Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe
Resource
win10v2004-20240802-en
General
-
Target
f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe
-
Size
320KB
-
MD5
c640290c04cbd946b2e307f19becf3f8
-
SHA1
f2269484ce77c13a8abae3dfc1d6118820b3a5cd
-
SHA256
f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1
-
SHA512
86217c6733969771dcc3b0bc05bfecda26de6ae566c12d2565cc5e0e95a4acc3b8fc92fb03dfa4983e17d15ef03d4a528d5c15cb27c6b8899b671c08377c3bdd
-
SSDEEP
6144:KMDGdK4A7V+tbFOLM77OLnFe3HCqxNRmJ4PavntPRD:HDGJltsNePmjvtPRD
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmmjjp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgealbdl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihmkhgfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pqknlbmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohpidaig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjpbdi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmmefd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qjehpanb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cameeg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdjgio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kjffglgm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbmnhjho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdaddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Facghh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ihknbhhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpkibcbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qgfldf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ginpff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajoaqfjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anmjfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cegljmid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfcdjm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehapid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hhfegh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Femgcg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lehakj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Haefjojl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Leenkdoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlnpnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgminggi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nonkjggf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Limnep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gdmcpb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opljpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnghdh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdkgjb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfejfk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qleaamkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ooijfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jenenmgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjcmhmdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bnhjbcfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dokpoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nlpeib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhkpib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oognqfok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hejjfgmb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eagabceo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lnflcjlq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obbjad32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajbeql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nnilcjnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Edfdhego.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfcmqknf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajcdapbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdhcjlcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hdepkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jbqplhkf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbjcbgcl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdgffq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Figoae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jeolhdjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmmjjp32.exe -
Executes dropped EXE 64 IoCs
pid Process 4728 Ajbeql32.exe 1552 Abimaj32.exe 3236 Anpnfkac.exe 3256 Adlfoapj.exe 4336 Ajfoll32.exe 4596 Belcidgm.exe 4820 Bjikaked.exe 4656 Bdapja32.exe 4304 Blhhkn32.exe 1876 Beqldd32.exe 2324 Bjnelk32.exe 2068 Bagmiehl.exe 4272 Bjpabj32.exe 2056 Bajjodfi.exe 4428 Blonlm32.exe 4996 Bbifhgnl.exe 1796 Cdjbpp32.exe 220 Copgnh32.exe 1136 Cejojb32.exe 4008 Chhkfn32.exe 1424 Cellpb32.exe 1632 Clfdllpg.exe 1468 Coephhok.exe 2448 Cdaiaonb.exe 3612 Caeijc32.exe 3672 Clkngl32.exe 3920 Ddfbln32.exe 3444 Dkpjih32.exe 4564 Defofa32.exe 4776 Dbjooe32.exe 3968 Ddklgmeg.exe 4288 Dclleemf.exe 1752 Ddmhmm32.exe 3508 Dkgqigka.exe 924 Dcnhjdkd.exe 3476 Ddpebm32.exe 672 Dlgmcj32.exe 4500 Ecqepd32.exe 3108 Ekljdf32.exe 2172 Eccbed32.exe 412 Elkfnino.exe 448 Eceokcel.exe 3872 Edgkcl32.exe 3896 Ekqcpfbg.exe 2504 Echkqcci.exe 2532 Ehddijaq.exe 1236 Ekcpeeqd.exe 4968 Ecjhfcaf.exe 1920 Eehdbn32.exe 1840 Ehgqoj32.exe 3512 Ekemke32.exe 2296 Faoegofo.exe 4792 Fdnackeb.exe 2376 Foceqceh.exe 3448 Faabmodl.exe 2936 Fdpnij32.exe 620 Fhljjiki.exe 2536 Fkjffdjl.exe 1416 Ffpjcmjb.exe 4308 Fhngoiif.exe 3856 Foholc32.exe 1036 Fccklail.exe 1640 Fdegdj32.exe 4164 Fojlabop.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Fojlabop.exe Fdegdj32.exe File created C:\Windows\SysWOW64\Femfed32.dll Cihjij32.exe File created C:\Windows\SysWOW64\Feekec32.dll Dhcmmphl.exe File created C:\Windows\SysWOW64\Lgmpam32.dll Defofa32.exe File created C:\Windows\SysWOW64\Fhhfjc32.exe Faonmibc.exe File created C:\Windows\SysWOW64\Oinajefi.dll Gajgnadj.exe File opened for modification C:\Windows\SysWOW64\Haefjojl.exe Hkknme32.exe File created C:\Windows\SysWOW64\Gchdga32.exe Flnlkgnj.exe File opened for modification C:\Windows\SysWOW64\Ilmeip32.exe Imjdmcej.exe File created C:\Windows\SysWOW64\Pojjom32.dll Mcabjcoa.exe File opened for modification C:\Windows\SysWOW64\Ajoaqfjc.exe Agpedkjp.exe File opened for modification C:\Windows\SysWOW64\Foholc32.exe Fhngoiif.exe File created C:\Windows\SysWOW64\Dmlcennd.exe Djmgiboq.exe File created C:\Windows\SysWOW64\Mlfcbc32.exe Mihffh32.exe File created C:\Windows\SysWOW64\Jbgfmg32.exe Jpijql32.exe File opened for modification C:\Windows\SysWOW64\Pgbicm32.exe Pddmga32.exe File created C:\Windows\SysWOW64\Kddajffm.dll Idpilp32.exe File opened for modification C:\Windows\SysWOW64\Nhkpib32.exe Nemcmg32.exe File created C:\Windows\SysWOW64\Qleaamkc.exe Qjgdealp.exe File opened for modification C:\Windows\SysWOW64\Bimkmk32.exe Bgknfcmf.exe File created C:\Windows\SysWOW64\Ekjaab32.dll Hjlacb32.exe File opened for modification C:\Windows\SysWOW64\Djaiikgp.exe Dhcmmphl.exe File created C:\Windows\SysWOW64\Pkgfhh32.dll Bjpabj32.exe File created C:\Windows\SysWOW64\Fojlabop.exe Fdegdj32.exe File opened for modification C:\Windows\SysWOW64\Ifgbahhe.exe Icifelia.exe File created C:\Windows\SysWOW64\Ndagjd32.exe Nljoig32.exe File created C:\Windows\SysWOW64\Ehmgne32.exe Edakmf32.exe File created C:\Windows\SysWOW64\Ndnojjpq.dll Nemcmg32.exe File opened for modification C:\Windows\SysWOW64\Phcopoib.exe Pjpoeb32.exe File opened for modification C:\Windows\SysWOW64\Gdffem32.exe Gpjjdnmg.exe File created C:\Windows\SysWOW64\Caahgabp.dll Ibhlfmjg.exe File opened for modification C:\Windows\SysWOW64\Mibpgm32.exe Mgddka32.exe File created C:\Windows\SysWOW64\Hhlohbjc.dll Cegljmid.exe File created C:\Windows\SysWOW64\Henpnf32.dll Dmpeeg32.exe File created C:\Windows\SysWOW64\Kgjgqqff.exe Kelkdegc.exe File created C:\Windows\SysWOW64\Libnjkek.dll Fnhlgjfd.exe File opened for modification C:\Windows\SysWOW64\Hkqockbf.exe Hgebbl32.exe File created C:\Windows\SysWOW64\Pcicjbln.dll Ohbfiage.exe File opened for modification C:\Windows\SysWOW64\Bijnhleg.exe Bflalped.exe File created C:\Windows\SysWOW64\Naelif32.dll Dplelbhj.exe File created C:\Windows\SysWOW64\Cjddbcgk.exe Chehfhhh.exe File created C:\Windows\SysWOW64\Eaafniao.dll Ekkcjp32.exe File opened for modification C:\Windows\SysWOW64\Fgpifi32.exe Fdamjmje.exe File opened for modification C:\Windows\SysWOW64\Hajpeo32.exe Hgdlhf32.exe File created C:\Windows\SysWOW64\Hfgjjj32.exe Hchmno32.exe File created C:\Windows\SysWOW64\Kbcehe32.exe Kdpemidf.exe File created C:\Windows\SysWOW64\Nnilcjnb.exe Ngpcgp32.exe File created C:\Windows\SysWOW64\Qhigml32.dll Dmlcennd.exe File opened for modification C:\Windows\SysWOW64\Edakmf32.exe Emgbqldg.exe File created C:\Windows\SysWOW64\Gaadif32.exe Gnfhihjd.exe File created C:\Windows\SysWOW64\Djmpnlle.exe Dfadnmcl.exe File opened for modification C:\Windows\SysWOW64\Lfgndmhd.exe Lopecoga.exe File created C:\Windows\SysWOW64\Moeooo32.exe Mlfcbc32.exe File created C:\Windows\SysWOW64\Mndhdh32.exe Mjilcjgg.exe File created C:\Windows\SysWOW64\Apbmcabf.dll Jeainchg.exe File created C:\Windows\SysWOW64\Pggbnlbj.exe Pdhfbacf.exe File created C:\Windows\SysWOW64\Hbfmdfnh.exe Hnjadg32.exe File created C:\Windows\SysWOW64\Igkbjdkg.dll Gmqgcb32.exe File opened for modification C:\Windows\SysWOW64\Hdfolj32.exe Hhoogi32.exe File opened for modification C:\Windows\SysWOW64\Oeafmpfh.exe Obbjad32.exe File opened for modification C:\Windows\SysWOW64\Fdegdj32.exe Fccklail.exe File created C:\Windows\SysWOW64\Qimepcnl.dll Gfimilbh.exe File created C:\Windows\SysWOW64\Jnblbdep.dll Fhhfjc32.exe File created C:\Windows\SysWOW64\Mjdelaiq.dll Bggdkd32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 17216 17068 WerFault.exe 929 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ockngp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qmfhlcoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mliphc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjpabj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mmgfgl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnhjbcfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cdcolh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Efffpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gchdga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilmeip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keoeoa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eimlkg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Clkngl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gdkgjb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mdehof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fhhfjc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Idpilp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nonbem32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kejeilma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pcdjbh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkdbca32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceihplga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dokpoq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fahachjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Najjachl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ghgiegak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmppfm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldjhcgll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgebbl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cameeg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dcbhabdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Moknegii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edemnodc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fgmmpikl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gipbgd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bnkfhcdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afekka32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bqoicigl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bcnepefp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Llljak32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmbmlmbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bgknfcmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Afaijhcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inhneeio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ohgodq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifklkc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agdhedco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lnmbci32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kdnigifi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkqockbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijjndppm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oflfhkee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onlhii32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pnghdh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ppemfm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjlggnjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mjkiiiee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mepnfone.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jfglgadi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kihnpj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ifgbahhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfanod32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edakmf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hnjadg32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ahlafnag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cjcmhmdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nlfeokbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Elkfnino.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pjnijihf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnnamhjg.dll" Pjqeoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfoghlee.dll" Mbchemic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpdgnf32.dll" Mhppmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ddfbln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Npedpoll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hofjpicj.dll" Finebd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Clfdllpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qcnccm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lnipcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qflpoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ehlpcopa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Moknegii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gggfanfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Faabmodl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Homanp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nenjgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Acgfil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pdhfbacf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Igekijlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noljgjnp.dll" Plgdpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blhhkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Piaaoafh.dll" Hkdbca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jfcbmfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcmgof32.dll" Llpcljnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhcmmphl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkhgffop.dll" Ajbeql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmfdnh32.dll" Faoegofo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ldlehg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Momljmek.dll" Afaijhcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nccqlkkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ioclgmed.dll" Cpbbfdpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dpnbab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kikdno32.dll" Ecqepd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jpbdpmlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ibffkcpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iomcjgml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nekgggpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ifbifh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gafgdm32.dll" Ngpcgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Defchg32.dll" Mbqkomke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fdopdnlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcecpc32.dll" Hbnjpkll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mikclg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iacbkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mbkkjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ildnfqjp.dll" Efffpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lkjllojj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nblcqenl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Homanp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kmfmpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aamchpmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Agmbde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cifmcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cekhhg32.dll" Naaqabbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddfbln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kifcfdmk.dll" Kbolmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Llpcljnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nnbebk32.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\1 igH34qf?<:bV*{f#r!-fV(nUd4:7853-f>lD1)5"-fvu3L1y`.}1x$`Vig:8pgi}H2-`f!9dvL1vcWFs?:5#y7"pH5#yfs?H9!y8(:?*:5!pH34qfs?H;(:?*\s|&V(nUd4:.(C1V=ZY*hp5K{L1)`2?!q #8<D.d=DziaOmL1)x Oahgba32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 4728 4108 f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe 81 PID 4108 wrote to memory of 4728 4108 f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe 81 PID 4108 wrote to memory of 4728 4108 f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe 81 PID 4728 wrote to memory of 1552 4728 Ajbeql32.exe 82 PID 4728 wrote to memory of 1552 4728 Ajbeql32.exe 82 PID 4728 wrote to memory of 1552 4728 Ajbeql32.exe 82 PID 1552 wrote to memory of 3236 1552 Abimaj32.exe 83 PID 1552 wrote to memory of 3236 1552 Abimaj32.exe 83 PID 1552 wrote to memory of 3236 1552 Abimaj32.exe 83 PID 3236 wrote to memory of 3256 3236 Anpnfkac.exe 84 PID 3236 wrote to memory of 3256 3236 Anpnfkac.exe 84 PID 3236 wrote to memory of 3256 3236 Anpnfkac.exe 84 PID 3256 wrote to memory of 4336 3256 Adlfoapj.exe 85 PID 3256 wrote to memory of 4336 3256 Adlfoapj.exe 85 PID 3256 wrote to memory of 4336 3256 Adlfoapj.exe 85 PID 4336 wrote to memory of 4596 4336 Ajfoll32.exe 86 PID 4336 wrote to memory of 4596 4336 Ajfoll32.exe 86 PID 4336 wrote to memory of 4596 4336 Ajfoll32.exe 86 PID 4596 wrote to memory of 4820 4596 Belcidgm.exe 87 PID 4596 wrote to memory of 4820 4596 Belcidgm.exe 87 PID 4596 wrote to memory of 4820 4596 Belcidgm.exe 87 PID 4820 wrote to memory of 4656 4820 Bjikaked.exe 88 PID 4820 wrote to memory of 4656 4820 Bjikaked.exe 88 PID 4820 wrote to memory of 4656 4820 Bjikaked.exe 88 PID 4656 wrote to memory of 4304 4656 Bdapja32.exe 89 PID 4656 wrote to memory of 4304 4656 Bdapja32.exe 89 PID 4656 wrote to memory of 4304 4656 Bdapja32.exe 89 PID 4304 wrote to memory of 1876 4304 Blhhkn32.exe 90 PID 4304 wrote to memory of 1876 4304 Blhhkn32.exe 90 PID 4304 wrote to memory of 1876 4304 Blhhkn32.exe 90 PID 1876 wrote to memory of 2324 1876 Beqldd32.exe 91 PID 1876 wrote to memory of 2324 1876 Beqldd32.exe 91 PID 1876 wrote to memory of 2324 1876 Beqldd32.exe 91 PID 2324 wrote to memory of 2068 2324 Bjnelk32.exe 92 PID 2324 wrote to memory of 2068 2324 Bjnelk32.exe 92 PID 2324 wrote to memory of 2068 2324 Bjnelk32.exe 92 PID 2068 wrote to memory of 4272 2068 Bagmiehl.exe 93 PID 2068 wrote to memory of 4272 2068 Bagmiehl.exe 93 PID 2068 wrote to memory of 4272 2068 Bagmiehl.exe 93 PID 4272 wrote to memory of 2056 4272 Bjpabj32.exe 94 PID 4272 wrote to memory of 2056 4272 Bjpabj32.exe 94 PID 4272 wrote to memory of 2056 4272 Bjpabj32.exe 94 PID 2056 wrote to memory of 4428 2056 Bajjodfi.exe 95 PID 2056 wrote to memory of 4428 2056 Bajjodfi.exe 95 PID 2056 wrote to memory of 4428 2056 Bajjodfi.exe 95 PID 4428 wrote to memory of 4996 4428 Blonlm32.exe 96 PID 4428 wrote to memory of 4996 4428 Blonlm32.exe 96 PID 4428 wrote to memory of 4996 4428 Blonlm32.exe 96 PID 4996 wrote to memory of 1796 4996 Bbifhgnl.exe 97 PID 4996 wrote to memory of 1796 4996 Bbifhgnl.exe 97 PID 4996 wrote to memory of 1796 4996 Bbifhgnl.exe 97 PID 1796 wrote to memory of 220 1796 Cdjbpp32.exe 98 PID 1796 wrote to memory of 220 1796 Cdjbpp32.exe 98 PID 1796 wrote to memory of 220 1796 Cdjbpp32.exe 98 PID 220 wrote to memory of 1136 220 Copgnh32.exe 99 PID 220 wrote to memory of 1136 220 Copgnh32.exe 99 PID 220 wrote to memory of 1136 220 Copgnh32.exe 99 PID 1136 wrote to memory of 4008 1136 Cejojb32.exe 100 PID 1136 wrote to memory of 4008 1136 Cejojb32.exe 100 PID 1136 wrote to memory of 4008 1136 Cejojb32.exe 100 PID 4008 wrote to memory of 1424 4008 Chhkfn32.exe 101 PID 4008 wrote to memory of 1424 4008 Chhkfn32.exe 101 PID 4008 wrote to memory of 1424 4008 Chhkfn32.exe 101 PID 1424 wrote to memory of 1632 1424 Cellpb32.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe"C:\Users\Admin\AppData\Local\Temp\f089b33f023d3bc243a2bae12f2ed3dc87d196b845db648292b31e6f0220b2c1.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\Ajbeql32.exeC:\Windows\system32\Ajbeql32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\Abimaj32.exeC:\Windows\system32\Abimaj32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\Anpnfkac.exeC:\Windows\system32\Anpnfkac.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\Adlfoapj.exeC:\Windows\system32\Adlfoapj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\Ajfoll32.exeC:\Windows\system32\Ajfoll32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\Belcidgm.exeC:\Windows\system32\Belcidgm.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\Bjikaked.exeC:\Windows\system32\Bjikaked.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\Bdapja32.exeC:\Windows\system32\Bdapja32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\Blhhkn32.exeC:\Windows\system32\Blhhkn32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\Beqldd32.exeC:\Windows\system32\Beqldd32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\Bjnelk32.exeC:\Windows\system32\Bjnelk32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\Bagmiehl.exeC:\Windows\system32\Bagmiehl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\Bjpabj32.exeC:\Windows\system32\Bjpabj32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\Bajjodfi.exeC:\Windows\system32\Bajjodfi.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Blonlm32.exeC:\Windows\system32\Blonlm32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\Bbifhgnl.exeC:\Windows\system32\Bbifhgnl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\Cdjbpp32.exeC:\Windows\system32\Cdjbpp32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\Copgnh32.exeC:\Windows\system32\Copgnh32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Cejojb32.exeC:\Windows\system32\Cejojb32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\Chhkfn32.exeC:\Windows\system32\Chhkfn32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\Cellpb32.exeC:\Windows\system32\Cellpb32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\Clfdllpg.exeC:\Windows\system32\Clfdllpg.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Coephhok.exeC:\Windows\system32\Coephhok.exe24⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\Cdaiaonb.exeC:\Windows\system32\Cdaiaonb.exe25⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\Caeijc32.exeC:\Windows\system32\Caeijc32.exe26⤵
- Executes dropped EXE
PID:3612 -
C:\Windows\SysWOW64\Clkngl32.exeC:\Windows\system32\Clkngl32.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Windows\SysWOW64\Ddfbln32.exeC:\Windows\system32\Ddfbln32.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:3920 -
C:\Windows\SysWOW64\Dkpjih32.exeC:\Windows\system32\Dkpjih32.exe29⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\Defofa32.exeC:\Windows\system32\Defofa32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4564 -
C:\Windows\SysWOW64\Dbjooe32.exeC:\Windows\system32\Dbjooe32.exe31⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\Ddklgmeg.exeC:\Windows\system32\Ddklgmeg.exe32⤵
- Executes dropped EXE
PID:3968 -
C:\Windows\SysWOW64\Dclleemf.exeC:\Windows\system32\Dclleemf.exe33⤵
- Executes dropped EXE
PID:4288 -
C:\Windows\SysWOW64\Ddmhmm32.exeC:\Windows\system32\Ddmhmm32.exe34⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\Dkgqigka.exeC:\Windows\system32\Dkgqigka.exe35⤵
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\Dcnhjdkd.exeC:\Windows\system32\Dcnhjdkd.exe36⤵
- Executes dropped EXE
PID:924 -
C:\Windows\SysWOW64\Ddpebm32.exeC:\Windows\system32\Ddpebm32.exe37⤵
- Executes dropped EXE
PID:3476 -
C:\Windows\SysWOW64\Dlgmcj32.exeC:\Windows\system32\Dlgmcj32.exe38⤵
- Executes dropped EXE
PID:672 -
C:\Windows\SysWOW64\Ecqepd32.exeC:\Windows\system32\Ecqepd32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:4500 -
C:\Windows\SysWOW64\Ekljdf32.exeC:\Windows\system32\Ekljdf32.exe40⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\SysWOW64\Eccbed32.exeC:\Windows\system32\Eccbed32.exe41⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\Eddomlmm.exeC:\Windows\system32\Eddomlmm.exe42⤵PID:1028
-
C:\Windows\SysWOW64\Elkfnino.exeC:\Windows\system32\Elkfnino.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:412 -
C:\Windows\SysWOW64\Eceokcel.exeC:\Windows\system32\Eceokcel.exe44⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\Edgkcl32.exeC:\Windows\system32\Edgkcl32.exe45⤵
- Executes dropped EXE
PID:3872 -
C:\Windows\SysWOW64\Ekqcpfbg.exeC:\Windows\system32\Ekqcpfbg.exe46⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\Echkqcci.exeC:\Windows\system32\Echkqcci.exe47⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Ehddijaq.exeC:\Windows\system32\Ehddijaq.exe48⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\Ekcpeeqd.exeC:\Windows\system32\Ekcpeeqd.exe49⤵
- Executes dropped EXE
PID:1236 -
C:\Windows\SysWOW64\Ecjhfcaf.exeC:\Windows\system32\Ecjhfcaf.exe50⤵
- Executes dropped EXE
PID:4968 -
C:\Windows\SysWOW64\Eehdbn32.exeC:\Windows\system32\Eehdbn32.exe51⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\Ehgqoj32.exeC:\Windows\system32\Ehgqoj32.exe52⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\SysWOW64\Ekemke32.exeC:\Windows\system32\Ekemke32.exe53⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\Faoegofo.exeC:\Windows\system32\Faoegofo.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2296 -
C:\Windows\SysWOW64\Fdnackeb.exeC:\Windows\system32\Fdnackeb.exe55⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\Foceqceh.exeC:\Windows\system32\Foceqceh.exe56⤵
- Executes dropped EXE
PID:2376 -
C:\Windows\SysWOW64\Faabmodl.exeC:\Windows\system32\Faabmodl.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:3448 -
C:\Windows\SysWOW64\Fdpnij32.exeC:\Windows\system32\Fdpnij32.exe58⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\Fhljjiki.exeC:\Windows\system32\Fhljjiki.exe59⤵
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\Fkjffdjl.exeC:\Windows\system32\Fkjffdjl.exe60⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\Ffpjcmjb.exeC:\Windows\system32\Ffpjcmjb.exe61⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Fhngoiif.exeC:\Windows\system32\Fhngoiif.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4308 -
C:\Windows\SysWOW64\Foholc32.exeC:\Windows\system32\Foholc32.exe63⤵
- Executes dropped EXE
PID:3856 -
C:\Windows\SysWOW64\Fccklail.exeC:\Windows\system32\Fccklail.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1036 -
C:\Windows\SysWOW64\Fdegdj32.exeC:\Windows\system32\Fdegdj32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\Fojlabop.exeC:\Windows\system32\Fojlabop.exe66⤵
- Executes dropped EXE
PID:4164 -
C:\Windows\SysWOW64\Fdgdjimg.exeC:\Windows\system32\Fdgdjimg.exe67⤵PID:4496
-
C:\Windows\SysWOW64\Flnlkgnj.exeC:\Windows\system32\Flnlkgnj.exe68⤵
- Drops file in System32 directory
PID:4588 -
C:\Windows\SysWOW64\Gchdga32.exeC:\Windows\system32\Gchdga32.exe69⤵
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\Gffqcl32.exeC:\Windows\system32\Gffqcl32.exe70⤵PID:3688
-
C:\Windows\SysWOW64\Gdiaoike.exeC:\Windows\system32\Gdiaoike.exe71⤵PID:1040
-
C:\Windows\SysWOW64\Gkcilcba.exeC:\Windows\system32\Gkcilcba.exe72⤵PID:1084
-
C:\Windows\SysWOW64\Gbmaim32.exeC:\Windows\system32\Gbmaim32.exe73⤵PID:3116
-
C:\Windows\SysWOW64\Gfimilbh.exeC:\Windows\system32\Gfimilbh.exe74⤵
- Drops file in System32 directory
PID:3868 -
C:\Windows\SysWOW64\Ghgiegak.exeC:\Windows\system32\Ghgiegak.exe75⤵
- System Location Discovery: System Language Discovery
PID:940 -
C:\Windows\SysWOW64\Goabba32.exeC:\Windows\system32\Goabba32.exe76⤵PID:4640
-
C:\Windows\SysWOW64\Gcmnbpaa.exeC:\Windows\system32\Gcmnbpaa.exe77⤵PID:3328
-
C:\Windows\SysWOW64\Ghjfkgoi.exeC:\Windows\system32\Ghjfkgoi.exe78⤵PID:1916
-
C:\Windows\SysWOW64\Gocohafe.exeC:\Windows\system32\Gocohafe.exe79⤵PID:4664
-
C:\Windows\SysWOW64\Gcojhp32.exeC:\Windows\system32\Gcojhp32.exe80⤵PID:2952
-
C:\Windows\SysWOW64\Gdqgphem.exeC:\Windows\system32\Gdqgphem.exe81⤵PID:972
-
C:\Windows\SysWOW64\Gkjomb32.exeC:\Windows\system32\Gkjomb32.exe82⤵PID:2856
-
C:\Windows\SysWOW64\Gcagnp32.exeC:\Windows\system32\Gcagnp32.exe83⤵PID:4364
-
C:\Windows\SysWOW64\Ginpff32.exeC:\Windows\system32\Ginpff32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4832 -
C:\Windows\SysWOW64\Hkmlbb32.exeC:\Windows\system32\Hkmlbb32.exe85⤵PID:700
-
C:\Windows\SysWOW64\Hcddcoki.exeC:\Windows\system32\Hcddcoki.exe86⤵PID:3396
-
C:\Windows\SysWOW64\Hdepkg32.exeC:\Windows\system32\Hdepkg32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2640 -
C:\Windows\SysWOW64\Hokdhp32.exeC:\Windows\system32\Hokdhp32.exe88⤵PID:1780
-
C:\Windows\SysWOW64\Hbiadl32.exeC:\Windows\system32\Hbiadl32.exe89⤵PID:4812
-
C:\Windows\SysWOW64\Hegmqg32.exeC:\Windows\system32\Hegmqg32.exe90⤵PID:3040
-
C:\Windows\SysWOW64\Hmoead32.exeC:\Windows\system32\Hmoead32.exe91⤵PID:4624
-
C:\Windows\SysWOW64\Homanp32.exeC:\Windows\system32\Homanp32.exe92⤵
- Modifies registry class
PID:3048 -
C:\Windows\SysWOW64\Hchmno32.exeC:\Windows\system32\Hchmno32.exe93⤵
- Drops file in System32 directory
PID:2292 -
C:\Windows\SysWOW64\Hfgjjj32.exeC:\Windows\system32\Hfgjjj32.exe94⤵PID:4976
-
C:\Windows\SysWOW64\Hejjfgmb.exeC:\Windows\system32\Hejjfgmb.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1992 -
C:\Windows\SysWOW64\Hmabgdmd.exeC:\Windows\system32\Hmabgdmd.exe96⤵PID:2016
-
C:\Windows\SysWOW64\Hkdbca32.exeC:\Windows\system32\Hkdbca32.exe97⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\Hooncplh.exeC:\Windows\system32\Hooncplh.exe98⤵PID:2524
-
C:\Windows\SysWOW64\Hbnjpkll.exeC:\Windows\system32\Hbnjpkll.exe99⤵
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Hfifpj32.exeC:\Windows\system32\Hfifpj32.exe100⤵PID:1320
-
C:\Windows\SysWOW64\Hihble32.exeC:\Windows\system32\Hihble32.exe101⤵PID:4376
-
C:\Windows\SysWOW64\Hkfohq32.exeC:\Windows\system32\Hkfohq32.exe102⤵PID:1396
-
C:\Windows\SysWOW64\Hbpgekii.exeC:\Windows\system32\Hbpgekii.exe103⤵PID:3232
-
C:\Windows\SysWOW64\Ibbckj32.exeC:\Windows\system32\Ibbckj32.exe104⤵PID:4744
-
C:\Windows\SysWOW64\Iillgdoc.exeC:\Windows\system32\Iillgdoc.exe105⤵PID:4484
-
C:\Windows\SysWOW64\Ikkhcpng.exeC:\Windows\system32\Ikkhcpng.exe106⤵PID:512
-
C:\Windows\SysWOW64\Icbpdmoi.exeC:\Windows\system32\Icbpdmoi.exe107⤵PID:5144
-
C:\Windows\SysWOW64\Iecmledg.exeC:\Windows\system32\Iecmledg.exe108⤵PID:5188
-
C:\Windows\SysWOW64\Imjdmcej.exeC:\Windows\system32\Imjdmcej.exe109⤵
- Drops file in System32 directory
PID:5224 -
C:\Windows\SysWOW64\Ilmeip32.exeC:\Windows\system32\Ilmeip32.exe110⤵
- System Location Discovery: System Language Discovery
PID:5276 -
C:\Windows\SysWOW64\Icdmjm32.exeC:\Windows\system32\Icdmjm32.exe111⤵PID:5320
-
C:\Windows\SysWOW64\Ifbifh32.exeC:\Windows\system32\Ifbifh32.exe112⤵
- Modifies registry class
PID:5364 -
C:\Windows\SysWOW64\Icfjpm32.exeC:\Windows\system32\Icfjpm32.exe113⤵PID:5408
-
C:\Windows\SysWOW64\Ifeflh32.exeC:\Windows\system32\Ifeflh32.exe114⤵PID:5452
-
C:\Windows\SysWOW64\Iicbhcik.exeC:\Windows\system32\Iicbhcik.exe115⤵PID:5496
-
C:\Windows\SysWOW64\Ilbndoho.exeC:\Windows\system32\Ilbndoho.exe116⤵PID:5540
-
C:\Windows\SysWOW64\Icifelia.exeC:\Windows\system32\Icifelia.exe117⤵
- Drops file in System32 directory
PID:5584 -
C:\Windows\SysWOW64\Ifgbahhe.exeC:\Windows\system32\Ifgbahhe.exe118⤵
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Windows\SysWOW64\Jejcmd32.exeC:\Windows\system32\Jejcmd32.exe119⤵PID:5676
-
C:\Windows\SysWOW64\Jldkjofl.exeC:\Windows\system32\Jldkjofl.exe120⤵PID:5720
-
C:\Windows\SysWOW64\Jppgjm32.exeC:\Windows\system32\Jppgjm32.exe121⤵PID:5756
-
C:\Windows\SysWOW64\Jfjoggfb.exeC:\Windows\system32\Jfjoggfb.exe122⤵PID:5812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-