Analysis
-
max time kernel
73s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 18:12
Behavioral task
behavioral1
Sample
aba926d1aa4129c5d0d930a0056cf040_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aba926d1aa4129c5d0d930a0056cf040_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
aba926d1aa4129c5d0d930a0056cf040_NeikiAnalytics.exe
-
Size
91KB
-
MD5
aba926d1aa4129c5d0d930a0056cf040
-
SHA1
4d52717e0be03e1e360c8f0dd6a6b70a6c64fab2
-
SHA256
8586edd640b5c689e734ac15b252ae0d4715744f581a46b43d315d7b88730c83
-
SHA512
bc5e55ee282d321dd215020b9a0bd9a40ad3cd35cbb614a09a52def3f25f49361196217f3065752551246ce4aaf59c7c3726b4822d5c8b4a9221721558c6f1db
-
SSDEEP
1536:IYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nY:xdEUfKj8BYbDiC1ZTK7sxtLUIG3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemifuzv.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrpqch.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemcrvvy.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemipyqt.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzggdd.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhksjk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwhhur.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwbzxd.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemkuays.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemebhps.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjinli.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemgudhb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemcclcr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhxlfy.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdhplm.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjgxbb.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemldzad.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrokyw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemceigu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhmpov.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemqonon.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnenlj.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemidord.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemfdmco.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemnlxwk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemmqkvz.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemznbnw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwkieo.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemuhbom.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemcdnrf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemburww.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemcehip.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhmdmw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemtrnri.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemsbqtq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemhpgpw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemryfnx.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemoydwe.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemuvkan.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemsyjne.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemppoat.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemtpkpw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwlziu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemvpsix.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemwuuyw.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemlweoz.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemytbew.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemdvioo.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemvjmrj.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemsbdzh.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemrvjzr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemqxdfk.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemryvsf.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemjiipr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemynmpr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemfbras.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemmocox.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemolrjn.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemmajdr.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemfahfm.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemumobq.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemoccyy.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemasbce.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Sysqemzaavm.exe -
Executes dropped EXE 64 IoCs
pid Process 4700 Sysqemrwzay.exe 2444 Sysqemmnadn.exe 2972 Sysqemuzlew.exe 4904 Sysqemcdnrf.exe 3620 Sysqemhmdmw.exe 3696 Sysqemeccmx.exe 1552 Sysqemoydwe.exe 3756 Sysqemgudhb.exe 1844 Sysqemrahzd.exe 5080 Sysqembilfn.exe 4548 Sysqemmsbca.exe 3812 Sysqemmskuu.exe 3292 Sysqemzuqxx.exe 2404 Sysqemeknst.exe 2364 Sysqemoccyy.exe 3900 Sysqemuahfl.exe 1900 Sysqemznbnw.exe 3336 Sysqemmajdr.exe 4676 Sysqemlweoz.exe 3420 Sysqembqcgu.exe 4208 Sysqemosjbz.exe 1008 Sysqemburww.exe 4992 Sysqemwhhur.exe 3884 Sysqemlqbns.exe 1060 Sysqemowrdt.exe 2056 Sysqemjnlgi.exe 4468 Sysqemrokyw.exe 3492 Sysqembzawv.exe 5064 Sysqemjgxbb.exe 2972 Sysqemtrnri.exe 4788 Sysqemzptmz.exe 3968 Sysqemglekl.exe 4524 Sysqemwbzxd.exe 4312 Sysqemqxdfk.exe 468 Sysqemybnsb.exe 3392 Sysqembwqqo.exe 3868 Sysqemldvtk.exe 4392 Sysqemwkieo.exe 4400 Sysqemdvioo.exe 3680 Sysqemtpopj.exe 1520 Sysqemynmpr.exe 4912 Sysqemimzav.exe 3776 Sysqemjxnyv.exe 3992 Sysqemdhplm.exe 3052 Sysqemolrjn.exe 4544 Sysqemseiwq.exe 4824 Sysqemdxzho.exe 4716 Sysqemiyiuz.exe 2104 Sysqemolbpq.exe 1808 Sysqemqkqka.exe 3584 Sysqemnenlj.exe 5104 Sysqemqonon.exe 2912 Sysqemidord.exe 2516 Sysqemytbew.exe 4372 Sysqemsoomw.exe 4276 Sysqemxmlmd.exe 3980 Sysqemasbce.exe 408 Sysqemldzad.exe 3328 Sysqemkkpxu.exe 1068 Sysqemfbras.exe 3544 Sysqemipyqt.exe 1040 Sysqemvrnmq.exe 3144 Sysqemfgpoz.exe 3976 Sysqemifuzv.exe -
resource yara_rule behavioral2/memory/1900-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0008000000023413-6.dat upx behavioral2/memory/4700-37-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0008000000023412-42.dat upx behavioral2/files/0x0007000000023414-72.dat upx behavioral2/files/0x0007000000023415-107.dat upx behavioral2/files/0x0009000000023406-142.dat upx behavioral2/files/0x0007000000023416-177.dat upx behavioral2/memory/3620-179-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023418-213.dat upx behavioral2/files/0x0007000000023419-248.dat upx behavioral2/memory/1900-250-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2744-251-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4700-281-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000d000000023373-287.dat upx behavioral2/memory/3756-289-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2444-319-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002341b-325.dat upx behavioral2/memory/1844-327-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002341c-361.dat upx behavioral2/memory/2972-364-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x001900000002295c-398.dat upx behavioral2/memory/4548-400-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4904-406-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0003000000022994-437.dat upx behavioral2/memory/3620-443-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x00050000000006cf-473.dat upx behavioral2/memory/3696-475-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0008000000022ae4-509.dat upx behavioral2/memory/1552-512-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2744-546-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000f000000023372-548.dat upx behavioral2/memory/3756-579-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002341e-585.dat upx behavioral2/memory/1844-598-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x000700000002341f-622.dat upx behavioral2/memory/1900-624-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/5080-630-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4548-655-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3812-657-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023420-663.dat upx behavioral2/memory/3292-666-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2404-696-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/files/0x0007000000023421-702.dat upx behavioral2/memory/2364-707-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3900-738-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1900-799-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3336-833-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4676-867-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3420-877-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4208-935-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2056-941-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1008-970-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4992-1004-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3884-1038-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1060-1040-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2056-1073-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4468-1107-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4788-1113-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3492-1146-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/5064-1176-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2972-1244-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4788-1274-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/3968-1313-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcehip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsyjne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzlew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemznbnw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlqbns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhxlfy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmajdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemytbew.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemasbce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxzho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsoomw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsbdzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzggdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybuzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcdnrf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiyiuz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhdkqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrvjzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmocox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzuuwf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzuqxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempjppe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemryvsf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemburww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfbras.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrpqch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlznef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgudhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvrnmq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtpkpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembqcgu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkkpxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfdmco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjmrj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuujfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwuuyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoccgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybnsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdvioo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnenlj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsbqtq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcclcr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcmnaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhksjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhhur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhpgpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuygbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeccmx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeknst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxvkjr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfahfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczkpz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfgwhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcrvvy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjinli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoydwe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgxbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwkieo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqfcfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzaavm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmqkvz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrahzd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdhplm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemolbpq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4700 1900 aba926d1aa4129c5d0d930a0056cf040_NeikiAnalytics.exe 83 PID 1900 wrote to memory of 4700 1900 aba926d1aa4129c5d0d930a0056cf040_NeikiAnalytics.exe 83 PID 1900 wrote to memory of 4700 1900 aba926d1aa4129c5d0d930a0056cf040_NeikiAnalytics.exe 83 PID 4700 wrote to memory of 2444 4700 Sysqemrwzay.exe 84 PID 4700 wrote to memory of 2444 4700 Sysqemrwzay.exe 84 PID 4700 wrote to memory of 2444 4700 Sysqemrwzay.exe 84 PID 2444 wrote to memory of 2972 2444 Sysqemmnadn.exe 86 PID 2444 wrote to memory of 2972 2444 Sysqemmnadn.exe 86 PID 2444 wrote to memory of 2972 2444 Sysqemmnadn.exe 86 PID 2972 wrote to memory of 4904 2972 Sysqemuzlew.exe 88 PID 2972 wrote to memory of 4904 2972 Sysqemuzlew.exe 88 PID 2972 wrote to memory of 4904 2972 Sysqemuzlew.exe 88 PID 4904 wrote to memory of 3620 4904 Sysqemcdnrf.exe 89 PID 4904 wrote to memory of 3620 4904 Sysqemcdnrf.exe 89 PID 4904 wrote to memory of 3620 4904 Sysqemcdnrf.exe 89 PID 3620 wrote to memory of 3696 3620 Sysqemhmdmw.exe 90 PID 3620 wrote to memory of 3696 3620 Sysqemhmdmw.exe 90 PID 3620 wrote to memory of 3696 3620 Sysqemhmdmw.exe 90 PID 3696 wrote to memory of 1552 3696 Sysqemeccmx.exe 91 PID 3696 wrote to memory of 1552 3696 Sysqemeccmx.exe 91 PID 3696 wrote to memory of 1552 3696 Sysqemeccmx.exe 91 PID 2744 wrote to memory of 3756 2744 Sysqemchjhh.exe 93 PID 2744 wrote to memory of 3756 2744 Sysqemchjhh.exe 93 PID 2744 wrote to memory of 3756 2744 Sysqemchjhh.exe 93 PID 3756 wrote to memory of 1844 3756 Sysqemgudhb.exe 94 PID 3756 wrote to memory of 1844 3756 Sysqemgudhb.exe 94 PID 3756 wrote to memory of 1844 3756 Sysqemgudhb.exe 94 PID 1844 wrote to memory of 5080 1844 Sysqemrahzd.exe 95 PID 1844 wrote to memory of 5080 1844 Sysqemrahzd.exe 95 PID 1844 wrote to memory of 5080 1844 Sysqemrahzd.exe 95 PID 5080 wrote to memory of 4548 5080 Sysqembilfn.exe 97 PID 5080 wrote to memory of 4548 5080 Sysqembilfn.exe 97 PID 5080 wrote to memory of 4548 5080 Sysqembilfn.exe 97 PID 4548 wrote to memory of 3812 4548 Sysqemmsbca.exe 99 PID 4548 wrote to memory of 3812 4548 Sysqemmsbca.exe 99 PID 4548 wrote to memory of 3812 4548 Sysqemmsbca.exe 99 PID 3812 wrote to memory of 3292 3812 Sysqemmskuu.exe 100 PID 3812 wrote to memory of 3292 3812 Sysqemmskuu.exe 100 PID 3812 wrote to memory of 3292 3812 Sysqemmskuu.exe 100 PID 3292 wrote to memory of 2404 3292 Sysqemzuqxx.exe 101 PID 3292 wrote to memory of 2404 3292 Sysqemzuqxx.exe 101 PID 3292 wrote to memory of 2404 3292 Sysqemzuqxx.exe 101 PID 2404 wrote to memory of 2364 2404 Sysqemeknst.exe 103 PID 2404 wrote to memory of 2364 2404 Sysqemeknst.exe 103 PID 2404 wrote to memory of 2364 2404 Sysqemeknst.exe 103 PID 2364 wrote to memory of 3900 2364 Sysqemoccyy.exe 105 PID 2364 wrote to memory of 3900 2364 Sysqemoccyy.exe 105 PID 2364 wrote to memory of 3900 2364 Sysqemoccyy.exe 105 PID 3900 wrote to memory of 1900 3900 Sysqemuahfl.exe 106 PID 3900 wrote to memory of 1900 3900 Sysqemuahfl.exe 106 PID 3900 wrote to memory of 1900 3900 Sysqemuahfl.exe 106 PID 1900 wrote to memory of 3336 1900 Sysqemznbnw.exe 107 PID 1900 wrote to memory of 3336 1900 Sysqemznbnw.exe 107 PID 1900 wrote to memory of 3336 1900 Sysqemznbnw.exe 107 PID 3336 wrote to memory of 4676 3336 Sysqemmajdr.exe 108 PID 3336 wrote to memory of 4676 3336 Sysqemmajdr.exe 108 PID 3336 wrote to memory of 4676 3336 Sysqemmajdr.exe 108 PID 4676 wrote to memory of 3420 4676 Sysqemlweoz.exe 109 PID 4676 wrote to memory of 3420 4676 Sysqemlweoz.exe 109 PID 4676 wrote to memory of 3420 4676 Sysqemlweoz.exe 109 PID 3420 wrote to memory of 4208 3420 Sysqembqcgu.exe 111 PID 3420 wrote to memory of 4208 3420 Sysqembqcgu.exe 111 PID 3420 wrote to memory of 4208 3420 Sysqembqcgu.exe 111 PID 4208 wrote to memory of 1008 4208 Sysqemosjbz.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\aba926d1aa4129c5d0d930a0056cf040_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\aba926d1aa4129c5d0d930a0056cf040_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwzay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwzay.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnadn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnadn.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzlew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzlew.exe"4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcdnrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdnrf.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmdmw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmdmw.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeccmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeccmx.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoydwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoydwe.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchjhh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchjhh.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgudhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgudhb.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrahzd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrahzd.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\Sysqembilfn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembilfn.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmsbca.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsbca.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmskuu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmskuu.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzuqxx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzuqxx.exe"15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeknst.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeknst.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoccyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoccyy.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuahfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuahfl.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemznbnw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemznbnw.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmajdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmajdr.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlweoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlweoz.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\Sysqembqcgu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembqcgu.exe"22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemosjbz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemosjbz.exe"23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemburww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemburww.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhhur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhhur.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqbns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqbns.exe"26⤵
- Executes dropped EXE
- Modifies registry class
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemowrdt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowrdt.exe"27⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjnlgi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjnlgi.exe"28⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrokyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrokyw.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzawv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzawv.exe"30⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgxbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgxbb.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtrnri.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtrnri.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzptmz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzptmz.exe"33⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglekl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglekl.exe"34⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbzxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbzxd.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxdfk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxdfk.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybnsb.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwqqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwqqo.exe"38⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldvtk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldvtk.exe"39⤵
- Executes dropped EXE
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkieo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkieo.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtpopj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpopj.exe"42⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemynmpr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemynmpr.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemimzav.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemimzav.exe"44⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxnyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxnyv.exe"45⤵
- Executes dropped EXE
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdhplm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdhplm.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolrjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolrjn.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemseiwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemseiwq.exe"48⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxzho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxzho.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyiuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyiuz.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolbpq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolbpq.exe"51⤵
- Executes dropped EXE
- Modifies registry class
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqkqka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkqka.exe"52⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnenlj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnenlj.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqonon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqonon.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemidord.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemidord.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemytbew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytbew.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsoomw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsoomw.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxmlmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmlmd.exe"58⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemasbce.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemasbce.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldzad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldzad.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkkpxu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkkpxu.exe"61⤵
- Executes dropped EXE
- Modifies registry class
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfbras.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfbras.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemipyqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemipyqt.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvrnmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrnmq.exe"64⤵
- Executes dropped EXE
- Modifies registry class
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgpoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgpoz.exe"65⤵
- Executes dropped EXE
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemifuzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemifuzv.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqfcfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqfcfv.exe"67⤵
- Modifies registry class
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Sysqemamhqs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemamhqs.exe"68⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Sysqempjppe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjppe.exe"69⤵
- Modifies registry class
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfdmco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfdmco.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsbqtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbqtq.exe"71⤵
- Checks computer location settings
- Modifies registry class
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcehip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcehip.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemceigu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemceigu.exe"73⤵
- Checks computer location settings
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxvkjr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxvkjr.exe"74⤵
- Modifies registry class
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnlxwk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlxwk.exe"75⤵
- Checks computer location settings
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqipn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqipn.exe"76⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfahfm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfahfm.exe"77⤵
- Checks computer location settings
- Modifies registry class
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzmiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzmiq.exe"78⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvpsix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvpsix.exe"79⤵
- Checks computer location settings
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhdkqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhdkqx.exe"80⤵
- Modifies registry class
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkjzgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjzgy.exe"81⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvjmrj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjmrj.exe"82⤵
- Checks computer location settings
- Modifies registry class
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcclcr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcclcr.exe"83⤵
- Checks computer location settings
- Modifies registry class
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhpgpw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhpgpw.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuokfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuokfq.exe"85⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\Sysqemczkpz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczkpz.exe"86⤵
- Modifies registry class
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuvkan.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvkan.exe"87⤵
- Checks computer location settings
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfrlyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfrlyo.exe"88⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmpov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmpov.exe"89⤵
- Checks computer location settings
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmzkba.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmzkba.exe"90⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrpqch.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrpqch.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsbdzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbdzh.exe"92⤵
- Checks computer location settings
- Modifies registry class
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfgwhh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfgwhh.exe"93⤵
- Modifies registry class
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemruoqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemruoqp.exe"94⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcmnaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmnaf.exe"95⤵
- Modifies registry class
PID:744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsyjne.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsyjne.exe"96⤵
- Checks computer location settings
- Modifies registry class
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkuays.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkuays.exe"97⤵
- Checks computer location settings
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzggdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzggdd.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\Sysqemumobq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumobq.exe"99⤵
- Checks computer location settings
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhksjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhksjk.exe"100⤵
- Checks computer location settings
- Modifies registry class
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvjzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvjzr.exe"101⤵
- Checks computer location settings
- Modifies registry class
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemryvsf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryvsf.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemppoat.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppoat.exe"103⤵
- Checks computer location settings
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcrvvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrvvy.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuujfa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuujfa.exe"105⤵
- Modifies registry class
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\Sysqempaavm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempaavm.exe"106⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmqkvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmqkvz.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuygbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuygbf.exe"108⤵
- Modifies registry class
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmugmb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmugmb.exe"109⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\Sysqemebhps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebhps.exe"110⤵
- Checks computer location settings
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhxlfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxlfy.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzhzcs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhzcs.exe"112⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzaavm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzaavm.exe"113⤵
- Checks computer location settings
- Modifies registry class
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwuuyw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwuuyw.exe"114⤵
- Checks computer location settings
- Modifies registry class
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhqvie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhqvie.exe"115⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgfsnv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfsnv.exe"116⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjinli.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmocox.exe"118⤵
- Checks computer location settings
- Modifies registry class
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuhbom.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhbom.exe"119⤵
- Checks computer location settings
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzuuwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzuuwf.exe"120⤵
- Modifies registry class
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlznef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlznef.exe"121⤵
- Modifies registry class
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybuzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybuzc.exe"122⤵
- Modifies registry class
PID:3884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-