Analysis
-
max time kernel
62s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
ba00560ddce6c3a5a5407ecd7f8af7b0
-
SHA1
803a01a240595c15e95ad233f374290569705316
-
SHA256
533bb53c37537a18a88a9196cf7b0737279f3a92f01a7275e2ad66d4bd8c399d
-
SHA512
df9407e985b360248046676351812fe2cb5adbdeeed55f6f5e886cfb63f92d46ce956ec84ef9bdc37fbec80fc2f65f48c66cbe37b2cc4d56679e018eefff9c8c
-
SSDEEP
1536:qzfMMkPZE1J7S6/PMj42VJEY4ujMepJtANuOAl0QQsIEySYndfcE:wfMNE1JG6XMk27EbpOthl0ZUed0E
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 46 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemeputi.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemdmriw.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemshlbc.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemzdlmq.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemyfvlu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemtmzuz.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemyfnfo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemksnqk.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemabykw.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemystyo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemgevoz.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembskbe.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembrayy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqempjwtr.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemhutjf.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemtlywi.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemfuyhu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembtwhr.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemdbxdr.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemltkdp.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemyeqmi.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembwjvy.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemlojbn.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemntrug.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemiwowc.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemrpacl.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemmspyo.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemqmlbi.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemlqzhs.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemqzqiu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemazfqe.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemuyfwu.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemolxkd.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemhaowc.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemwhmll.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemwisge.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqembagla.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemnhsxq.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemuzheb.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemeqkqh.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemodnjs.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemiqbuj.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemquwie.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqempwdfs.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Sysqemmkfyd.exe -
Executes dropped EXE 46 IoCs
pid Process 5104 Sysqemuzheb.exe 3224 Sysqempwdfs.exe 3288 Sysqemeqkqh.exe 1528 Sysqemuyfwu.exe 5036 Sysqemhaowc.exe 3924 Sysqemzdlmq.exe 4492 Sysqemrpacl.exe 1540 Sysqemmkfyd.exe 1856 Sysqemyfvlu.exe 988 Sysqemmspyo.exe 4668 Sysqemtlywi.exe 3380 Sysqembtwhr.exe 3844 Sysqemltkdp.exe 4516 Sysqemwhmll.exe 2908 Sysqemodnjs.exe 3792 Sysqemeputi.exe 4560 Sysqemolxkd.exe 4668 Sysqemdmriw.exe 3372 Sysqemwisge.exe 2932 Sysqemgevoz.exe 3284 Sysqembskbe.exe 364 Sysqemyeqmi.exe 1480 Sysqembwjvy.exe 3572 Sysqembagla.exe 4960 Sysqemlojbn.exe 4068 Sysqemiqbuj.exe 2984 Sysqemabykw.exe 4988 Sysqemnhsxq.exe 2248 Sysqembrayy.exe 460 Sysqemystyo.exe 3380 Sysqemtmzuz.exe 4696 Sysqemntrug.exe 2304 Sysqemlqzhs.exe 1368 Sysqemqzqiu.exe 536 Sysqemdbxdr.exe 5080 Sysqemazfqe.exe 1000 Sysqemiwowc.exe 3152 Sysqemqmlbi.exe 5116 Sysqemfuyhu.exe 1152 Sysqemyfnfo.exe 4172 Sysqemquwie.exe 2956 Sysqemksnqk.exe 4784 Sysqemshlbc.exe 1108 Sysqempjwtr.exe 1036 Sysqemhutjf.exe 2532 Sysqemaufup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqmlbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzdlmq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhaowc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgevoz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshlbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhutjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeqkqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdmriw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembagla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiqbuj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfuyhu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyfnfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmspyo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembtwhr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltkdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemolxkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhsxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdbxdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempjwtr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuyfwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeputi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembskbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemystyo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqzqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemquwie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemksnqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzheb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyfvlu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwhmll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyeqmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemabykw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembrayy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtmzuz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemntrug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembwjvy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlojbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlqzhs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemazfqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodnjs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrpacl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmkfyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtlywi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwisge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiwowc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempwdfs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 5104 5080 ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe 90 PID 5080 wrote to memory of 5104 5080 ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe 90 PID 5080 wrote to memory of 5104 5080 ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe 90 PID 5104 wrote to memory of 3224 5104 Sysqemuzheb.exe 91 PID 5104 wrote to memory of 3224 5104 Sysqemuzheb.exe 91 PID 5104 wrote to memory of 3224 5104 Sysqemuzheb.exe 91 PID 3224 wrote to memory of 3288 3224 Sysqempwdfs.exe 92 PID 3224 wrote to memory of 3288 3224 Sysqempwdfs.exe 92 PID 3224 wrote to memory of 3288 3224 Sysqempwdfs.exe 92 PID 3288 wrote to memory of 1528 3288 Sysqemeqkqh.exe 93 PID 3288 wrote to memory of 1528 3288 Sysqemeqkqh.exe 93 PID 3288 wrote to memory of 1528 3288 Sysqemeqkqh.exe 93 PID 1528 wrote to memory of 5036 1528 Sysqemuyfwu.exe 94 PID 1528 wrote to memory of 5036 1528 Sysqemuyfwu.exe 94 PID 1528 wrote to memory of 5036 1528 Sysqemuyfwu.exe 94 PID 5036 wrote to memory of 3924 5036 Sysqemhaowc.exe 95 PID 5036 wrote to memory of 3924 5036 Sysqemhaowc.exe 95 PID 5036 wrote to memory of 3924 5036 Sysqemhaowc.exe 95 PID 3924 wrote to memory of 4492 3924 Sysqemzdlmq.exe 96 PID 3924 wrote to memory of 4492 3924 Sysqemzdlmq.exe 96 PID 3924 wrote to memory of 4492 3924 Sysqemzdlmq.exe 96 PID 4492 wrote to memory of 1540 4492 Sysqemrpacl.exe 97 PID 4492 wrote to memory of 1540 4492 Sysqemrpacl.exe 97 PID 4492 wrote to memory of 1540 4492 Sysqemrpacl.exe 97 PID 1540 wrote to memory of 1856 1540 Sysqemmkfyd.exe 100 PID 1540 wrote to memory of 1856 1540 Sysqemmkfyd.exe 100 PID 1540 wrote to memory of 1856 1540 Sysqemmkfyd.exe 100 PID 1856 wrote to memory of 988 1856 Sysqemyfvlu.exe 101 PID 1856 wrote to memory of 988 1856 Sysqemyfvlu.exe 101 PID 1856 wrote to memory of 988 1856 Sysqemyfvlu.exe 101 PID 988 wrote to memory of 4668 988 Sysqemmspyo.exe 115 PID 988 wrote to memory of 4668 988 Sysqemmspyo.exe 115 PID 988 wrote to memory of 4668 988 Sysqemmspyo.exe 115 PID 4668 wrote to memory of 3380 4668 Sysqemtlywi.exe 129 PID 4668 wrote to memory of 3380 4668 Sysqemtlywi.exe 129 PID 4668 wrote to memory of 3380 4668 Sysqemtlywi.exe 129 PID 3380 wrote to memory of 3844 3380 Sysqembtwhr.exe 106 PID 3380 wrote to memory of 3844 3380 Sysqembtwhr.exe 106 PID 3380 wrote to memory of 3844 3380 Sysqembtwhr.exe 106 PID 3844 wrote to memory of 4516 3844 Sysqemltkdp.exe 109 PID 3844 wrote to memory of 4516 3844 Sysqemltkdp.exe 109 PID 3844 wrote to memory of 4516 3844 Sysqemltkdp.exe 109 PID 4516 wrote to memory of 2908 4516 Sysqemwhmll.exe 110 PID 4516 wrote to memory of 2908 4516 Sysqemwhmll.exe 110 PID 4516 wrote to memory of 2908 4516 Sysqemwhmll.exe 110 PID 2908 wrote to memory of 3792 2908 Sysqemodnjs.exe 111 PID 2908 wrote to memory of 3792 2908 Sysqemodnjs.exe 111 PID 2908 wrote to memory of 3792 2908 Sysqemodnjs.exe 111 PID 3792 wrote to memory of 4560 3792 Sysqemeputi.exe 113 PID 3792 wrote to memory of 4560 3792 Sysqemeputi.exe 113 PID 3792 wrote to memory of 4560 3792 Sysqemeputi.exe 113 PID 4560 wrote to memory of 4668 4560 Sysqemolxkd.exe 115 PID 4560 wrote to memory of 4668 4560 Sysqemolxkd.exe 115 PID 4560 wrote to memory of 4668 4560 Sysqemolxkd.exe 115 PID 4668 wrote to memory of 3372 4668 Sysqemdmriw.exe 116 PID 4668 wrote to memory of 3372 4668 Sysqemdmriw.exe 116 PID 4668 wrote to memory of 3372 4668 Sysqemdmriw.exe 116 PID 3372 wrote to memory of 2932 3372 Sysqemwisge.exe 117 PID 3372 wrote to memory of 2932 3372 Sysqemwisge.exe 117 PID 3372 wrote to memory of 2932 3372 Sysqemwisge.exe 117 PID 2932 wrote to memory of 3284 2932 Sysqemgevoz.exe 118 PID 2932 wrote to memory of 3284 2932 Sysqemgevoz.exe 118 PID 2932 wrote to memory of 3284 2932 Sysqemgevoz.exe 118 PID 3284 wrote to memory of 364 3284 Sysqembskbe.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ba00560ddce6c3a5a5407ecd7f8af7b0_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzheb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzheb.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\Sysqempwdfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempwdfs.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeqkqh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeqkqh.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyfwu.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhaowc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhaowc.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzdlmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzdlmq.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrpacl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrpacl.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmkfyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkfyd.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfvlu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfvlu.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmspyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmspyo.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtlywi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlywi.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtwhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtwhr.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltkdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltkdp.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhmll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhmll.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodnjs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodnjs.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeputi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeputi.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolxkd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolxkd.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdmriw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmriw.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwisge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwisge.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgevoz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgevoz.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Sysqembskbe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembskbe.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyeqmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyeqmi.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:364 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwjvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwjvy.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Sysqembagla.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembagla.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlojbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlojbn.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiqbuj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqbuj.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemabykw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemabykw.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhsxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhsxq.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Sysqembrayy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembrayy.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemystyo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemystyo.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtmzuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtmzuz.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemntrug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemntrug.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlqzhs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlqzhs.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzqiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzqiu.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdbxdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdbxdr.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemazfqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemazfqe.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwowc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwowc.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmlbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmlbi.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfuyhu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfuyhu.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfnfo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfnfo.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemquwie.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemquwie.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemksnqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemksnqk.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemshlbc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshlbc.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\Sysqempjwtr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjwtr.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhutjf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhutjf.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaufup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaufup.exe"47⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnwovy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnwovy.exe"48⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkikaq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkikaq.exe"49⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Sysqempomoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempomoc.exe"50⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxdath.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxdath.exe"51⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhoapa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhoapa.exe"52⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcfdfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcfdfb.exe"53⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxijam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxijam.exe"54⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkrmnx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrmnx.exe"55⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcnmyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnmyl.exe"56⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\Sysqempejyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempejyh.exe"57⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkklzt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkklzt.exe"58⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhxhfl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhxhfl.exe"59⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxfbsk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxfbsk.exe"60⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsihgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsihgw.exe"61⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjatwp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjatwp.exe"62⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcxtux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcxtux.exe"63⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrjaem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrjaem.exe"64⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmavnv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmavnv.exe"65⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzranj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzranj.exe"66⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjflde.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjflde.exe"67⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzkvoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkvoo.exe"68⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmedbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmedbn.exe"69⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzvgkn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzvgkn.exe"70⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrdsvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrdsvy.exe"71⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgtcsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtcsy.exe"72⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzpdqg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzpdqg.exe"73⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmgiju.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgiju.exe"74⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzxmjq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzxmjq.exe"75⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmcgxc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmcgxc.exe"76⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\Sysqemytlxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemytlxq.exe"77⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\Sysqemochiw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemochiw.exe"78⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeoobl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeoobl.exe"79⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrquwx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrquwx.exe"80⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtpkxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtpkxs.exe"81⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjuuqb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjuuqb.exe"82⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwiodv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwiodv.exe"83⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\Sysqemroflj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemroflj.exe"84⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemykzoy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemykzoy.exe"85⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjvrsr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvrsr.exe"86⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\Sysqembvddb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvddb.exe"87⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\Sysqemomivy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemomivy.exe"88⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\Sysqembzcqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzcqj.exe"89⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgfveu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgfveu.exe"90⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwnqcp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwnqcp.exe"91⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\Sysqembsvnz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembsvnz.exe"92⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqxfgj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxfgj.exe"93⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaafok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaafok.exe"94⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiqczb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqczb.exe"95⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlmhut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmhut.exe"96⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdltfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdltfe.exe"97⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsjddw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsjddw.exe"98⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\Sysqemscmbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscmbq.exe"99⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\Sysqemakkmi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemakkmi.exe"100⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxwqxl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxwqxl.exe"101⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\Sysqemylgho.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemylgho.exe"102⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlzivi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzivi.exe"103⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcniyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcniyy.exe"104⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsktrh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsktrh.exe"105⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfymet.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfymet.exe"106⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnrvcn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrvcn.exe"107⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqcnfg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcnfg.exe"108⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdtrgu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtrgu.exe"109⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqkxmc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqkxmc.exe"110⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsuzzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsuzzz.exe"111⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsbgce.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbgce.exe"112⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemagtat.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemagtat.exe"113⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcmjjo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmjjo.exe"114⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvbjtk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbjtk.exe"115⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcujml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcujml.exe"116⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfqvzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfqvzr.exe"117⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\Sysqempijdq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempijdq.exe"118⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsdoqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdoqi.exe"119⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Sysqematlbz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqematlbz.exe"120⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhbjzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbjzz.exe"121⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\Sysqempjgkq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjgkq.exe"122⤵PID:3508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-