Analysis
-
max time kernel
157s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe
-
Size
128KB
-
MD5
548dde00f7bc69181955d995312bd530
-
SHA1
0cf53a7ed4a2714f0ed87bcaaf2858c31b5f8bbe
-
SHA256
2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663
-
SHA512
8a9808b39ceb616bef1bfedee7f788ef267bda31d4d166b60ad2aa63687045613fe383c02122b9a04711ac102b244de7afa56020f9f528b669354ac76f687f67
-
SSDEEP
3072:LMXyKbmNcQEMDd1AZoUBW3FJeRuaWNXmgu+tB:4JyOLudWZHEFJ7aWN1B
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bikeni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bikeni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Didqkeeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Didqkeeq.exe -
Executes dropped EXE 3 IoCs
pid Process 3816 Bikeni32.exe 4632 Didqkeeq.exe 1680 Dpoiho32.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ephlnn32.exe Dpoiho32.exe File created C:\Windows\SysWOW64\Bikeni32.exe 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Bikeni32.exe 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Didqkeeq.exe Bikeni32.exe File opened for modification C:\Windows\SysWOW64\Dpoiho32.exe Didqkeeq.exe File created C:\Windows\SysWOW64\Kmnlmdhd.dll Didqkeeq.exe File opened for modification C:\Windows\SysWOW64\Ephlnn32.exe Dpoiho32.exe File created C:\Windows\SysWOW64\Mnjellfo.dll 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Didqkeeq.exe Bikeni32.exe File created C:\Windows\SysWOW64\Akaaggld.dll Bikeni32.exe File created C:\Windows\SysWOW64\Dpoiho32.exe Didqkeeq.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 10636 10504 WerFault.exe 1102 -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bikeni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akaaggld.dll" Bikeni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Didqkeeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmnlmdhd.dll" Didqkeeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnjellfo.dll" 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bikeni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Didqkeeq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 228 wrote to memory of 3816 228 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe 92 PID 228 wrote to memory of 3816 228 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe 92 PID 228 wrote to memory of 3816 228 2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe 92 PID 3816 wrote to memory of 4632 3816 Bikeni32.exe 93 PID 3816 wrote to memory of 4632 3816 Bikeni32.exe 93 PID 3816 wrote to memory of 4632 3816 Bikeni32.exe 93 PID 4632 wrote to memory of 1680 4632 Didqkeeq.exe 94 PID 4632 wrote to memory of 1680 4632 Didqkeeq.exe 94 PID 4632 wrote to memory of 1680 4632 Didqkeeq.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2fc1731b013dff8b7390780106fa8ebc941d9867ce95d0c6dcc6e631cbaaa663_NeikiAnalytics.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\Bikeni32.exeC:\Windows\system32\Bikeni32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\Didqkeeq.exeC:\Windows\system32\Didqkeeq.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\Dpoiho32.exeC:\Windows\system32\Dpoiho32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Ephlnn32.exeC:\Windows\system32\Ephlnn32.exe5⤵PID:2500
-
C:\Windows\SysWOW64\Flfbcndo.exeC:\Windows\system32\Flfbcndo.exe6⤵PID:2644
-
C:\Windows\SysWOW64\Hmbkfjko.exeC:\Windows\system32\Hmbkfjko.exe7⤵PID:2272
-
C:\Windows\SysWOW64\Iqbpahpc.exeC:\Windows\system32\Iqbpahpc.exe8⤵PID:1820
-
C:\Windows\SysWOW64\Iedbcebd.exeC:\Windows\system32\Iedbcebd.exe9⤵PID:3104
-
C:\Windows\SysWOW64\Jjdgal32.exeC:\Windows\system32\Jjdgal32.exe10⤵PID:4276
-
C:\Windows\SysWOW64\Jaefne32.exeC:\Windows\system32\Jaefne32.exe11⤵PID:2372
-
C:\Windows\SysWOW64\Kjdqhjpf.exeC:\Windows\system32\Kjdqhjpf.exe12⤵PID:3376
-
C:\Windows\SysWOW64\Lhjnfn32.exeC:\Windows\system32\Lhjnfn32.exe13⤵PID:836
-
C:\Windows\SysWOW64\Laeoec32.exeC:\Windows\system32\Laeoec32.exe14⤵PID:1660
-
C:\Windows\SysWOW64\Ldfhgn32.exeC:\Windows\system32\Ldfhgn32.exe15⤵PID:1768
-
C:\Windows\SysWOW64\Mknlef32.exeC:\Windows\system32\Mknlef32.exe16⤵PID:740
-
C:\Windows\SysWOW64\Nhbmnj32.exeC:\Windows\system32\Nhbmnj32.exe17⤵PID:4144
-
C:\Windows\SysWOW64\Ngifef32.exeC:\Windows\system32\Ngifef32.exe18⤵PID:2368
-
C:\Windows\SysWOW64\Nnfkgp32.exeC:\Windows\system32\Nnfkgp32.exe19⤵PID:2728
-
C:\Windows\SysWOW64\Oolnabal.exeC:\Windows\system32\Oolnabal.exe20⤵PID:2412
-
C:\Windows\SysWOW64\Pndhhnda.exeC:\Windows\system32\Pndhhnda.exe21⤵PID:4268
-
C:\Windows\SysWOW64\Pbdmdlie.exeC:\Windows\system32\Pbdmdlie.exe22⤵PID:5044
-
C:\Windows\SysWOW64\Qoocnpag.exeC:\Windows\system32\Qoocnpag.exe23⤵PID:3536
-
C:\Windows\SysWOW64\Adnilfnl.exeC:\Windows\system32\Adnilfnl.exe24⤵PID:2088
-
C:\Windows\SysWOW64\Abdfkj32.exeC:\Windows\system32\Abdfkj32.exe25⤵PID:3044
-
C:\Windows\SysWOW64\Akogio32.exeC:\Windows\system32\Akogio32.exe26⤵PID:2632
-
C:\Windows\SysWOW64\Biedhclh.exeC:\Windows\system32\Biedhclh.exe27⤵PID:2952
-
C:\Windows\SysWOW64\Bngfli32.exeC:\Windows\system32\Bngfli32.exe28⤵PID:1944
-
C:\Windows\SysWOW64\Ciaddaaj.exeC:\Windows\system32\Ciaddaaj.exe29⤵PID:1248
-
C:\Windows\SysWOW64\Cicqja32.exeC:\Windows\system32\Cicqja32.exe30⤵PID:2460
-
C:\Windows\SysWOW64\Dhmgfm32.exeC:\Windows\system32\Dhmgfm32.exe31⤵PID:2432
-
C:\Windows\SysWOW64\Decdeama.exeC:\Windows\system32\Decdeama.exe32⤵PID:2936
-
C:\Windows\SysWOW64\Dlpigk32.exeC:\Windows\system32\Dlpigk32.exe33⤵PID:1640
-
C:\Windows\SysWOW64\Dpnbmi32.exeC:\Windows\system32\Dpnbmi32.exe34⤵PID:2944
-
C:\Windows\SysWOW64\Eldbbjof.exeC:\Windows\system32\Eldbbjof.exe35⤵PID:1568
-
C:\Windows\SysWOW64\Eikpan32.exeC:\Windows\system32\Eikpan32.exe36⤵PID:4280
-
C:\Windows\SysWOW64\Ebeapc32.exeC:\Windows\system32\Ebeapc32.exe37⤵PID:4252
-
C:\Windows\SysWOW64\Fefjanml.exeC:\Windows\system32\Fefjanml.exe38⤵PID:3284
-
C:\Windows\SysWOW64\Fbjjkble.exeC:\Windows\system32\Fbjjkble.exe39⤵PID:2428
-
C:\Windows\SysWOW64\Fcmgpbjc.exeC:\Windows\system32\Fcmgpbjc.exe40⤵PID:4892
-
C:\Windows\SysWOW64\Fochecog.exeC:\Windows\system32\Fochecog.exe41⤵PID:4912
-
C:\Windows\SysWOW64\Fhllni32.exeC:\Windows\system32\Fhllni32.exe42⤵PID:4304
-
C:\Windows\SysWOW64\Gjdknjep.exeC:\Windows\system32\Gjdknjep.exe43⤵PID:4796
-
C:\Windows\SysWOW64\Imjgbb32.exeC:\Windows\system32\Imjgbb32.exe44⤵PID:776
-
C:\Windows\SysWOW64\Jqmicpbj.exeC:\Windows\system32\Jqmicpbj.exe45⤵PID:2252
-
C:\Windows\SysWOW64\Jmdjha32.exeC:\Windows\system32\Jmdjha32.exe46⤵PID:4692
-
C:\Windows\SysWOW64\Kcbkpj32.exeC:\Windows\system32\Kcbkpj32.exe47⤵PID:3752
-
C:\Windows\SysWOW64\Kpilekqj.exeC:\Windows\system32\Kpilekqj.exe48⤵PID:940
-
C:\Windows\SysWOW64\Lcqgahoe.exeC:\Windows\system32\Lcqgahoe.exe49⤵PID:2116
-
C:\Windows\SysWOW64\Lhopgg32.exeC:\Windows\system32\Lhopgg32.exe50⤵PID:3684
-
C:\Windows\SysWOW64\Lfcmhc32.exeC:\Windows\system32\Lfcmhc32.exe51⤵PID:1656
-
C:\Windows\SysWOW64\Mdjjgggk.exeC:\Windows\system32\Mdjjgggk.exe52⤵PID:1212
-
C:\Windows\SysWOW64\Mjiloqjb.exeC:\Windows\system32\Mjiloqjb.exe53⤵PID:4864
-
C:\Windows\SysWOW64\Mphamg32.exeC:\Windows\system32\Mphamg32.exe54⤵PID:2464
-
C:\Windows\SysWOW64\Nieoal32.exeC:\Windows\system32\Nieoal32.exe55⤵PID:4424
-
C:\Windows\SysWOW64\Ogbbqo32.exeC:\Windows\system32\Ogbbqo32.exe56⤵PID:1988
-
C:\Windows\SysWOW64\Oahgnh32.exeC:\Windows\system32\Oahgnh32.exe57⤵PID:4616
-
C:\Windows\SysWOW64\Ohdlpa32.exeC:\Windows\system32\Ohdlpa32.exe58⤵PID:2348
-
C:\Windows\SysWOW64\Pncanhaf.exeC:\Windows\system32\Pncanhaf.exe59⤵PID:4752
-
C:\Windows\SysWOW64\Pdbbfadn.exeC:\Windows\system32\Pdbbfadn.exe60⤵PID:4972
-
C:\Windows\SysWOW64\Qnopjfgi.exeC:\Windows\system32\Qnopjfgi.exe61⤵PID:912
-
C:\Windows\SysWOW64\Adnbapjp.exeC:\Windows\system32\Adnbapjp.exe62⤵PID:4608
-
C:\Windows\SysWOW64\Ajjjjghg.exeC:\Windows\system32\Ajjjjghg.exe63⤵PID:5016
-
C:\Windows\SysWOW64\Anmmkd32.exeC:\Windows\system32\Anmmkd32.exe64⤵PID:4504
-
C:\Windows\SysWOW64\Bbmbgb32.exeC:\Windows\system32\Bbmbgb32.exe65⤵PID:1288
-
C:\Windows\SysWOW64\Bdnkhn32.exeC:\Windows\system32\Bdnkhn32.exe66⤵PID:1856
-
C:\Windows\SysWOW64\Bgodjiio.exeC:\Windows\system32\Bgodjiio.exe67⤵PID:4408
-
C:\Windows\SysWOW64\Cjaiac32.exeC:\Windows\system32\Cjaiac32.exe68⤵PID:5008
-
C:\Windows\SysWOW64\Dnghhqdk.exeC:\Windows\system32\Dnghhqdk.exe69⤵PID:1056
-
C:\Windows\SysWOW64\Dalkek32.exeC:\Windows\system32\Dalkek32.exe70⤵PID:1836
-
C:\Windows\SysWOW64\Ebbmpmnb.exeC:\Windows\system32\Ebbmpmnb.exe71⤵PID:3272
-
C:\Windows\SysWOW64\Ejnbdp32.exeC:\Windows\system32\Ejnbdp32.exe72⤵PID:3212
-
C:\Windows\SysWOW64\Fejlbgek.exeC:\Windows\system32\Fejlbgek.exe73⤵PID:4412
-
C:\Windows\SysWOW64\Glngep32.exeC:\Windows\system32\Glngep32.exe74⤵PID:3932
-
C:\Windows\SysWOW64\Gbhpajlj.exeC:\Windows\system32\Gbhpajlj.exe75⤵PID:4080
-
C:\Windows\SysWOW64\Gaoihfoo.exeC:\Windows\system32\Gaoihfoo.exe76⤵PID:1256
-
C:\Windows\SysWOW64\Hahlnefd.exeC:\Windows\system32\Hahlnefd.exe77⤵PID:5136
-
C:\Windows\SysWOW64\Ikejbjip.exeC:\Windows\system32\Ikejbjip.exe78⤵PID:5180
-
C:\Windows\SysWOW64\Ijkdkq32.exeC:\Windows\system32\Ijkdkq32.exe79⤵PID:5224
-
C:\Windows\SysWOW64\Jhqqlmba.exeC:\Windows\system32\Jhqqlmba.exe80⤵PID:5304
-
C:\Windows\SysWOW64\Joaojf32.exeC:\Windows\system32\Joaojf32.exe81⤵PID:5352
-
C:\Windows\SysWOW64\Kkkldg32.exeC:\Windows\system32\Kkkldg32.exe82⤵PID:5396
-
C:\Windows\SysWOW64\Kbgafqla.exeC:\Windows\system32\Kbgafqla.exe83⤵PID:5440
-
C:\Windows\SysWOW64\Ljglnmdi.exeC:\Windows\system32\Ljglnmdi.exe84⤵PID:5488
-
C:\Windows\SysWOW64\Llmbqdfb.exeC:\Windows\system32\Llmbqdfb.exe85⤵PID:5544
-
C:\Windows\SysWOW64\Mlbllc32.exeC:\Windows\system32\Mlbllc32.exe86⤵PID:5600
-
C:\Windows\SysWOW64\Npgjbabk.exeC:\Windows\system32\Npgjbabk.exe87⤵PID:5648
-
C:\Windows\SysWOW64\Npnqcpmc.exeC:\Windows\system32\Npnqcpmc.exe88⤵PID:5692
-
C:\Windows\SysWOW64\Oikngeoo.exeC:\Windows\system32\Oikngeoo.exe89⤵PID:5744
-
C:\Windows\SysWOW64\Ojkkah32.exeC:\Windows\system32\Ojkkah32.exe90⤵PID:5808
-
C:\Windows\SysWOW64\Piikhc32.exeC:\Windows\system32\Piikhc32.exe91⤵PID:5852
-
C:\Windows\SysWOW64\Pllppnnm.exeC:\Windows\system32\Pllppnnm.exe92⤵PID:5900
-
C:\Windows\SysWOW64\Apobakpn.exeC:\Windows\system32\Apobakpn.exe93⤵PID:5944
-
C:\Windows\SysWOW64\Adohmidb.exeC:\Windows\system32\Adohmidb.exe94⤵PID:5992
-
C:\Windows\SysWOW64\Cmmbmiag.exeC:\Windows\system32\Cmmbmiag.exe95⤵PID:6036
-
C:\Windows\SysWOW64\Cjabgm32.exeC:\Windows\system32\Cjabgm32.exe96⤵PID:6080
-
C:\Windows\SysWOW64\Cgecpa32.exeC:\Windows\system32\Cgecpa32.exe97⤵PID:6132
-
C:\Windows\SysWOW64\Dklomnmf.exeC:\Windows\system32\Dklomnmf.exe98⤵PID:5176
-
C:\Windows\SysWOW64\Eakdje32.exeC:\Windows\system32\Eakdje32.exe99⤵PID:5240
-
C:\Windows\SysWOW64\Egelgoah.exeC:\Windows\system32\Egelgoah.exe100⤵PID:5364
-
C:\Windows\SysWOW64\Gaglma32.exeC:\Windows\system32\Gaglma32.exe101⤵PID:5472
-
C:\Windows\SysWOW64\Glajeiml.exeC:\Windows\system32\Glajeiml.exe102⤵PID:5552
-
C:\Windows\SysWOW64\Haclio32.exeC:\Windows\system32\Haclio32.exe103⤵PID:5636
-
C:\Windows\SysWOW64\Imabnofj.exeC:\Windows\system32\Imabnofj.exe104⤵PID:5708
-
C:\Windows\SysWOW64\Ikgpmc32.exeC:\Windows\system32\Ikgpmc32.exe105⤵PID:5776
-
C:\Windows\SysWOW64\Idpdfija.exeC:\Windows\system32\Idpdfija.exe106⤵PID:5864
-
C:\Windows\SysWOW64\Ioeicajh.exeC:\Windows\system32\Ioeicajh.exe107⤵PID:5932
-
C:\Windows\SysWOW64\Jafaem32.exeC:\Windows\system32\Jafaem32.exe108⤵PID:6000
-
C:\Windows\SysWOW64\Jedjkkmo.exeC:\Windows\system32\Jedjkkmo.exe109⤵PID:6076
-
C:\Windows\SysWOW64\Jkqccbkf.exeC:\Windows\system32\Jkqccbkf.exe110⤵PID:4552
-
C:\Windows\SysWOW64\Jefgak32.exeC:\Windows\system32\Jefgak32.exe111⤵PID:5168
-
C:\Windows\SysWOW64\Jkcpia32.exeC:\Windows\system32\Jkcpia32.exe112⤵PID:3852
-
C:\Windows\SysWOW64\Jdkdbgpd.exeC:\Windows\system32\Jdkdbgpd.exe113⤵PID:4940
-
C:\Windows\SysWOW64\Koceep32.exeC:\Windows\system32\Koceep32.exe114⤵PID:4820
-
C:\Windows\SysWOW64\Kdbjbfjl.exeC:\Windows\system32\Kdbjbfjl.exe115⤵PID:5716
-
C:\Windows\SysWOW64\Kojkeogp.exeC:\Windows\system32\Kojkeogp.exe116⤵PID:5688
-
C:\Windows\SysWOW64\Loodqn32.exeC:\Windows\system32\Loodqn32.exe117⤵PID:6012
-
C:\Windows\SysWOW64\Lkhbko32.exeC:\Windows\system32\Lkhbko32.exe118⤵PID:5988
-
C:\Windows\SysWOW64\Lilbdcfe.exeC:\Windows\system32\Lilbdcfe.exe119⤵PID:5320
-
C:\Windows\SysWOW64\Lfbpcgbl.exeC:\Windows\system32\Lfbpcgbl.exe120⤵PID:1820
-
C:\Windows\SysWOW64\Mfgiof32.exeC:\Windows\system32\Mfgiof32.exe121⤵PID:5736
-
C:\Windows\SysWOW64\Neaokboj.exeC:\Windows\system32\Neaokboj.exe122⤵PID:5888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-