Analysis
-
max time kernel
140s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe
Resource
win10v2004-20240508-en
General
-
Target
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe
-
Size
163KB
-
MD5
7319d5391ebbd3d6f711f2d38ef84061
-
SHA1
3c473afaf767eac384bd57fdc9d49d8bd8ccc75e
-
SHA256
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189
-
SHA512
6dbc596ffc21adf13c382fdede6e769a32dd86fef4d518ea861813a8746ee3d0f23eb25a470a524c240f85a8516c548703453aa0260accfff017713238de8145
-
SSDEEP
1536:PKqgt4xfIR3G1PhujmlFzoLYyNx9V4lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:i9t4xf+LYSx9OltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Cflkpblf.exeKijchhbo.exeFfgqqaip.exeAjanck32.exeJjmcnbdm.exeNohehq32.exeBaadiiif.exeBcjlcn32.exeQcclld32.exeCndeii32.exeFafkecel.exeAdgbpc32.exeEmdajb32.exeJgkdbacp.exeDhkjej32.exeBqfoamfj.exeMpablkhc.exeMiifeq32.exeMilidebi.exePajeam32.exeLgokmgjm.exeFahaplon.exeEgijmegb.exeBepmoh32.exeMdhdajea.exeLppbkgcj.exeQhngolpo.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cflkpblf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kijchhbo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffgqqaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajanck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjmcnbdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nohehq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baadiiif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcjlcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcclld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cndeii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fafkecel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adgbpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emdajb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgkdbacp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhkjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bqfoamfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpablkhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miifeq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Milidebi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pajeam32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgokmgjm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fahaplon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egijmegb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kijchhbo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bepmoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdhdajea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lppbkgcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhngolpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Aeopki32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ahmlgd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Angddopp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aealah32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ahoimd32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2536-22-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bnlnon32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1284-49-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bhdbhcck.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/5028-57-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bjbndobo.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4872-68-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Balfaiil.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bdkcmdhp.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4976-81-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bjdkjo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bdmpcdfm.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/664-100-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bldgdago.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2244-104-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Baaplhef.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4552-112-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Blfdia32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/5092-119-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Boepel32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3192-128-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdainc32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4016-135-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cklaknjd.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4548-144-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cogmkl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chpada32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cknnpm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cahfmgoo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdfbibnb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Colffknh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cefoce32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ckcgkldl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cehkhecb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Clbceo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Doqpak32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Docmgjhp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Demecd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ddpeoafg.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/5076-259-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dohfbj32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2760-398-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1912-400-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1516-406-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4132-502-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2892-512-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3300-519-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2536-543-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4280-557-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4872-583-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/664-610-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5260-630-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5384-649-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ipdqba32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jioaqfcc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kiidgeki.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lmppcbjd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lfkaag32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oncofm32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Aeopki32.exe UPX C:\Windows\SysWOW64\Ahmlgd32.exe UPX C:\Windows\SysWOW64\Angddopp.exe UPX C:\Windows\SysWOW64\Aealah32.exe UPX C:\Windows\SysWOW64\Ahoimd32.exe UPX behavioral2/memory/2536-22-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bnlnon32.exe UPX behavioral2/memory/1284-49-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bhdbhcck.exe UPX behavioral2/memory/5028-57-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bjbndobo.exe UPX behavioral2/memory/4872-68-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Balfaiil.exe UPX C:\Windows\SysWOW64\Bdkcmdhp.exe UPX behavioral2/memory/4976-81-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bjdkjo32.exe UPX C:\Windows\SysWOW64\Bdmpcdfm.exe UPX behavioral2/memory/664-100-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bldgdago.exe UPX behavioral2/memory/2244-104-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Baaplhef.exe UPX behavioral2/memory/4552-112-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Blfdia32.exe UPX behavioral2/memory/5092-119-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Boepel32.exe UPX behavioral2/memory/3192-128-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Cdainc32.exe UPX behavioral2/memory/4016-135-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Cklaknjd.exe UPX behavioral2/memory/4548-144-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Cogmkl32.exe UPX C:\Windows\SysWOW64\Chpada32.exe UPX C:\Windows\SysWOW64\Cknnpm32.exe UPX C:\Windows\SysWOW64\Cahfmgoo.exe UPX C:\Windows\SysWOW64\Cdfbibnb.exe UPX C:\Windows\SysWOW64\Colffknh.exe UPX C:\Windows\SysWOW64\Cefoce32.exe UPX C:\Windows\SysWOW64\Ckcgkldl.exe UPX C:\Windows\SysWOW64\Cehkhecb.exe UPX C:\Windows\SysWOW64\Clbceo32.exe UPX C:\Windows\SysWOW64\Doqpak32.exe UPX C:\Windows\SysWOW64\Docmgjhp.exe UPX C:\Windows\SysWOW64\Demecd32.exe UPX C:\Windows\SysWOW64\Ddpeoafg.exe UPX behavioral2/memory/5076-259-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Dohfbj32.exe UPX behavioral2/memory/760-295-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4856-296-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1940-302-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4408-347-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1308-354-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2760-398-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1912-400-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1516-406-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/324-416-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3300-519-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3428-531-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2536-543-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4280-557-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3544-577-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2072-604-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/664-610-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5260-630-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5092-629-0x0000000000400000-0x0000000000453000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
Aeopki32.exeAhmlgd32.exeAngddopp.exeAealah32.exeAhoimd32.exeBnlnon32.exeBhdbhcck.exeBjbndobo.exeBalfaiil.exeBdkcmdhp.exeBjdkjo32.exeBdmpcdfm.exeBldgdago.exeBaaplhef.exeBlfdia32.exeBoepel32.exeCdainc32.exeCklaknjd.exeCogmkl32.exeChpada32.exeCknnpm32.exeCahfmgoo.exeCdfbibnb.exeColffknh.exeCefoce32.exeCkcgkldl.exeCehkhecb.exeClbceo32.exeDoqpak32.exeDocmgjhp.exeDemecd32.exeDdpeoafg.exeDlgmpogj.exeDeoaid32.exeDhnnep32.exeDohfbj32.exeDafbne32.exeDhpjkojk.exeDllfkn32.exeDahode32.exeDlncan32.exeEolpmi32.exeEchknh32.exeEefhjc32.exeEkcpbj32.exeEcjhcg32.exeEdkdkplj.exeEhgqln32.exeEcmeig32.exeEdnaqo32.exeEhimanbq.exeEkhjmiad.exeEabbjc32.exeEdpnfo32.exeEhljfnpn.exeEofbch32.exeEadopc32.exeEdbklofb.exeEhnglm32.exeFohoigfh.exeFafkecel.exeFdegandp.exeFllpbldb.exeFojlngce.exepid process 812 Aeopki32.exe 2536 Ahmlgd32.exe 4748 Angddopp.exe 4280 Aealah32.exe 3552 Ahoimd32.exe 1284 Bnlnon32.exe 5028 Bhdbhcck.exe 4872 Bjbndobo.exe 5068 Balfaiil.exe 4976 Bdkcmdhp.exe 2072 Bjdkjo32.exe 664 Bdmpcdfm.exe 2244 Bldgdago.exe 4552 Baaplhef.exe 5092 Blfdia32.exe 3192 Boepel32.exe 4016 Cdainc32.exe 4548 Cklaknjd.exe 5064 Cogmkl32.exe 2008 Chpada32.exe 1228 Cknnpm32.exe 1612 Cahfmgoo.exe 884 Cdfbibnb.exe 4980 Colffknh.exe 3576 Cefoce32.exe 1616 Ckcgkldl.exe 1252 Cehkhecb.exe 3120 Clbceo32.exe 4960 Doqpak32.exe 1104 Docmgjhp.exe 232 Demecd32.exe 5076 Ddpeoafg.exe 1636 Dlgmpogj.exe 4896 Deoaid32.exe 4396 Dhnnep32.exe 3520 Dohfbj32.exe 2680 Dafbne32.exe 760 Dhpjkojk.exe 4856 Dllfkn32.exe 1940 Dahode32.exe 3500 Dlncan32.exe 756 Eolpmi32.exe 4928 Echknh32.exe 3740 Eefhjc32.exe 2364 Ekcpbj32.exe 3084 Ecjhcg32.exe 4408 Edkdkplj.exe 2356 Ehgqln32.exe 1308 Ecmeig32.exe 2308 Ednaqo32.exe 452 Ehimanbq.exe 4560 Ekhjmiad.exe 880 Eabbjc32.exe 1936 Edpnfo32.exe 1596 Ehljfnpn.exe 2760 Eofbch32.exe 1912 Eadopc32.exe 1516 Edbklofb.exe 324 Ehnglm32.exe 2360 Fohoigfh.exe 3304 Fafkecel.exe 2368 Fdegandp.exe 1488 Fllpbldb.exe 1664 Fojlngce.exe -
Drops file in System32 directory 64 IoCs
Processes:
Daekdooc.exeHlegnjbm.exePahilmoc.exeCkcgkldl.exeAjanck32.exeCdcoim32.exeAgeolo32.exeDjcoai32.exeJpaleglc.exeOkkdic32.exeLifjnm32.exePhhhhc32.exeElnoopdj.exeMcmabg32.exeIhqoeb32.exeGokdeeec.exeNcofplba.exeDkifae32.exeGddinf32.exeNlcalieg.exeQfcfml32.exeIjcjmmil.exeEchknh32.exeFohoigfh.exeNdhmhh32.exeMiaboe32.exeAoabad32.exeIbnccmbo.exeLmppcbjd.exePiijno32.exeGbabigfj.exeDeoaid32.exeFkllnbjc.exeKilpmh32.exeDlgmpogj.exeLpqiemge.exeHofmfmhj.exeLgqfdnah.exeHcmgfbhd.exedescription ioc process File created C:\Windows\SysWOW64\Amjknl32.dll Daekdooc.exe File created C:\Windows\SysWOW64\Mknjbg32.dll Hlegnjbm.exe File opened for modification C:\Windows\SysWOW64\Pkpmdbfd.exe Pahilmoc.exe File opened for modification C:\Windows\SysWOW64\Lnoaaaad.exe File created C:\Windows\SysWOW64\Nflnbh32.dll File created C:\Windows\SysWOW64\Cehkhecb.exe Ckcgkldl.exe File created C:\Windows\SysWOW64\Ampkof32.exe Ajanck32.exe File created C:\Windows\SysWOW64\Cfbkeh32.exe Cdcoim32.exe File created C:\Windows\SysWOW64\Gdgfnm32.dll File created C:\Windows\SysWOW64\Ojhiogdd.exe File created C:\Windows\SysWOW64\Ncjiib32.dll File created C:\Windows\SysWOW64\Qoqbfpfe.dll Ageolo32.exe File created C:\Windows\SysWOW64\Bnffda32.dll Djcoai32.exe File created C:\Windows\SysWOW64\Jgkdbacp.exe Jpaleglc.exe File created C:\Windows\SysWOW64\Paelfmaf.exe Okkdic32.exe File opened for modification C:\Windows\SysWOW64\Pdjgha32.exe File created C:\Windows\SysWOW64\Fnhbmgmk.exe File created C:\Windows\SysWOW64\Fhoqoo32.dll Lifjnm32.exe File opened for modification C:\Windows\SysWOW64\Phjenbhp.exe Phhhhc32.exe File created C:\Windows\SysWOW64\Fpjqcaao.dll Elnoopdj.exe File created C:\Windows\SysWOW64\Mjaofnii.dll File created C:\Windows\SysWOW64\Eghpcp32.dll Mcmabg32.exe File opened for modification C:\Windows\SysWOW64\Ikokan32.exe Ihqoeb32.exe File created C:\Windows\SysWOW64\Cnnnfkal.dll File created C:\Windows\SysWOW64\Jaqcnl32.exe File opened for modification C:\Windows\SysWOW64\Gfembo32.exe Gokdeeec.exe File created C:\Windows\SysWOW64\Gdkcckgg.dll Ncofplba.exe File opened for modification C:\Windows\SysWOW64\Nnafno32.exe File opened for modification C:\Windows\SysWOW64\Coegoe32.exe File created C:\Windows\SysWOW64\Qfgfpp32.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe Dkifae32.exe File opened for modification C:\Windows\SysWOW64\Ghpendjj.exe Gddinf32.exe File created C:\Windows\SysWOW64\Pqnpfi32.dll Nlcalieg.exe File created C:\Windows\SysWOW64\Papbpdoi.dll Qfcfml32.exe File created C:\Windows\SysWOW64\Blafme32.dll Ijcjmmil.exe File opened for modification C:\Windows\SysWOW64\Egened32.exe File created C:\Windows\SysWOW64\Flnakb32.dll Echknh32.exe File created C:\Windows\SysWOW64\Fafkecel.exe Fohoigfh.exe File opened for modification C:\Windows\SysWOW64\Nggjdc32.exe Ndhmhh32.exe File opened for modification C:\Windows\SysWOW64\Fglnkm32.exe File created C:\Windows\SysWOW64\Gcbpne32.dll Miaboe32.exe File created C:\Windows\SysWOW64\Iahqoq32.dll Aoabad32.exe File created C:\Windows\SysWOW64\Edionhpn.exe File created C:\Windows\SysWOW64\Ifjodl32.exe Ibnccmbo.exe File opened for modification C:\Windows\SysWOW64\Ldjhpl32.exe Lmppcbjd.exe File created C:\Windows\SysWOW64\Dmlijb32.dll Piijno32.exe File created C:\Windows\SysWOW64\Gikkfqmf.exe Gbabigfj.exe File created C:\Windows\SysWOW64\Fopjdidn.dll File created C:\Windows\SysWOW64\Abmjqe32.exe File opened for modification C:\Windows\SysWOW64\Jeaiij32.exe File created C:\Windows\SysWOW64\Fjpqmmkb.dll Deoaid32.exe File created C:\Windows\SysWOW64\Fnjhjn32.exe Fkllnbjc.exe File created C:\Windows\SysWOW64\Kjmmepfj.exe Kilpmh32.exe File created C:\Windows\SysWOW64\Lnldla32.exe File created C:\Windows\SysWOW64\Mlcdqdie.dll File opened for modification C:\Windows\SysWOW64\Ecgodpgb.exe File created C:\Windows\SysWOW64\Hpacoj32.dll File created C:\Windows\SysWOW64\Deoaid32.exe Dlgmpogj.exe File created C:\Windows\SysWOW64\Oaeokj32.dll Lpqiemge.exe File created C:\Windows\SysWOW64\Hbdjchgn.exe Hofmfmhj.exe File opened for modification C:\Windows\SysWOW64\Ljobpiql.exe Lgqfdnah.exe File created C:\Windows\SysWOW64\Heffebak.dll File created C:\Windows\SysWOW64\Nlhego32.dll File created C:\Windows\SysWOW64\Nekfmb32.dll Hcmgfbhd.exe -
Modifies registry class 64 IoCs
Processes:
Fpbmfn32.exeJgpmmp32.exeIeolehop.exeLphoelqn.exeFnjhjn32.exeEaindh32.exeInpccihl.exeBeihma32.exeKclgmq32.exeAdkgje32.exeIbqpimpl.exeNdhmhh32.exePnlaml32.exeNlcalieg.exeCehkhecb.exeAhcajk32.exeHfcicmqp.exeNeppokal.exeMebcop32.exeBochmn32.exeFcfhof32.exeNnqbanmo.exeNognnj32.exeIloidijb.exeDdmaok32.exePhjenbhp.exeLgkpdcmi.exeLgepom32.exeMipcob32.exeIjcjmmil.exeFgjccb32.exePiijno32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpbmfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dafipibl.dll" Jgpmmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaqfok32.dll" Ieolehop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lphoelqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmonnmjm.dll" Fnjhjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Occomh32.dll" Eaindh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cocopa32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Inpccihl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjlogcip.dll" Beihma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hleoiomo.dll" Kclgmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adkgje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hokomfqg.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmehgibj.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkblkg32.dll" Ibqpimpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndhmhh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnlaml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqnpfi32.dll" Nlcalieg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Japjfm32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecpfpo32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgifdn32.dll" Cehkhecb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahcajk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfcicmqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opnaqk32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjpnoh32.dll" Neppokal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mebcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmeddp32.dll" Bochmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnmmnbnl.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlofiddl.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlojif32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naqcfnjk.dll" Fcfhof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdjlic32.dll" Nnqbanmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nognnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abakhdbk.dll" Iloidijb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkbjmj32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnmanm32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbgngp32.dll" Ddmaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phjenbhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgkpdcmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdpkjpdi.dll" Lgepom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mipcob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijcjmmil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeodmbol.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgjccb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Piijno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exeAeopki32.exeAhmlgd32.exeAngddopp.exeAealah32.exeAhoimd32.exeBnlnon32.exeBhdbhcck.exeBjbndobo.exeBalfaiil.exeBdkcmdhp.exeBjdkjo32.exeBdmpcdfm.exeBldgdago.exeBaaplhef.exeBlfdia32.exeBoepel32.exeCdainc32.exeCklaknjd.exeCogmkl32.exeChpada32.exeCknnpm32.exedescription pid process target process PID 4184 wrote to memory of 812 4184 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Aeopki32.exe PID 4184 wrote to memory of 812 4184 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Aeopki32.exe PID 4184 wrote to memory of 812 4184 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Aeopki32.exe PID 812 wrote to memory of 2536 812 Aeopki32.exe Ahmlgd32.exe PID 812 wrote to memory of 2536 812 Aeopki32.exe Ahmlgd32.exe PID 812 wrote to memory of 2536 812 Aeopki32.exe Ahmlgd32.exe PID 2536 wrote to memory of 4748 2536 Ahmlgd32.exe Angddopp.exe PID 2536 wrote to memory of 4748 2536 Ahmlgd32.exe Angddopp.exe PID 2536 wrote to memory of 4748 2536 Ahmlgd32.exe Angddopp.exe PID 4748 wrote to memory of 4280 4748 Angddopp.exe Aealah32.exe PID 4748 wrote to memory of 4280 4748 Angddopp.exe Aealah32.exe PID 4748 wrote to memory of 4280 4748 Angddopp.exe Aealah32.exe PID 4280 wrote to memory of 3552 4280 Aealah32.exe Ahoimd32.exe PID 4280 wrote to memory of 3552 4280 Aealah32.exe Ahoimd32.exe PID 4280 wrote to memory of 3552 4280 Aealah32.exe Ahoimd32.exe PID 3552 wrote to memory of 1284 3552 Ahoimd32.exe Bnlnon32.exe PID 3552 wrote to memory of 1284 3552 Ahoimd32.exe Bnlnon32.exe PID 3552 wrote to memory of 1284 3552 Ahoimd32.exe Bnlnon32.exe PID 1284 wrote to memory of 5028 1284 Bnlnon32.exe Bhdbhcck.exe PID 1284 wrote to memory of 5028 1284 Bnlnon32.exe Bhdbhcck.exe PID 1284 wrote to memory of 5028 1284 Bnlnon32.exe Bhdbhcck.exe PID 5028 wrote to memory of 4872 5028 Bhdbhcck.exe Bjbndobo.exe PID 5028 wrote to memory of 4872 5028 Bhdbhcck.exe Bjbndobo.exe PID 5028 wrote to memory of 4872 5028 Bhdbhcck.exe Bjbndobo.exe PID 4872 wrote to memory of 5068 4872 Bjbndobo.exe Balfaiil.exe PID 4872 wrote to memory of 5068 4872 Bjbndobo.exe Balfaiil.exe PID 4872 wrote to memory of 5068 4872 Bjbndobo.exe Balfaiil.exe PID 5068 wrote to memory of 4976 5068 Balfaiil.exe Bdkcmdhp.exe PID 5068 wrote to memory of 4976 5068 Balfaiil.exe Bdkcmdhp.exe PID 5068 wrote to memory of 4976 5068 Balfaiil.exe Bdkcmdhp.exe PID 4976 wrote to memory of 2072 4976 Bdkcmdhp.exe Bjdkjo32.exe PID 4976 wrote to memory of 2072 4976 Bdkcmdhp.exe Bjdkjo32.exe PID 4976 wrote to memory of 2072 4976 Bdkcmdhp.exe Bjdkjo32.exe PID 2072 wrote to memory of 664 2072 Bjdkjo32.exe Bdmpcdfm.exe PID 2072 wrote to memory of 664 2072 Bjdkjo32.exe Bdmpcdfm.exe PID 2072 wrote to memory of 664 2072 Bjdkjo32.exe Bdmpcdfm.exe PID 664 wrote to memory of 2244 664 Bdmpcdfm.exe Bldgdago.exe PID 664 wrote to memory of 2244 664 Bdmpcdfm.exe Bldgdago.exe PID 664 wrote to memory of 2244 664 Bdmpcdfm.exe Bldgdago.exe PID 2244 wrote to memory of 4552 2244 Bldgdago.exe Baaplhef.exe PID 2244 wrote to memory of 4552 2244 Bldgdago.exe Baaplhef.exe PID 2244 wrote to memory of 4552 2244 Bldgdago.exe Baaplhef.exe PID 4552 wrote to memory of 5092 4552 Baaplhef.exe Blfdia32.exe PID 4552 wrote to memory of 5092 4552 Baaplhef.exe Blfdia32.exe PID 4552 wrote to memory of 5092 4552 Baaplhef.exe Blfdia32.exe PID 5092 wrote to memory of 3192 5092 Blfdia32.exe Boepel32.exe PID 5092 wrote to memory of 3192 5092 Blfdia32.exe Boepel32.exe PID 5092 wrote to memory of 3192 5092 Blfdia32.exe Boepel32.exe PID 3192 wrote to memory of 4016 3192 Boepel32.exe Cdainc32.exe PID 3192 wrote to memory of 4016 3192 Boepel32.exe Cdainc32.exe PID 3192 wrote to memory of 4016 3192 Boepel32.exe Cdainc32.exe PID 4016 wrote to memory of 4548 4016 Cdainc32.exe Cklaknjd.exe PID 4016 wrote to memory of 4548 4016 Cdainc32.exe Cklaknjd.exe PID 4016 wrote to memory of 4548 4016 Cdainc32.exe Cklaknjd.exe PID 4548 wrote to memory of 5064 4548 Cklaknjd.exe Cogmkl32.exe PID 4548 wrote to memory of 5064 4548 Cklaknjd.exe Cogmkl32.exe PID 4548 wrote to memory of 5064 4548 Cklaknjd.exe Cogmkl32.exe PID 5064 wrote to memory of 2008 5064 Cogmkl32.exe Chpada32.exe PID 5064 wrote to memory of 2008 5064 Cogmkl32.exe Chpada32.exe PID 5064 wrote to memory of 2008 5064 Cogmkl32.exe Chpada32.exe PID 2008 wrote to memory of 1228 2008 Chpada32.exe Cknnpm32.exe PID 2008 wrote to memory of 1228 2008 Chpada32.exe Cknnpm32.exe PID 2008 wrote to memory of 1228 2008 Chpada32.exe Cknnpm32.exe PID 1228 wrote to memory of 1612 1228 Cknnpm32.exe Cahfmgoo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe"C:\Users\Admin\AppData\Local\Temp\a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Aeopki32.exeC:\Windows\system32\Aeopki32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\Ahmlgd32.exeC:\Windows\system32\Ahmlgd32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Angddopp.exeC:\Windows\system32\Angddopp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\Aealah32.exeC:\Windows\system32\Aealah32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\Ahoimd32.exeC:\Windows\system32\Ahoimd32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\Bnlnon32.exeC:\Windows\system32\Bnlnon32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\Bhdbhcck.exeC:\Windows\system32\Bhdbhcck.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\Bjbndobo.exeC:\Windows\system32\Bjbndobo.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\Balfaiil.exeC:\Windows\system32\Balfaiil.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\Bdkcmdhp.exeC:\Windows\system32\Bdkcmdhp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\Bdmpcdfm.exeC:\Windows\system32\Bdmpcdfm.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\Bldgdago.exeC:\Windows\system32\Bldgdago.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Baaplhef.exeC:\Windows\system32\Baaplhef.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\Blfdia32.exeC:\Windows\system32\Blfdia32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\Boepel32.exeC:\Windows\system32\Boepel32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\Cdainc32.exeC:\Windows\system32\Cdainc32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\Cklaknjd.exeC:\Windows\system32\Cklaknjd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\Cogmkl32.exeC:\Windows\system32\Cogmkl32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\Chpada32.exeC:\Windows\system32\Chpada32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Cknnpm32.exeC:\Windows\system32\Cknnpm32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\Cahfmgoo.exeC:\Windows\system32\Cahfmgoo.exe23⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Cdfbibnb.exeC:\Windows\system32\Cdfbibnb.exe24⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Colffknh.exeC:\Windows\system32\Colffknh.exe25⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\Cefoce32.exeC:\Windows\system32\Cefoce32.exe26⤵
- Executes dropped EXE
PID:3576 -
C:\Windows\SysWOW64\Ckcgkldl.exeC:\Windows\system32\Ckcgkldl.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1616 -
C:\Windows\SysWOW64\Cehkhecb.exeC:\Windows\system32\Cehkhecb.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\Clbceo32.exeC:\Windows\system32\Clbceo32.exe29⤵
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\Doqpak32.exeC:\Windows\system32\Doqpak32.exe30⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\Docmgjhp.exeC:\Windows\system32\Docmgjhp.exe31⤵
- Executes dropped EXE
PID:1104 -
C:\Windows\SysWOW64\Demecd32.exeC:\Windows\system32\Demecd32.exe32⤵
- Executes dropped EXE
PID:232 -
C:\Windows\SysWOW64\Ddpeoafg.exeC:\Windows\system32\Ddpeoafg.exe33⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\Dlgmpogj.exeC:\Windows\system32\Dlgmpogj.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\Deoaid32.exeC:\Windows\system32\Deoaid32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4896 -
C:\Windows\SysWOW64\Dhnnep32.exeC:\Windows\system32\Dhnnep32.exe36⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\Dohfbj32.exeC:\Windows\system32\Dohfbj32.exe37⤵
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\Dafbne32.exeC:\Windows\system32\Dafbne32.exe38⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\Dhpjkojk.exeC:\Windows\system32\Dhpjkojk.exe39⤵
- Executes dropped EXE
PID:760 -
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe40⤵
- Executes dropped EXE
PID:4856 -
C:\Windows\SysWOW64\Dahode32.exeC:\Windows\system32\Dahode32.exe41⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\Dlncan32.exeC:\Windows\system32\Dlncan32.exe42⤵
- Executes dropped EXE
PID:3500 -
C:\Windows\SysWOW64\Eolpmi32.exeC:\Windows\system32\Eolpmi32.exe43⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\Echknh32.exeC:\Windows\system32\Echknh32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4928 -
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe45⤵
- Executes dropped EXE
PID:3740 -
C:\Windows\SysWOW64\Ekcpbj32.exeC:\Windows\system32\Ekcpbj32.exe46⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\Ecjhcg32.exeC:\Windows\system32\Ecjhcg32.exe47⤵
- Executes dropped EXE
PID:3084 -
C:\Windows\SysWOW64\Edkdkplj.exeC:\Windows\system32\Edkdkplj.exe48⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Ehgqln32.exeC:\Windows\system32\Ehgqln32.exe49⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Ecmeig32.exeC:\Windows\system32\Ecmeig32.exe50⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe51⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\Ehimanbq.exeC:\Windows\system32\Ehimanbq.exe52⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe53⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\Eabbjc32.exeC:\Windows\system32\Eabbjc32.exe54⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\Edpnfo32.exeC:\Windows\system32\Edpnfo32.exe55⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Ehljfnpn.exeC:\Windows\system32\Ehljfnpn.exe56⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Eofbch32.exeC:\Windows\system32\Eofbch32.exe57⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\SysWOW64\Eadopc32.exeC:\Windows\system32\Eadopc32.exe58⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\SysWOW64\Edbklofb.exeC:\Windows\system32\Edbklofb.exe59⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\Ehnglm32.exeC:\Windows\system32\Ehnglm32.exe60⤵
- Executes dropped EXE
PID:324 -
C:\Windows\SysWOW64\Fohoigfh.exeC:\Windows\system32\Fohoigfh.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Fafkecel.exeC:\Windows\system32\Fafkecel.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3304 -
C:\Windows\SysWOW64\Fdegandp.exeC:\Windows\system32\Fdegandp.exe63⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Fllpbldb.exeC:\Windows\system32\Fllpbldb.exe64⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\SysWOW64\Fojlngce.exeC:\Windows\system32\Fojlngce.exe65⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Fcfhof32.exeC:\Windows\system32\Fcfhof32.exe66⤵
- Modifies registry class
PID:4284 -
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe67⤵PID:2592
-
C:\Windows\SysWOW64\Flnlhk32.exeC:\Windows\system32\Flnlhk32.exe68⤵PID:4620
-
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe69⤵PID:2224
-
C:\Windows\SysWOW64\Ffgqqaip.exeC:\Windows\system32\Ffgqqaip.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1360 -
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe71⤵PID:468
-
C:\Windows\SysWOW64\Fckajehi.exeC:\Windows\system32\Fckajehi.exe72⤵PID:2824
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe73⤵PID:2468
-
C:\Windows\SysWOW64\Flceckoj.exeC:\Windows\system32\Flceckoj.exe74⤵PID:2508
-
C:\Windows\SysWOW64\Foabofnn.exeC:\Windows\system32\Foabofnn.exe75⤵PID:4508
-
C:\Windows\SysWOW64\Fbpnkama.exeC:\Windows\system32\Fbpnkama.exe76⤵PID:4132
-
C:\Windows\SysWOW64\Gkhbdg32.exeC:\Windows\system32\Gkhbdg32.exe77⤵PID:2892
-
C:\Windows\SysWOW64\Gododflk.exeC:\Windows\system32\Gododflk.exe78⤵PID:3300
-
C:\Windows\SysWOW64\Gbbkaako.exeC:\Windows\system32\Gbbkaako.exe79⤵PID:4796
-
C:\Windows\SysWOW64\Gdqgmmjb.exeC:\Windows\system32\Gdqgmmjb.exe80⤵PID:4592
-
C:\Windows\SysWOW64\Glhonj32.exeC:\Windows\system32\Glhonj32.exe81⤵PID:3428
-
C:\Windows\SysWOW64\Gcagkdba.exeC:\Windows\system32\Gcagkdba.exe82⤵PID:4828
-
C:\Windows\SysWOW64\Gfpcgpae.exeC:\Windows\system32\Gfpcgpae.exe83⤵PID:1544
-
C:\Windows\SysWOW64\Gmjlcj32.exeC:\Windows\system32\Gmjlcj32.exe84⤵PID:1832
-
C:\Windows\SysWOW64\Gbgdlq32.exeC:\Windows\system32\Gbgdlq32.exe85⤵PID:412
-
C:\Windows\SysWOW64\Gmlhii32.exeC:\Windows\system32\Gmlhii32.exe86⤵PID:4824
-
C:\Windows\SysWOW64\Gokdeeec.exeC:\Windows\system32\Gokdeeec.exe87⤵
- Drops file in System32 directory
PID:5032 -
C:\Windows\SysWOW64\Gfembo32.exeC:\Windows\system32\Gfembo32.exe88⤵PID:3544
-
C:\Windows\SysWOW64\Gmoeoidl.exeC:\Windows\system32\Gmoeoidl.exe89⤵PID:116
-
C:\Windows\SysWOW64\Gcimkc32.exeC:\Windows\system32\Gcimkc32.exe90⤵PID:820
-
C:\Windows\SysWOW64\Hiefcj32.exeC:\Windows\system32\Hiefcj32.exe91⤵PID:4876
-
C:\Windows\SysWOW64\Hkdbpe32.exeC:\Windows\system32\Hkdbpe32.exe92⤵PID:1720
-
C:\Windows\SysWOW64\Hbnjmp32.exeC:\Windows\system32\Hbnjmp32.exe93⤵PID:5140
-
C:\Windows\SysWOW64\Hihbijhn.exeC:\Windows\system32\Hihbijhn.exe94⤵PID:5184
-
C:\Windows\SysWOW64\Hkfoeega.exeC:\Windows\system32\Hkfoeega.exe95⤵PID:5224
-
C:\Windows\SysWOW64\Hcmgfbhd.exeC:\Windows\system32\Hcmgfbhd.exe96⤵
- Drops file in System32 directory
PID:5260 -
C:\Windows\SysWOW64\Hmfkoh32.exeC:\Windows\system32\Hmfkoh32.exe97⤵PID:5308
-
C:\Windows\SysWOW64\Hkikkeeo.exeC:\Windows\system32\Hkikkeeo.exe98⤵PID:5348
-
C:\Windows\SysWOW64\Hbbdholl.exeC:\Windows\system32\Hbbdholl.exe99⤵PID:5384
-
C:\Windows\SysWOW64\Himldi32.exeC:\Windows\system32\Himldi32.exe100⤵PID:5432
-
C:\Windows\SysWOW64\Hofdacke.exeC:\Windows\system32\Hofdacke.exe101⤵PID:5492
-
C:\Windows\SysWOW64\Hbeqmoji.exeC:\Windows\system32\Hbeqmoji.exe102⤵PID:5532
-
C:\Windows\SysWOW64\Hfqlnm32.exeC:\Windows\system32\Hfqlnm32.exe103⤵PID:5576
-
C:\Windows\SysWOW64\Hioiji32.exeC:\Windows\system32\Hioiji32.exe104⤵PID:5640
-
C:\Windows\SysWOW64\Hmjdjgjo.exeC:\Windows\system32\Hmjdjgjo.exe105⤵PID:5688
-
C:\Windows\SysWOW64\Hkmefd32.exeC:\Windows\system32\Hkmefd32.exe106⤵PID:5748
-
C:\Windows\SysWOW64\Hcdmga32.exeC:\Windows\system32\Hcdmga32.exe107⤵PID:5792
-
C:\Windows\SysWOW64\Hfcicmqp.exeC:\Windows\system32\Hfcicmqp.exe108⤵
- Modifies registry class
PID:5832 -
C:\Windows\SysWOW64\Iefioj32.exeC:\Windows\system32\Iefioj32.exe109⤵PID:5876
-
C:\Windows\SysWOW64\Iiaephpc.exeC:\Windows\system32\Iiaephpc.exe110⤵PID:5944
-
C:\Windows\SysWOW64\Ikpaldog.exeC:\Windows\system32\Ikpaldog.exe111⤵PID:5992
-
C:\Windows\SysWOW64\Ipknlb32.exeC:\Windows\system32\Ipknlb32.exe112⤵PID:6060
-
C:\Windows\SysWOW64\Ibjjhn32.exeC:\Windows\system32\Ibjjhn32.exe113⤵PID:6108
-
C:\Windows\SysWOW64\Iicbehnq.exeC:\Windows\system32\Iicbehnq.exe114⤵PID:2884
-
C:\Windows\SysWOW64\Imoneg32.exeC:\Windows\system32\Imoneg32.exe115⤵PID:5168
-
C:\Windows\SysWOW64\Ipnjab32.exeC:\Windows\system32\Ipnjab32.exe116⤵PID:5244
-
C:\Windows\SysWOW64\Iblfnn32.exeC:\Windows\system32\Iblfnn32.exe117⤵PID:5304
-
C:\Windows\SysWOW64\Ifgbnlmj.exeC:\Windows\system32\Ifgbnlmj.exe118⤵PID:5404
-
C:\Windows\SysWOW64\Iifokh32.exeC:\Windows\system32\Iifokh32.exe119⤵PID:5488
-
C:\Windows\SysWOW64\Ildkgc32.exeC:\Windows\system32\Ildkgc32.exe120⤵PID:5552
-
C:\Windows\SysWOW64\Ippggbck.exeC:\Windows\system32\Ippggbck.exe121⤵PID:5636
-
C:\Windows\SysWOW64\Ibnccmbo.exeC:\Windows\system32\Ibnccmbo.exe122⤵
- Drops file in System32 directory
PID:5720 -
C:\Windows\SysWOW64\Ifjodl32.exeC:\Windows\system32\Ifjodl32.exe123⤵PID:5800
-
C:\Windows\SysWOW64\Iihkpg32.exeC:\Windows\system32\Iihkpg32.exe124⤵PID:5860
-
C:\Windows\SysWOW64\Imdgqfbd.exeC:\Windows\system32\Imdgqfbd.exe125⤵PID:5976
-
C:\Windows\SysWOW64\Ipbdmaah.exeC:\Windows\system32\Ipbdmaah.exe126⤵PID:6092
-
C:\Windows\SysWOW64\Ibqpimpl.exeC:\Windows\system32\Ibqpimpl.exe127⤵
- Modifies registry class
PID:5148 -
C:\Windows\SysWOW64\Ieolehop.exeC:\Windows\system32\Ieolehop.exe128⤵
- Modifies registry class
PID:5256 -
C:\Windows\SysWOW64\Iikhfg32.exeC:\Windows\system32\Iikhfg32.exe129⤵PID:5392
-
C:\Windows\SysWOW64\Ilidbbgl.exeC:\Windows\system32\Ilidbbgl.exe130⤵PID:5480
-
C:\Windows\SysWOW64\Ipdqba32.exeC:\Windows\system32\Ipdqba32.exe131⤵PID:5620
-
C:\Windows\SysWOW64\Jfoiokfb.exeC:\Windows\system32\Jfoiokfb.exe132⤵PID:5776
-
C:\Windows\SysWOW64\Jimekgff.exeC:\Windows\system32\Jimekgff.exe133⤵PID:5852
-
C:\Windows\SysWOW64\Jlkagbej.exeC:\Windows\system32\Jlkagbej.exe134⤵PID:6044
-
C:\Windows\SysWOW64\Jcbihpel.exeC:\Windows\system32\Jcbihpel.exe135⤵PID:4968
-
C:\Windows\SysWOW64\Jfaedkdp.exeC:\Windows\system32\Jfaedkdp.exe136⤵PID:5328
-
C:\Windows\SysWOW64\Jioaqfcc.exeC:\Windows\system32\Jioaqfcc.exe137⤵PID:5612
-
C:\Windows\SysWOW64\Jbhfjljd.exeC:\Windows\system32\Jbhfjljd.exe138⤵PID:5768
-
C:\Windows\SysWOW64\Jianff32.exeC:\Windows\system32\Jianff32.exe139⤵PID:5940
-
C:\Windows\SysWOW64\Jplfcpin.exeC:\Windows\system32\Jplfcpin.exe140⤵PID:5336
-
C:\Windows\SysWOW64\Jbjcolha.exeC:\Windows\system32\Jbjcolha.exe141⤵PID:5468
-
C:\Windows\SysWOW64\Jidklf32.exeC:\Windows\system32\Jidklf32.exe142⤵PID:5984
-
C:\Windows\SysWOW64\Jpnchp32.exeC:\Windows\system32\Jpnchp32.exe143⤵PID:5452
-
C:\Windows\SysWOW64\Jlednamo.exeC:\Windows\system32\Jlednamo.exe144⤵PID:6140
-
C:\Windows\SysWOW64\Jcllonma.exeC:\Windows\system32\Jcllonma.exe145⤵PID:5840
-
C:\Windows\SysWOW64\Kfjhkjle.exeC:\Windows\system32\Kfjhkjle.exe146⤵PID:6148
-
C:\Windows\SysWOW64\Kiidgeki.exeC:\Windows\system32\Kiidgeki.exe147⤵PID:6192
-
C:\Windows\SysWOW64\Kdnidn32.exeC:\Windows\system32\Kdnidn32.exe148⤵PID:6240
-
C:\Windows\SysWOW64\Kbaipkbi.exeC:\Windows\system32\Kbaipkbi.exe149⤵PID:6284
-
C:\Windows\SysWOW64\Kikame32.exeC:\Windows\system32\Kikame32.exe150⤵PID:6324
-
C:\Windows\SysWOW64\Kmfmmcbo.exeC:\Windows\system32\Kmfmmcbo.exe151⤵PID:6360
-
C:\Windows\SysWOW64\Kpeiioac.exeC:\Windows\system32\Kpeiioac.exe152⤵PID:6408
-
C:\Windows\SysWOW64\Kbceejpf.exeC:\Windows\system32\Kbceejpf.exe153⤵PID:6452
-
C:\Windows\SysWOW64\Kebbafoj.exeC:\Windows\system32\Kebbafoj.exe154⤵PID:6492
-
C:\Windows\SysWOW64\Kimnbd32.exeC:\Windows\system32\Kimnbd32.exe155⤵PID:6532
-
C:\Windows\SysWOW64\Kmijbcpl.exeC:\Windows\system32\Kmijbcpl.exe156⤵PID:6572
-
C:\Windows\SysWOW64\Kpgfooop.exeC:\Windows\system32\Kpgfooop.exe157⤵PID:6612
-
C:\Windows\SysWOW64\Kdcbom32.exeC:\Windows\system32\Kdcbom32.exe158⤵PID:6660
-
C:\Windows\SysWOW64\Kbfbkj32.exeC:\Windows\system32\Kbfbkj32.exe159⤵PID:6700
-
C:\Windows\SysWOW64\Kedoge32.exeC:\Windows\system32\Kedoge32.exe160⤵PID:6744
-
C:\Windows\SysWOW64\Kipkhdeq.exeC:\Windows\system32\Kipkhdeq.exe161⤵PID:6780
-
C:\Windows\SysWOW64\Kmkfhc32.exeC:\Windows\system32\Kmkfhc32.exe162⤵PID:6820
-
C:\Windows\SysWOW64\Kdeoemeg.exeC:\Windows\system32\Kdeoemeg.exe163⤵PID:6864
-
C:\Windows\SysWOW64\Kbhoqj32.exeC:\Windows\system32\Kbhoqj32.exe164⤵PID:6896
-
C:\Windows\SysWOW64\Kefkme32.exeC:\Windows\system32\Kefkme32.exe165⤵PID:6940
-
C:\Windows\SysWOW64\Kibgmdcn.exeC:\Windows\system32\Kibgmdcn.exe166⤵PID:6976
-
C:\Windows\SysWOW64\Klqcioba.exeC:\Windows\system32\Klqcioba.exe167⤵PID:7008
-
C:\Windows\SysWOW64\Kplpjn32.exeC:\Windows\system32\Kplpjn32.exe168⤵PID:7052
-
C:\Windows\SysWOW64\Kdgljmcd.exeC:\Windows\system32\Kdgljmcd.exe169⤵PID:7088
-
C:\Windows\SysWOW64\Lffhfh32.exeC:\Windows\system32\Lffhfh32.exe170⤵PID:7132
-
C:\Windows\SysWOW64\Liddbc32.exeC:\Windows\system32\Liddbc32.exe171⤵PID:5624
-
C:\Windows\SysWOW64\Lmppcbjd.exeC:\Windows\system32\Lmppcbjd.exe172⤵
- Drops file in System32 directory
PID:6180 -
C:\Windows\SysWOW64\Ldjhpl32.exeC:\Windows\system32\Ldjhpl32.exe173⤵PID:6260
-
C:\Windows\SysWOW64\Lbmhlihl.exeC:\Windows\system32\Lbmhlihl.exe174⤵PID:6316
-
C:\Windows\SysWOW64\Lfhdlh32.exeC:\Windows\system32\Lfhdlh32.exe175⤵PID:6388
-
C:\Windows\SysWOW64\Ligqhc32.exeC:\Windows\system32\Ligqhc32.exe176⤵PID:6484
-
C:\Windows\SysWOW64\Lmbmibhb.exeC:\Windows\system32\Lmbmibhb.exe177⤵PID:6520
-
C:\Windows\SysWOW64\Lpqiemge.exeC:\Windows\system32\Lpqiemge.exe178⤵
- Drops file in System32 directory
PID:6604 -
C:\Windows\SysWOW64\Lboeaifi.exeC:\Windows\system32\Lboeaifi.exe179⤵PID:6668
-
C:\Windows\SysWOW64\Lfkaag32.exeC:\Windows\system32\Lfkaag32.exe180⤵PID:6732
-
C:\Windows\SysWOW64\Lmdina32.exeC:\Windows\system32\Lmdina32.exe181⤵PID:6828
-
C:\Windows\SysWOW64\Lpcfkm32.exeC:\Windows\system32\Lpcfkm32.exe182⤵PID:6884
-
C:\Windows\SysWOW64\Lbabgh32.exeC:\Windows\system32\Lbabgh32.exe183⤵PID:6948
-
C:\Windows\SysWOW64\Lepncd32.exeC:\Windows\system32\Lepncd32.exe184⤵PID:7004
-
C:\Windows\SysWOW64\Likjcbkc.exeC:\Windows\system32\Likjcbkc.exe185⤵PID:7080
-
C:\Windows\SysWOW64\Lljfpnjg.exeC:\Windows\system32\Lljfpnjg.exe186⤵PID:7152
-
C:\Windows\SysWOW64\Lpebpm32.exeC:\Windows\system32\Lpebpm32.exe187⤵PID:6184
-
C:\Windows\SysWOW64\Ldanqkki.exeC:\Windows\system32\Ldanqkki.exe188⤵PID:6312
-
C:\Windows\SysWOW64\Lgokmgjm.exeC:\Windows\system32\Lgokmgjm.exe189⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6400 -
C:\Windows\SysWOW64\Lebkhc32.exeC:\Windows\system32\Lebkhc32.exe190⤵PID:6540
-
C:\Windows\SysWOW64\Lingibiq.exeC:\Windows\system32\Lingibiq.exe191⤵PID:6656
-
C:\Windows\SysWOW64\Lllcen32.exeC:\Windows\system32\Lllcen32.exe192⤵PID:6812
-
C:\Windows\SysWOW64\Lphoelqn.exeC:\Windows\system32\Lphoelqn.exe193⤵
- Modifies registry class
PID:6892 -
C:\Windows\SysWOW64\Mdckfk32.exeC:\Windows\system32\Mdckfk32.exe194⤵PID:7036
-
C:\Windows\SysWOW64\Mgagbf32.exeC:\Windows\system32\Mgagbf32.exe195⤵PID:6220
-
C:\Windows\SysWOW64\Medgncoe.exeC:\Windows\system32\Medgncoe.exe196⤵PID:6304
-
C:\Windows\SysWOW64\Mipcob32.exeC:\Windows\system32\Mipcob32.exe197⤵
- Modifies registry class
PID:6444 -
C:\Windows\SysWOW64\Mlopkm32.exeC:\Windows\system32\Mlopkm32.exe198⤵PID:6652
-
C:\Windows\SysWOW64\Mpjlklok.exeC:\Windows\system32\Mpjlklok.exe199⤵PID:6856
-
C:\Windows\SysWOW64\Mchhggno.exeC:\Windows\system32\Mchhggno.exe200⤵PID:7156
-
C:\Windows\SysWOW64\Mgddhf32.exeC:\Windows\system32\Mgddhf32.exe201⤵PID:6232
-
C:\Windows\SysWOW64\Megdccmb.exeC:\Windows\system32\Megdccmb.exe202⤵PID:6596
-
C:\Windows\SysWOW64\Mmnldp32.exeC:\Windows\system32\Mmnldp32.exe203⤵PID:7040
-
C:\Windows\SysWOW64\Mlampmdo.exeC:\Windows\system32\Mlampmdo.exe204⤵PID:6512
-
C:\Windows\SysWOW64\Mdhdajea.exeC:\Windows\system32\Mdhdajea.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6804 -
C:\Windows\SysWOW64\Mckemg32.exeC:\Windows\system32\Mckemg32.exe206⤵PID:6968
-
C:\Windows\SysWOW64\Mgfqmfde.exeC:\Windows\system32\Mgfqmfde.exe207⤵PID:7176
-
C:\Windows\SysWOW64\Miemjaci.exeC:\Windows\system32\Miemjaci.exe208⤵PID:7216
-
C:\Windows\SysWOW64\Mlcifmbl.exeC:\Windows\system32\Mlcifmbl.exe209⤵PID:7256
-
C:\Windows\SysWOW64\Mdjagjco.exeC:\Windows\system32\Mdjagjco.exe210⤵PID:7296
-
C:\Windows\SysWOW64\Mcmabg32.exeC:\Windows\system32\Mcmabg32.exe211⤵
- Drops file in System32 directory
PID:7332 -
C:\Windows\SysWOW64\Melnob32.exeC:\Windows\system32\Melnob32.exe212⤵PID:7376
-
C:\Windows\SysWOW64\Mmbfpp32.exeC:\Windows\system32\Mmbfpp32.exe213⤵PID:7416
-
C:\Windows\SysWOW64\Mpablkhc.exeC:\Windows\system32\Mpablkhc.exe214⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7468 -
C:\Windows\SysWOW64\Mdmnlj32.exeC:\Windows\system32\Mdmnlj32.exe215⤵PID:7512
-
C:\Windows\SysWOW64\Mcpnhfhf.exeC:\Windows\system32\Mcpnhfhf.exe216⤵PID:7572
-
C:\Windows\SysWOW64\Menjdbgj.exeC:\Windows\system32\Menjdbgj.exe217⤵PID:7608
-
C:\Windows\SysWOW64\Miifeq32.exeC:\Windows\system32\Miifeq32.exe218⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7648 -
C:\Windows\SysWOW64\Mnebeogl.exeC:\Windows\system32\Mnebeogl.exe219⤵PID:7688
-
C:\Windows\SysWOW64\Npcoakfp.exeC:\Windows\system32\Npcoakfp.exe220⤵PID:7724
-
C:\Windows\SysWOW64\Ncbknfed.exeC:\Windows\system32\Ncbknfed.exe221⤵PID:7764
-
C:\Windows\SysWOW64\Ngmgne32.exeC:\Windows\system32\Ngmgne32.exe222⤵PID:7800
-
C:\Windows\SysWOW64\Nilcjp32.exeC:\Windows\system32\Nilcjp32.exe223⤵PID:7844
-
C:\Windows\SysWOW64\Nljofl32.exeC:\Windows\system32\Nljofl32.exe224⤵PID:7884
-
C:\Windows\SysWOW64\Ndaggimg.exeC:\Windows\system32\Ndaggimg.exe225⤵PID:7924
-
C:\Windows\SysWOW64\Ncdgcf32.exeC:\Windows\system32\Ncdgcf32.exe226⤵PID:7960
-
C:\Windows\SysWOW64\Nebdoa32.exeC:\Windows\system32\Nebdoa32.exe227⤵PID:8004
-
C:\Windows\SysWOW64\Njnpppkn.exeC:\Windows\system32\Njnpppkn.exe228⤵PID:8040
-
C:\Windows\SysWOW64\Nlmllkja.exeC:\Windows\system32\Nlmllkja.exe229⤵PID:8080
-
C:\Windows\SysWOW64\Ndcdmikd.exeC:\Windows\system32\Ndcdmikd.exe230⤵PID:8116
-
C:\Windows\SysWOW64\Ncfdie32.exeC:\Windows\system32\Ncfdie32.exe231⤵PID:8156
-
C:\Windows\SysWOW64\Ngbpidjh.exeC:\Windows\system32\Ngbpidjh.exe232⤵PID:6880
-
C:\Windows\SysWOW64\Njqmepik.exeC:\Windows\system32\Njqmepik.exe233⤵PID:7224
-
C:\Windows\SysWOW64\Nnlhfn32.exeC:\Windows\system32\Nnlhfn32.exe234⤵PID:7288
-
C:\Windows\SysWOW64\Npjebj32.exeC:\Windows\system32\Npjebj32.exe235⤵PID:7352
-
C:\Windows\SysWOW64\Ndfqbhia.exeC:\Windows\system32\Ndfqbhia.exe236⤵PID:7408
-
C:\Windows\SysWOW64\Nfgmjqop.exeC:\Windows\system32\Nfgmjqop.exe237⤵PID:7500
-
C:\Windows\SysWOW64\Nlaegk32.exeC:\Windows\system32\Nlaegk32.exe238⤵PID:7592
-
C:\Windows\SysWOW64\Ndhmhh32.exeC:\Windows\system32\Ndhmhh32.exe239⤵
- Drops file in System32 directory
- Modifies registry class
PID:7656 -
C:\Windows\SysWOW64\Nggjdc32.exeC:\Windows\system32\Nggjdc32.exe240⤵PID:7720
-
C:\Windows\SysWOW64\Nnqbanmo.exeC:\Windows\system32\Nnqbanmo.exe241⤵
- Modifies registry class
PID:7784 -
C:\Windows\SysWOW64\Oflgep32.exeC:\Windows\system32\Oflgep32.exe242⤵PID:7880