvbiaq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemhakwp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemzcqfs.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemkklzt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemodlrp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemtfjzm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemifqlq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemjtytp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemceigu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Sysqemempfr.exe -
Executes dropped EXE 64 IoCs
pid Process 2832 Sysqemuznbb.exe 4792 Sysqemrmsmf.exe 2108 Sysqempnnsg.exe 4428 Sysqemoumnd.exe 3360 Sysqemodlrp.exe 2984 Sysqemwdtwp.exe 1076 Sysqemrkked.exe 3980 Sysqemdpdnd.exe 3644 Sysqemzduij.exe 1280 Sysqemyhhtr.exe 4800 Sysqembgybu.exe 4504 Sysqemtfjzm.exe 2648 Sysqemzlhml.exe 2316 Sysqemjzjpu.exe 3224 Sysqemwfkkg.exe 3980 Sysqemlrivk.exe 4876 Sysqemaadtw.exe 4028 Sysqemgnzum.exe 5072 Sysqemwrjmw.exe 2064 Sysqemjions.exe 4916 Sysqemvztng.exe 3192 Sysqemifuba.exe 4340 Sysqemjclmd.exe 2384 Sysqemjghcf.exe 3980 Sysqemdqkdo.exe 3648 Sysqemlnwfl.exe 980 Sysqemkuejq.exe 1896 Sysqemaocox.exe 2524 Sysqemxazuh.exe 4116 Sysqemnfrnz.exe 2236 Sysqemqmzda.exe 764 Sysqemlhoqf.exe 2348 Sysqemgyqzg.exe 4724 Sysqemimthb.exe 3392 Sysqemindfh.exe 3884 Sysqemqgedb.exe 812 Sysqemlmfqb.exe 2064 Sysqemceigu.exe 3632 Sysqemdqeec.exe 2836 Sysqemidzrh.exe 3264 Sysqemaccpy.exe 2560 Sysqemxoxkw.exe 5028 Sysqemxskcl.exe 2384 Sysqempsxyp.exe 2112 Sysqemfphqz.exe 1692 Sysqemsdhez.exe 412 Sysqemkkihp.exe 4244 Sysqemmcbcb.exe 2856 Sysqemifqlq.exe 3264 Sysqemswego.exe 2580 Sysqemenjgk.exe 1280 Sysqemuweex.exe 5084 Sysqemuwppo.exe 3104 Sysqembiyyr.exe 1496 Sysqemeedtj.exe 2408 Sysqemwtncl.exe 4704 Sysqemempfr.exe 884 Sysqemmijqo.exe 372 Sysqemjsdop.exe 4572 Sysqemtjrrn.exe 2524 Sysqemugqcq.exe 3912 Sysqemejhxp.exe 4848 Sysqemhqfgs.exe 1072 Sysqemjtytp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4564 e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe 4564 e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe 2832 Sysqemuznbb.exe 2832 Sysqemuznbb.exe 4792 Sysqemrmsmf.exe 2108 Sysqempnnsg.exe 4428 Sysqemoumnd.exe 3360 Sysqemodlrp.exe 3360 Sysqemodlrp.exe 4428 Sysqemoumnd.exe 2984 Sysqemwdtwp.exe 1076 Sysqemrkked.exe 3980 Sysqemdpdnd.exe 3980 Sysqemdpdnd.exe 3644 Sysqemzduij.exe 1280 Sysqemyhhtr.exe 4800 Sysqembgybu.exe 4800 Sysqembgybu.exe 4504 Sysqemtfjzm.exe 2648 Sysqemzlhml.exe 2316 Sysqemjzjpu.exe 4504 Sysqemtfjzm.exe 2648 Sysqemzlhml.exe 3224 Sysqemwfkkg.exe 3980 Sysqemlrivk.exe 3980 Sysqemlrivk.exe 4876 Sysqemaadtw.exe 4028 Sysqemgnzum.exe 5072 Sysqemwrjmw.exe 4876 Sysqemaadtw.exe 4028 Sysqemgnzum.exe 2064 Sysqemjions.exe 4916 Sysqemvztng.exe 3192 Sysqemifuba.exe 3192 Sysqemifuba.exe 4340 Sysqemjclmd.exe 4916 Sysqemvztng.exe 2384 Sysqemjghcf.exe 3980 Sysqemdqkdo.exe 3648 Sysqemlnwfl.exe 3648 Sysqemlnwfl.exe 980 Sysqemkuejq.exe 980 Sysqemkuejq.exe 1896 Sysqemaocox.exe 2524 Sysqemxazuh.exe 4116 Sysqemnfrnz.exe 2236 Sysqemqmzda.exe 764 Sysqemlhoqf.exe 2236 Sysqemqmzda.exe 2348 Sysqemgyqzg.exe 4724 Sysqemimthb.exe 3392 Sysqemindfh.exe 3884 Sysqemqgedb.exe 812 Sysqemlmfqb.exe 2064 Sysqemceigu.exe 2064 Sysqemceigu.exe 3884 Sysqemqgedb.exe 3632 Sysqemdqeec.exe 812 Sysqemlmfqb.exe 2836 Sysqemidzrh.exe 2836 Sysqemidzrh.exe 3264 Sysqemaccpy.exe 2560 Sysqemxoxkw.exe 2560 Sysqemxoxkw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlgcde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtarjr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnqjme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemigqwp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuznbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwrjmw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczesy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaccpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemidkri.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqgedb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmijqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzkrwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrkked.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwfkkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgjmqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemayvqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejqos.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxazuh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfgbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvbupx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembnbhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlfxsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnypev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtbcnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuffpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlnwfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemempfr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzduij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdqkdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmjauc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwtncl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemywlho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxwlwh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvvfqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdpqeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempsxyp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfphqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsdhez.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoncug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjzjpu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaocox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqmzda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgyqzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzcqfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyfbyz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiufah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvtkjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyhhtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemifuba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdpdnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemindfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtildx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgnzum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxskcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemihajf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoumnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemswego.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlrivk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemenjgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhzbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodlrp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtfjzm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaadtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkuejq.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4564 e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe 2832 Sysqemuznbb.exe 4792 Sysqemrmsmf.exe 2108 Sysqempnnsg.exe 4428 Sysqemoumnd.exe 3360 Sysqemodlrp.exe 2984 Sysqemwdtwp.exe 1076 Sysqemrkked.exe 3980 Sysqemdpdnd.exe 3644 Sysqemzduij.exe 1280 Sysqemyhhtr.exe 4800 Sysqembgybu.exe 4504 Sysqemtfjzm.exe 2648 Sysqemzlhml.exe 2316 Sysqemjzjpu.exe 3224 Sysqemwfkkg.exe 3980 Sysqemlrivk.exe 4876 Sysqemaadtw.exe 4028 Sysqemgnzum.exe 5072 Sysqemwrjmw.exe 2064 Sysqemjions.exe 4916 Sysqemvztng.exe 3192 Sysqemifuba.exe 4340 Sysqemjclmd.exe 2384 Sysqemjghcf.exe 3980 Sysqemdqkdo.exe 3648 Sysqemlnwfl.exe 980 Sysqemkuejq.exe 1896 Sysqemaocox.exe 2524 Sysqemxazuh.exe 4116 Sysqemnfrnz.exe 2236 Sysqemqmzda.exe 764 Sysqemlhoqf.exe 2348 Sysqemgyqzg.exe 4724 Sysqemimthb.exe 3392 Sysqemindfh.exe 3884 Sysqemqgedb.exe 812 Sysqemlmfqb.exe 2064 Sysqemceigu.exe 3632 Sysqemdqeec.exe 2836 Sysqemidzrh.exe 3264 Sysqemaccpy.exe 2560 Sysqemxoxkw.exe 5028 Sysqemxskcl.exe 2384 Sysqempsxyp.exe 2112 Sysqemfphqz.exe 1692 Sysqemsdhez.exe 412 Sysqemkkihp.exe 4244 Sysqemmcbcb.exe 2856 Sysqemifqlq.exe 3264 Sysqemswego.exe 2580 Sysqemenjgk.exe 1280 Sysqemuweex.exe 5084 Sysqemuwppo.exe 3104 Sysqembiyyr.exe 1496 Sysqemeedtj.exe 2408 Sysqemwtncl.exe 4704 Sysqemempfr.exe 884 Sysqemmijqo.exe 372 Sysqemjsdop.exe 4572 Sysqemtjrrn.exe 2524 Sysqemugqcq.exe 3912 Sysqemejhxp.exe 4848 Sysqemhqfgs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 2832 4564 e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe 86 PID 4564 wrote to memory of 2832 4564 e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe 86 PID 4564 wrote to memory of 2832 4564 e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe 86 PID 2832 wrote to memory of 4792 2832 Sysqemuznbb.exe 89 PID 2832 wrote to memory of 4792 2832 Sysqemuznbb.exe 89 PID 2832 wrote to memory of 4792 2832 Sysqemuznbb.exe 89 PID 4792 wrote to memory of 2108 4792 Sysqemrmsmf.exe 92 PID 4792 wrote to memory of 2108 4792 Sysqemrmsmf.exe 92 PID 4792 wrote to memory of 2108 4792 Sysqemrmsmf.exe 92 PID 2108 wrote to memory of 4428 2108 Sysqempnnsg.exe 95 PID 2108 wrote to memory of 4428 2108 Sysqempnnsg.exe 95 PID 2108 wrote to memory of 4428 2108 Sysqempnnsg.exe 95 PID 4428 wrote to memory of 3360 4428 Sysqemoumnd.exe 96 PID 4428 wrote to memory of 3360 4428 Sysqemoumnd.exe 96 PID 4428 wrote to memory of 3360 4428 Sysqemoumnd.exe 96 PID 3360 wrote to memory of 2984 3360 Sysqemodlrp.exe 97 PID 3360 wrote to memory of 2984 3360 Sysqemodlrp.exe 97 PID 3360 wrote to memory of 2984 3360 Sysqemodlrp.exe 97 PID 2984 wrote to memory of 1076 2984 Sysqemwdtwp.exe 99 PID 2984 wrote to memory of 1076 2984 Sysqemwdtwp.exe 99 PID 2984 wrote to memory of 1076 2984 Sysqemwdtwp.exe 99 PID 1076 wrote to memory of 3980 1076 Sysqemrkked.exe 112 PID 1076 wrote to memory of 3980 1076 Sysqemrkked.exe 112 PID 1076 wrote to memory of 3980 1076 Sysqemrkked.exe 112 PID 3980 wrote to memory of 3644 3980 Sysqemdpdnd.exe 102 PID 3980 wrote to memory of 3644 3980 Sysqemdpdnd.exe 102 PID 3980 wrote to memory of 3644 3980 Sysqemdpdnd.exe 102 PID 3644 wrote to memory of 1280 3644 Sysqemzduij.exe 104 PID 3644 wrote to memory of 1280 3644 Sysqemzduij.exe 104 PID 3644 wrote to memory of 1280 3644 Sysqemzduij.exe 104 PID 1280 wrote to memory of 4800 1280 Sysqemyhhtr.exe 107 PID 1280 wrote to memory of 4800 1280 Sysqemyhhtr.exe 107 PID 1280 wrote to memory of 4800 1280 Sysqemyhhtr.exe 107 PID 4800 wrote to memory of 4504 4800 Sysqembgybu.exe 108 PID 4800 wrote to memory of 4504 4800 Sysqembgybu.exe 108 PID 4800 wrote to memory of 4504 4800 Sysqembgybu.exe 108 PID 4504 wrote to memory of 2648 4504 Sysqemtfjzm.exe 109 PID 4504 wrote to memory of 2648 4504 Sysqemtfjzm.exe 109 PID 4504 wrote to memory of 2648 4504 Sysqemtfjzm.exe 109 PID 2648 wrote to memory of 2316 2648 Sysqemzlhml.exe 110 PID 2648 wrote to memory of 2316 2648 Sysqemzlhml.exe 110 PID 2648 wrote to memory of 2316 2648 Sysqemzlhml.exe 110 PID 2316 wrote to memory of 3224 2316 Sysqemjzjpu.exe 111 PID 2316 wrote to memory of 3224 2316 Sysqemjzjpu.exe 111 PID 2316 wrote to memory of 3224 2316 Sysqemjzjpu.exe 111 PID 3224 wrote to memory of 3980 3224 Sysqemwfkkg.exe 121 PID 3224 wrote to memory of 3980 3224 Sysqemwfkkg.exe 121 PID 3224 wrote to memory of 3980 3224 Sysqemwfkkg.exe 121 PID 3980 wrote to memory of 4876 3980 Sysqemlrivk.exe 113 PID 3980 wrote to memory of 4876 3980 Sysqemlrivk.exe 113 PID 3980 wrote to memory of 4876 3980 Sysqemlrivk.exe 113 PID 4876 wrote to memory of 4028 4876 Sysqemaadtw.exe 114 PID 4876 wrote to memory of 4028 4876 Sysqemaadtw.exe 114 PID 4876 wrote to memory of 4028 4876 Sysqemaadtw.exe 114 PID 4028 wrote to memory of 5072 4028 Sysqemgnzum.exe 115 PID 4028 wrote to memory of 5072 4028 Sysqemgnzum.exe 115 PID 4028 wrote to memory of 5072 4028 Sysqemgnzum.exe 115 PID 5072 wrote to memory of 2064 5072 Sysqemwrjmw.exe 116 PID 5072 wrote to memory of 2064 5072 Sysqemwrjmw.exe 116 PID 5072 wrote to memory of 2064 5072 Sysqemwrjmw.exe 116 PID 2064 wrote to memory of 4916 2064 Sysqemjions.exe 117 PID 2064 wrote to memory of 4916 2064 Sysqemjions.exe 117 PID 2064 wrote to memory of 4916 2064 Sysqemjions.exe 117 PID 4916 wrote to memory of 3192 4916 Sysqemvztng.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e0a128024ccb798a1f1f7afc418e35e0_NeikiAnalytics.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuznbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuznbb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrmsmf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrmsmf.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnnsg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnnsg.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoumnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoumnd.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodlrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodlrp.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdtwp.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkked.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkked.exe"8⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpdnd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpdnd.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzduij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzduij.exe"10⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhhtr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhhtr.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgybu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgybu.exe"12⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtfjzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfjzm.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlhml.exe"14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzjpu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzjpu.exe"15⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwfkkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwfkkg.exe"16⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlrivk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlrivk.exe"17⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaadtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaadtw.exe"18⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrjmw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrjmw.exe"20⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjions.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjions.exe"21⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvztng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvztng.exe"22⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemifuba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemifuba.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjclmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjclmd.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqkdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqkdo.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlnwfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlnwfl.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkuejq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuejq.exe"28⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"29⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxazuh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxazuh.exe"30⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnfrnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfrnz.exe"31⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmzda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmzda.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhoqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhoqf.exe"33⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyqzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyqzg.exe"34⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemimthb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemimthb.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemindfh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemindfh.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqgedb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgedb.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmfqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmfqb.exe"38⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemceigu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemceigu.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdqeec.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdqeec.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidzrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidzrh.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaccpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaccpy.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxoxkw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxoxkw.exe"43⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxskcl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxskcl.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\Sysqempsxyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsxyp.exe"45⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfphqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfphqz.exe"46⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsdhez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdhez.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkkihp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkkihp.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmcbcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmcbcb.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemifqlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemifqlq.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemswego.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswego.exe"51⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\Sysqemenjgk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemenjgk.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuweex.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuweex.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwppo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwppo.exe"54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqembiyyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembiyyr.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeedtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeedtj.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwtncl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtncl.exe"57⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemempfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemempfr.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmijqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmijqo.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjsdop.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjsdop.exe"60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjrrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjrrn.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemugqcq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugqcq.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejhxp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejhxp.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhqfgs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqfgs.exe"64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjtytp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtytp.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoncug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoncug.exe"66⤵
- Modifies registry class
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemewxss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemewxss.exe"67⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzcqfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzcqfs.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxuvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxuvz.exe"69⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzkrwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkrwj.exe"70⤵
- Modifies registry class
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhzbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhzbn.exe"71⤵
- Modifies registry class
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtfgbo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfgbo.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqsud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqsud.exe"73⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\Sysqembnbhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembnbhb.exe"74⤵
- Modifies registry class
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywlho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywlho.exe"75⤵
- Modifies registry class
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywvfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywvfc.exe"76⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyluyf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyluyf.exe"77⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlgcde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgcde.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidkri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidkri.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyiuks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyiuks.exe"80⤵
- Checks computer location settings
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgfpnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfpnp.exe"81⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyfbyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfbyz.exe"82⤵
- Modifies registry class
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjmqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjmqc.exe"83⤵
- Modifies registry class
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtarjr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtarjr.exe"84⤵
- Modifies registry class
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Sysqembecbu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembecbu.exe"85⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlegme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlegme.exe"86⤵
- Checks computer location settings
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyvlnb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyvlnb.exe"87⤵
- Checks computer location settings
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtbcnh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbcnh.exe"88⤵
- Modifies registry class
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqbgs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqbgs.exe"89⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtildx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtildx.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbdzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbdzq.exe"91⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\Sysqembzlmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzlmu.exe"92⤵
- Checks computer location settings
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvtzhg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvtzhg.exe"93⤵
- Checks computer location settings
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlfxsv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlfxsv.exe"94⤵
- Modifies registry class
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbiaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbiaq.exe"95⤵
- Checks computer location settings
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihajf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihajf.exe"96⤵
- Modifies registry class
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemahemq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemahemq.exe"97⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnqjme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnqjme.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemczesy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczesy.exe"99⤵
- Checks computer location settings
- Modifies registry class
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvvfqy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvvfqy.exe"100⤵
- Checks computer location settings
- Modifies registry class
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvvpom.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvvpom.exe"101⤵
- Checks computer location settings
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpqeg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpqeg.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemclloo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemclloo.exe"103⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\Sysqemspvhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemspvhy.exe"104⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiufah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiufah.exe"105⤵
- Modifies registry class
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemayvqv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemayvqv.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemigqwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemigqwp.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvtkjb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvtkjb.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcbgph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbgph.exe"109⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxwlwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwlwh.exe"110⤵
- Modifies registry class
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacaho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacaho.exe"111⤵
- Checks computer location settings
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuffpo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuffpo.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbupx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbupx.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrdncb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdncb.exe"114⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsgzvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgzvp.exe"115⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnuplb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnuplb.exe"116⤵
- Checks computer location settings
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkglya.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkglya.exe"117⤵
- Checks computer location settings
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejqos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejqos.exe"118⤵
- Checks computer location settings
- Modifies registry class
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfjrtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjrtl.exe"119⤵
- Checks computer location settings
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfuema.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfuema.exe"120⤵
- Checks computer location settings
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhakwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhakwp.exe"121⤵
- Checks computer location settings
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnypev.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnypev.exe"122⤵
- Modifies registry class
PID:3452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-