Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe
-
Size
540KB
-
MD5
6cbf3b2883d6ab9169dd2d00fc638ca0
-
SHA1
3ea9f274514288bc23f8ad30353485dd60da5617
-
SHA256
07cd326b90d9de798c312b23c58e3b18558c093068e768b4fd65540eb99bf187
-
SHA512
40798fce999884213fbbe893880f9b16dfd1ed49f2f83baddb2e1ffeb38e212315a23904822f63858586e69fb8a1ef0fbb38a21c83bab98ecb7a0e6c4a888697
-
SSDEEP
3072:qCaoAs101Pol0xPTM7mRCAdJSSxPUkl3V4Vh1q+MQTCk/dN92sdNhavtrVdewnA6:qqDAwl0xPTMiR9JSSxPUKuqododHYC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemivgdd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemtywaq.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemgivmo.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemilzxz.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemapird.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemwmpwg.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemqkatd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemswjmn.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemieyxn.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemfesas.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemdkhhz.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemuwgcc.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemvvecm.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemeqpdo.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemoswrb.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemrtsoa.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemuohkw.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemblhap.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemlcaji.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemyljoq.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemucyfc.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemonyub.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemidfyi.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqembmjiw.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemtvkvr.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemhhbvf.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemoodbc.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemsyblz.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemcwded.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemmhojq.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemtqcsk.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqembxdzo.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemzclbn.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemjsdop.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemwlziu.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemtshvq.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemlyypy.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemlmlpg.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemiyadz.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemhpwqh.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemkwvfx.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemzwnhy.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemrrswu.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemoclbn.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemgsdpv.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemdjuau.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemsgjtw.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqembertv.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemzuuwf.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemxznjz.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemhdefd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemrwyvu.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemqsfby.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemvgbtb.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemwhywc.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemgwkid.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemmrzve.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemdseed.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemnpnpd.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemrzjsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemtlozu.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemhfzmb.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Sysqemuvpns.exe -
Executes dropped EXE 64 IoCs
pid Process 1656 Sysqemrzjsc.exe 1740 Sysqemoxisv.exe 4140 Sysqemralqh.exe 1084 Sysqemwbuly.exe 2400 Sysqemhtjqc.exe 4920 Sysqemjdjgv.exe 1360 Sysqemhmtoq.exe 2108 Sysqemhxfge.exe 4716 Sysqempqegl.exe 4648 Sysqemeccmx.exe 5112 Sysqemchjhh.exe 4496 Sysqemwydcf.exe 4548 Sysqemmdmpd.exe 2724 Sysqemjmexq.exe 1596 Sysqemtagas.exe 1212 Sysqembertv.exe 1112 Sysqemjbbyt.exe 2396 Sysqemwditq.exe 2308 Sysqemgkneu.exe 4712 Sysqemhkwjf.exe 1688 Sysqemjfarm.exe 1152 Sysqemwhhur.exe 1208 Sysqemmmqap.exe 1892 Sysqemtqcsk.exe 4136 Sysqemeqpdo.exe 1364 Sysqemmfdbm.exe 3060 Sysqemyohww.exe 220 Sysqemtcxmj.exe 2208 Sysqemlcaji.exe 4276 Sysqemofehu.exe 1528 Sysqemdfyzv.exe 3512 Sysqemtywaq.exe 4316 Sysqemoqodu.exe 380 Sysqemawhdc.exe 4488 Sysqemtshvq.exe 2708 Sysqemguwqv.exe 3564 Sysqemtwdls.exe 1984 Sysqemoclbn.exe 4260 Sysqemonyub.exe 3852 Sysqemdkhhz.exe 1612 Sysqemiinzh.exe 412 Sysqemgrxhu.exe 3100 Sysqemrnzfv.exe 1244 Sysqembxyvu.exe 3164 Sysqemdpqyy.exe 3176 Sysqemoodbc.exe 1056 Sysqemlmlpg.exe 1036 Sysqemgsdpv.exe 4496 Sysqemlukks.exe 2436 Sysqemqkqka.exe 1240 Sysqemdjuau.exe 1272 Sysqemvxmlq.exe 2460 Sysqemvjyde.exe 2732 Sysqemgezwu.exe 4912 Sysqemiknyj.exe 3816 Sysqemgivmo.exe 2256 Sysqemyljoq.exe 2060 Sysqemvuuxl.exe 4028 Sysqemtdefz.exe 1212 Sysqemilzxz.exe 3684 Sysqemalkvy.exe 1676 Sysqemtsnnp.exe 4548 Sysqemapyls.exe 2956 Sysqemvcobn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoxisv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgsdpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgivmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfptzm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchjhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvuuxl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsgjtw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwvfx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnpnpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcrdji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxuyqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemoromu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtsnnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcwyay.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmrzve.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemplblj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhtjqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjdjgv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhxfge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhhur.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofehu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemefpua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuohkw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmqap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemckljp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgolzg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlyypy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembuvxb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhywc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfeybu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwditq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhoewn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeyfqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlcaji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiknyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemylgzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmzwai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembertv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlukks.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemucyfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemevtng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzclbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrwyvu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwpffh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemonyub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlmlpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlfcji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhdefd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxzxbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcfonv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemixfeu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempxehm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwfly.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvjyde.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrxhu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcsfqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsqmiy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdtnwv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqemy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtwdls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtdefz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemilzxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhhbvf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1656 1904 6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe 81 PID 1904 wrote to memory of 1656 1904 6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe 81 PID 1904 wrote to memory of 1656 1904 6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe 81 PID 1656 wrote to memory of 1740 1656 Sysqemrzjsc.exe 83 PID 1656 wrote to memory of 1740 1656 Sysqemrzjsc.exe 83 PID 1656 wrote to memory of 1740 1656 Sysqemrzjsc.exe 83 PID 1740 wrote to memory of 4140 1740 Sysqemoxisv.exe 86 PID 1740 wrote to memory of 4140 1740 Sysqemoxisv.exe 86 PID 1740 wrote to memory of 4140 1740 Sysqemoxisv.exe 86 PID 4140 wrote to memory of 1084 4140 Sysqemralqh.exe 88 PID 4140 wrote to memory of 1084 4140 Sysqemralqh.exe 88 PID 4140 wrote to memory of 1084 4140 Sysqemralqh.exe 88 PID 1084 wrote to memory of 2400 1084 Sysqemwbuly.exe 89 PID 1084 wrote to memory of 2400 1084 Sysqemwbuly.exe 89 PID 1084 wrote to memory of 2400 1084 Sysqemwbuly.exe 89 PID 2400 wrote to memory of 4920 2400 Sysqemhtjqc.exe 90 PID 2400 wrote to memory of 4920 2400 Sysqemhtjqc.exe 90 PID 2400 wrote to memory of 4920 2400 Sysqemhtjqc.exe 90 PID 4920 wrote to memory of 1360 4920 Sysqemjdjgv.exe 91 PID 4920 wrote to memory of 1360 4920 Sysqemjdjgv.exe 91 PID 4920 wrote to memory of 1360 4920 Sysqemjdjgv.exe 91 PID 1360 wrote to memory of 2108 1360 Sysqemhmtoq.exe 92 PID 1360 wrote to memory of 2108 1360 Sysqemhmtoq.exe 92 PID 1360 wrote to memory of 2108 1360 Sysqemhmtoq.exe 92 PID 2108 wrote to memory of 4716 2108 Sysqemhxfge.exe 93 PID 2108 wrote to memory of 4716 2108 Sysqemhxfge.exe 93 PID 2108 wrote to memory of 4716 2108 Sysqemhxfge.exe 93 PID 4716 wrote to memory of 4648 4716 Sysqempqegl.exe 94 PID 4716 wrote to memory of 4648 4716 Sysqempqegl.exe 94 PID 4716 wrote to memory of 4648 4716 Sysqempqegl.exe 94 PID 4648 wrote to memory of 5112 4648 Sysqemeccmx.exe 95 PID 4648 wrote to memory of 5112 4648 Sysqemeccmx.exe 95 PID 4648 wrote to memory of 5112 4648 Sysqemeccmx.exe 95 PID 5112 wrote to memory of 4496 5112 Sysqemchjhh.exe 96 PID 5112 wrote to memory of 4496 5112 Sysqemchjhh.exe 96 PID 5112 wrote to memory of 4496 5112 Sysqemchjhh.exe 96 PID 4496 wrote to memory of 4548 4496 Sysqemwydcf.exe 97 PID 4496 wrote to memory of 4548 4496 Sysqemwydcf.exe 97 PID 4496 wrote to memory of 4548 4496 Sysqemwydcf.exe 97 PID 4548 wrote to memory of 2724 4548 Sysqemmdmpd.exe 98 PID 4548 wrote to memory of 2724 4548 Sysqemmdmpd.exe 98 PID 4548 wrote to memory of 2724 4548 Sysqemmdmpd.exe 98 PID 2724 wrote to memory of 1596 2724 Sysqemjmexq.exe 99 PID 2724 wrote to memory of 1596 2724 Sysqemjmexq.exe 99 PID 2724 wrote to memory of 1596 2724 Sysqemjmexq.exe 99 PID 1596 wrote to memory of 1212 1596 Sysqemtagas.exe 100 PID 1596 wrote to memory of 1212 1596 Sysqemtagas.exe 100 PID 1596 wrote to memory of 1212 1596 Sysqemtagas.exe 100 PID 1212 wrote to memory of 1112 1212 Sysqembertv.exe 101 PID 1212 wrote to memory of 1112 1212 Sysqembertv.exe 101 PID 1212 wrote to memory of 1112 1212 Sysqembertv.exe 101 PID 1112 wrote to memory of 2396 1112 Sysqemjbbyt.exe 102 PID 1112 wrote to memory of 2396 1112 Sysqemjbbyt.exe 102 PID 1112 wrote to memory of 2396 1112 Sysqemjbbyt.exe 102 PID 2396 wrote to memory of 2308 2396 Sysqemwditq.exe 103 PID 2396 wrote to memory of 2308 2396 Sysqemwditq.exe 103 PID 2396 wrote to memory of 2308 2396 Sysqemwditq.exe 103 PID 2308 wrote to memory of 4712 2308 Sysqemgkneu.exe 104 PID 2308 wrote to memory of 4712 2308 Sysqemgkneu.exe 104 PID 2308 wrote to memory of 4712 2308 Sysqemgkneu.exe 104 PID 4712 wrote to memory of 1688 4712 Sysqemhkwjf.exe 105 PID 4712 wrote to memory of 1688 4712 Sysqemhkwjf.exe 105 PID 4712 wrote to memory of 1688 4712 Sysqemhkwjf.exe 105 PID 1688 wrote to memory of 1152 1688 Sysqemjfarm.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6cbf3b2883d6ab9169dd2d00fc638ca0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzjsc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzjsc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoxisv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxisv.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemralqh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemralqh.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwbuly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwbuly.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtjqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtjqc.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjdjgv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjdjgv.exe"7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmtoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmtoq.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhxfge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxfge.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Sysqempqegl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqegl.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeccmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeccmx.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchjhh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchjhh.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwydcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwydcf.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmdmpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmdmpd.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjmexq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjmexq.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtagas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtagas.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Sysqembertv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembertv.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbbyt.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwditq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwditq.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgkneu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkneu.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkwjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkwjf.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjfarm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfarm.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhhur.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhhur.exe"23⤵
- Executes dropped EXE
- Modifies registry class
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmqap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmqap.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqcsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqcsk.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqpdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqpdo.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfdbm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfdbm.exe"27⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyohww.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyohww.exe"28⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtcxmj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtcxmj.exe"29⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcaji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcaji.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofehu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofehu.exe"31⤵
- Executes dropped EXE
- Modifies registry class
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfyzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfyzv.exe"32⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtywaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtywaq.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqodu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqodu.exe"34⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawhdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawhdc.exe"35⤵
- Executes dropped EXE
PID:380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtshvq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtshvq.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguwqv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguwqv.exe"37⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtwdls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtwdls.exe"38⤵
- Executes dropped EXE
- Modifies registry class
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoclbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoclbn.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemonyub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemonyub.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdkhhz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdkhhz.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiinzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiinzh.exe"42⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"43⤵
- Executes dropped EXE
- Modifies registry class
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrnzfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrnzfv.exe"44⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxyvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxyvu.exe"45⤵
- Executes dropped EXE
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdpqyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpqyy.exe"46⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoodbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoodbc.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmlpg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmlpg.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgsdpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgsdpv.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlukks.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlukks.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqkqka.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkqka.exe"51⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdjuau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdjuau.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxmlq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxmlq.exe"53⤵
- Executes dropped EXE
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjyde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjyde.exe"54⤵
- Executes dropped EXE
- Modifies registry class
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgezwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgezwu.exe"55⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiknyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiknyj.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgivmo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgivmo.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyljoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyljoq.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvuuxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvuuxl.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtdefz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtdefz.exe"60⤵
- Executes dropped EXE
- Modifies registry class
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilzxz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilzxz.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemalkvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemalkvy.exe"62⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsnnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsnnp.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Sysqemapyls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapyls.exe"64⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcobn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcobn.exe"65⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgbtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgbtb.exe"66⤵
- Checks computer location settings
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqujjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqujjw.exe"67⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\Sysqempqcph.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqcph.exe"68⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapird.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapird.exe"69⤵
- Checks computer location settings
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfexj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfexj.exe"70⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcwyay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwyay.exe"71⤵
- Modifies registry class
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Sysqemabfnr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabfnr.exe"72⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsbqtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbqtq.exe"73⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkatd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkatd.exe"74⤵
- Checks computer location settings
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiyadz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiyadz.exe"75⤵
- Checks computer location settings
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Sysqemupwyc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupwyc.exe"76⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxzxbg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxzxbg.exe"77⤵
- Modifies registry class
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfptzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfptzm.exe"78⤵
- Modifies registry class
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemagncb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagncb.exe"79⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemntgfa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntgfa.exe"80⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcypky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcypky.exe"81⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsyblz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsyblz.exe"82⤵
- Checks computer location settings
PID:8 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcfonv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfonv.exe"83⤵
- Modifies registry class
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemufrlu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemufrlu.exe"84⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsgjtw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgjtw.exe"85⤵
- Checks computer location settings
- Modifies registry class
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckljp.exe"86⤵
- Modifies registry class
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Sysqemixfeu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemixfeu.exe"87⤵
- Modifies registry class
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemucyfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemucyfc.exe"88⤵
- Checks computer location settings
- Modifies registry class
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwvfx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwvfx.exe"89⤵
- Checks computer location settings
- Modifies registry class
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrzve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrzve.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemztoqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztoqb.exe"91⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrtsoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtsoa.exe"92⤵
- Checks computer location settings
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsfqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsfqw.exe"93⤵
- Modifies registry class
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfzmb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfzmb.exe"94⤵
- Checks computer location settings
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxgxew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgxew.exe"95⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcwded.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcwded.exe"96⤵
- Checks computer location settings
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwgcc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwgcc.exe"97⤵
- Checks computer location settings
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemevtng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemevtng.exe"98⤵
- Modifies registry class
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsqmiy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqmiy.exe"99⤵
- Modifies registry class
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmoclb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmoclb.exe"100⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzclbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzclbn.exe"101⤵
- Checks computer location settings
- Modifies registry class
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutmek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutmek.exe"102⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjczwl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjczwl.exe"103⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhoewn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhoewn.exe"104⤵
- Modifies registry class
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Sysqembuvxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembuvxb.exe"105⤵
- Modifies registry class
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhdefd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhdefd.exe"106⤵
- Checks computer location settings
- Modifies registry class
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemplblj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplblj.exe"107⤵
- Modifies registry class
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhhbvf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhhbvf.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxbyvb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxbyvb.exe"109⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjgrwa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgrwa.exe"110⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjsdop.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjsdop.exe"111⤵
- Checks computer location settings
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrguo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrguo.exe"112⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzwnhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwnhy.exe"113⤵
- Checks computer location settings
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuohkw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuohkw.exe"114⤵
- Checks computer location settings
- Modifies registry class
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklqxu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklqxu.exe"115⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvpns.exe"116⤵
- Checks computer location settings
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwyvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwyvu.exe"117⤵
- Checks computer location settings
- Modifies registry class
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeyfqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeyfqz.exe"118⤵
- Modifies registry class
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemraulw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemraulw.exe"119⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzuuwf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzuuwf.exe"120⤵
- Checks computer location settings
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlozu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlozu.exe"121⤵
- Checks computer location settings
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmhojq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmhojq.exe"122⤵
- Checks computer location settings
PID:4008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-