Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
35s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe
-
Size
101KB
-
MD5
bafbc9ca98fd86cf6fb56796bbcd1836
-
SHA1
fc24af7c227b08436f12a50ae8fb13d216491249
-
SHA256
7bb009ea97c466af7b9425c23c58b95863b0e9828dc89a75695ebd557da90137
-
SHA512
54b78222d41ae6d5583de93250ac731e600eb240a83be176062c956e8372da66d42b58e39f7afc52f3a33c53e1a3c3533073b39d5fb1b04b5585aff26f385cc5
-
SSDEEP
1536:a7zfMMknJvVvwlTHavNbA8w9KxlO9Lc3Otp15wKwYPpLKc:ufMbJOZHaV7wdZcm19w6pX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 38 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemccjee.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqempummb.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemkioal.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemofrlo.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemnerkd.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemxdwvz.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemxaujh.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqempfnbq.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemrqazn.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemhxhfl.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemwgahb.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemrugws.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqempyzro.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemztrha.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemfnzga.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemntkdj.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemnhszs.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemawgen.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemkajqg.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemwjiol.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemqdoui.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemxjdkg.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemxngnm.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemmfwyz.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemeimon.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemfxeni.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqembvgqw.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemblkok.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemehjnm.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemskoiz.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemfjlpy.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemtsbyp.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemhiycg.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemgrwxn.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemupubw.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemempfr.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation Sysqemwmjea.exe -
Executes dropped EXE 37 IoCs
pid Process 4356 Sysqemupubw.exe 3752 Sysqemqdoui.exe 3952 Sysqemnhszs.exe 4996 Sysqemnerkd.exe 3864 Sysqemxdwvz.exe 2856 Sysqemfxeni.exe 1144 Sysqemskoiz.exe 2440 Sysqemxaujh.exe 4712 Sysqemccjee.exe 4724 Sysqemawgen.exe 3912 Sysqemxjdkg.exe 3196 Sysqemfjlpy.exe 780 Sysqemkajqg.exe 2884 Sysqemfnzga.exe 4472 Sysqempfnbq.exe 3984 Sysqempummb.exe 2556 Sysqemntkdj.exe 4812 Sysqemrqazn.exe 1164 Sysqemxngnm.exe 3508 Sysqemkioal.exe 2968 Sysqemrugws.exe 3752 Sysqempyzro.exe 2456 Sysqembvgqw.exe 5056 Sysqemempfr.exe 440 Sysqemmfwyz.exe 116 Sysqemeimon.exe 1028 Sysqemwmjea.exe 2316 Sysqemwjiol.exe 2284 Sysqemztrha.exe 1432 Sysqemhiycg.exe 1972 Sysqemtsbyp.exe 3564 Sysqemblkok.exe 4976 Sysqemofrlo.exe 5084 Sysqemwgahb.exe 4912 Sysqemgrwxn.exe 4560 Sysqemhxhfl.exe 2472 Sysqemehjnm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 39 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxaujh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtsbyp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempyzro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhxhfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqdoui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfjlpy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxngnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmfwyz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwmjea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrwxn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemawgen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempummb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrqazn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxjdkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemntkdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhgvge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhiycg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemblkok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemupubw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhszs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemskoiz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemempfr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeimon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjiol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofrlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnerkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxdwvz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembvgqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemehjnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrugws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemztrha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwgahb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempfnbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkioal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfxeni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkajqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemccjee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfnzga.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4356 4180 NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe 84 PID 4180 wrote to memory of 4356 4180 NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe 84 PID 4180 wrote to memory of 4356 4180 NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe 84 PID 4356 wrote to memory of 3752 4356 Sysqemupubw.exe 85 PID 4356 wrote to memory of 3752 4356 Sysqemupubw.exe 85 PID 4356 wrote to memory of 3752 4356 Sysqemupubw.exe 85 PID 3752 wrote to memory of 3952 3752 Sysqemqdoui.exe 86 PID 3752 wrote to memory of 3952 3752 Sysqemqdoui.exe 86 PID 3752 wrote to memory of 3952 3752 Sysqemqdoui.exe 86 PID 3952 wrote to memory of 4996 3952 Sysqemnhszs.exe 89 PID 3952 wrote to memory of 4996 3952 Sysqemnhszs.exe 89 PID 3952 wrote to memory of 4996 3952 Sysqemnhszs.exe 89 PID 4996 wrote to memory of 3864 4996 Sysqemnerkd.exe 91 PID 4996 wrote to memory of 3864 4996 Sysqemnerkd.exe 91 PID 4996 wrote to memory of 3864 4996 Sysqemnerkd.exe 91 PID 3864 wrote to memory of 2856 3864 Sysqemxdwvz.exe 93 PID 3864 wrote to memory of 2856 3864 Sysqemxdwvz.exe 93 PID 3864 wrote to memory of 2856 3864 Sysqemxdwvz.exe 93 PID 2856 wrote to memory of 1144 2856 Sysqemfxeni.exe 94 PID 2856 wrote to memory of 1144 2856 Sysqemfxeni.exe 94 PID 2856 wrote to memory of 1144 2856 Sysqemfxeni.exe 94 PID 1144 wrote to memory of 2440 1144 Sysqemskoiz.exe 95 PID 1144 wrote to memory of 2440 1144 Sysqemskoiz.exe 95 PID 1144 wrote to memory of 2440 1144 Sysqemskoiz.exe 95 PID 2440 wrote to memory of 4712 2440 Sysqemxaujh.exe 96 PID 2440 wrote to memory of 4712 2440 Sysqemxaujh.exe 96 PID 2440 wrote to memory of 4712 2440 Sysqemxaujh.exe 96 PID 4712 wrote to memory of 4724 4712 Sysqemccjee.exe 98 PID 4712 wrote to memory of 4724 4712 Sysqemccjee.exe 98 PID 4712 wrote to memory of 4724 4712 Sysqemccjee.exe 98 PID 4724 wrote to memory of 3912 4724 Sysqemawgen.exe 99 PID 4724 wrote to memory of 3912 4724 Sysqemawgen.exe 99 PID 4724 wrote to memory of 3912 4724 Sysqemawgen.exe 99 PID 3912 wrote to memory of 3196 3912 Sysqemxjdkg.exe 100 PID 3912 wrote to memory of 3196 3912 Sysqemxjdkg.exe 100 PID 3912 wrote to memory of 3196 3912 Sysqemxjdkg.exe 100 PID 3196 wrote to memory of 780 3196 Sysqemfjlpy.exe 101 PID 3196 wrote to memory of 780 3196 Sysqemfjlpy.exe 101 PID 3196 wrote to memory of 780 3196 Sysqemfjlpy.exe 101 PID 780 wrote to memory of 2884 780 Sysqemkajqg.exe 104 PID 780 wrote to memory of 2884 780 Sysqemkajqg.exe 104 PID 780 wrote to memory of 2884 780 Sysqemkajqg.exe 104 PID 2884 wrote to memory of 4472 2884 Sysqemfnzga.exe 105 PID 2884 wrote to memory of 4472 2884 Sysqemfnzga.exe 105 PID 2884 wrote to memory of 4472 2884 Sysqemfnzga.exe 105 PID 4472 wrote to memory of 3984 4472 Sysqempfnbq.exe 106 PID 4472 wrote to memory of 3984 4472 Sysqempfnbq.exe 106 PID 4472 wrote to memory of 3984 4472 Sysqempfnbq.exe 106 PID 3984 wrote to memory of 2556 3984 Sysqempummb.exe 175 PID 3984 wrote to memory of 2556 3984 Sysqempummb.exe 175 PID 3984 wrote to memory of 2556 3984 Sysqempummb.exe 175 PID 2556 wrote to memory of 4812 2556 Sysqemntkdj.exe 109 PID 2556 wrote to memory of 4812 2556 Sysqemntkdj.exe 109 PID 2556 wrote to memory of 4812 2556 Sysqemntkdj.exe 109 PID 4812 wrote to memory of 1164 4812 Sysqemrqazn.exe 110 PID 4812 wrote to memory of 1164 4812 Sysqemrqazn.exe 110 PID 4812 wrote to memory of 1164 4812 Sysqemrqazn.exe 110 PID 1164 wrote to memory of 3508 1164 Sysqemxngnm.exe 111 PID 1164 wrote to memory of 3508 1164 Sysqemxngnm.exe 111 PID 1164 wrote to memory of 3508 1164 Sysqemxngnm.exe 111 PID 4228 wrote to memory of 2968 4228 Sysqemhgvge.exe 113 PID 4228 wrote to memory of 2968 4228 Sysqemhgvge.exe 113 PID 4228 wrote to memory of 2968 4228 Sysqemhgvge.exe 113 PID 2968 wrote to memory of 3752 2968 Sysqemrugws.exe 198
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bafbc9ca98fd86cf6fb56796bbcd1836_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\Sysqemupubw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemupubw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqdoui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqdoui.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnerkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnerkd.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxdwvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdwvz.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxeni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxeni.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemskoiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemskoiz.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxaujh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxaujh.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemccjee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemccjee.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawgen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawgen.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjdkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjdkg.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfjlpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjlpy.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkajqg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkajqg.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfnzga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfnzga.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfnbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfnbq.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\Sysqempummb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempummb.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\Sysqempuwjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempuwjg.exe"18⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrqazn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrqazn.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxngnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxngnm.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkioal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkioal.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhgvge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhgvge.exe"22⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrugws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrugws.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgtua.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgtua.exe"24⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhvdss.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhvdss.exe"25⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemempfr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemempfr.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfwyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfwyz.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeimon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeimon.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmjea.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmjea.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjiol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjiol.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwyhho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwyhho.exe"31⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhiycg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhiycg.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsbyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsbyp.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Sysqemblkok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemblkok.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwxts.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwxts.exe"35⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwgahb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgahb.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlpnmv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlpnmv.exe"37⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmemxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmemxy.exe"38⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemehjnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehjnm.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqyooa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyooa.exe"40⤵PID:420
-
C:\Users\Admin\AppData\Local\Temp\Sysqemooabh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemooabh.exe"41⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjycwy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjycwy.exe"42⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrrbcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrbcf.exe"43⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtfodf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtfodf.exe"44⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemofrlo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofrlo.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemouqwr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemouqwr.exe"46⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlvbog.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvbog.exe"47⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjpypq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpypq.exe"48⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemejmku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejmku.exe"49⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwvbah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwvbah.exe"50⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtsjnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsjnu.exe"51⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\Sysqembpdqr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembpdqr.exe"52⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyjart.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyjart.exe"53⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgrwxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrwxn.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqgyfa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgyfa.exe"55⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgrfqy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrfqy.exe"56⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\Sysqembrayy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrayy.exe"57⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnafyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnafyv.exe"58⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\Sysqemglcwi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglcwi.exe"59⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlbjcb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbjcb.exe"60⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemivgdd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivgdd.exe"61⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyebax.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyebax.exe"62⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemganln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemganln.exe"63⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqmlbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmlbi.exe"64⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkkcjo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkkcjo.exe"65⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\Sysqemipbxh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemipbxh.exe"66⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcvszc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvszc.exe"67⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxmtcz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxmtcz.exe"68⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvrtpk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrtpk.exe"69⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsdoli.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdoli.exe"70⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqykyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqykyy.exe"71⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkpmbv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpmbv.exe"72⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\Sysqemibhol.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemibhol.exe"73⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdpqeg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdpqeg.exe"74⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaximt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaximt.exe"75⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhutjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhutjf.exe"76⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemabxcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabxcv.exe"77⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvwbsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvwbsn.exe"78⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsqxfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqxfl.exe"79⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlbmdx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbmdx.exe"80⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiytly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiytly.exe"81⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxhlll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhlll.exe"82⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Sysqempkzvn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempkzvn.exe"83⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Sysqemntkdj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntkdj.exe"84⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqtjh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqtjh.exe"85⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Sysqemumttv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumttv.exe"86⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Sysqempdmws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdmws.exe"87⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemniurd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemniurd.exe"88⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfmice.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmice.exe"89⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxainb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxainb.exe"90⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrdncb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdncb.exe"91⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnfsfk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnfsfk.exe"92⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhzxvk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzxvk.exe"93⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcrrqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrrqz.exe"94⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxtegz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtegz.exe"95⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\Sysqempesmt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempesmt.exe"96⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkvmgq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvmgq.exe"97⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcvxeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvxeh.exe"98⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuvakg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuvakg.exe"99⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhxhfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxhfl.exe"100⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcojaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcojaa.exe"101⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\Sysqemusvap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemusvap.exe"102⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\Sysqempjpvm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjpvm.exe"103⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfzjie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzjie.exe"104⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzqdlt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzqdlt.exe"105⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuwtow.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwtow.exe"106⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Sysqempyzro.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempyzro.exe"107⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkpsud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpsud.exe"108⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhcohb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhcohb.exe"109⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzyory.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzyory.exe"110⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsuokm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsuokm.exe"111⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmsefp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsefp.exe"112⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhkyim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkyim.exe"113⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfpfdw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfpfdw.exe"114⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxrvx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxrvx.exe"115⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmxctw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxctw.exe"116⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhctjr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhctjr.exe"117⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcfzeu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfzeu.exe"118⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrzxep.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzxep.exe"119⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwepmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwepmx.exe"120⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrzuup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzuup.exe"121⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmjzxh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjzxh.exe"122⤵PID:2220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-