Analysis
-
max time kernel
245s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16-10-2023 18:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.6bb8c37026eea3c90d75edff34f10550.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.6bb8c37026eea3c90d75edff34f10550.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
NEAS.6bb8c37026eea3c90d75edff34f10550.exe
-
Size
300KB
-
MD5
6bb8c37026eea3c90d75edff34f10550
-
SHA1
dca48a635f90a52ca831a86eed5ae77547e0d5e5
-
SHA256
9b9bc64c0bf79d740bc7d21ac0956924ef042e8f18aa41a943da510a6f307b3f
-
SHA512
bdc71eac376476f898c3c37aa857f516fdad06aa487b6d5dd5f9dfeade08ed791dbfa24da1defb4da39349045fb9ddd6a0cbbc49596f4dc69cad6e4771fc2f8a
-
SSDEEP
6144:JaUeC+hQBqufhcmoZjwszeXmr8SeNpgdyuH1l+/Wd:JaU+hmymCjb87g4/c
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kamooe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldbalp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnipop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lqknfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmdlqa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohglfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpcbik32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amenfjfn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efngjalp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Paagkq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkjibnbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phiekdeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfgaibbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amfeodoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kojihjbi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nimeje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aklgabbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdhlahfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkmqhdfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffokan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjdcofpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncqmbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pplcabif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdekjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekmmgghe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Albpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkfemdlp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhjkai32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfgaibbh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Impblnna.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjbdnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlompl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikafpbon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbcaoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngecbndm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aghdboal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdbjcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekmmgghe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmkjog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aohbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejggepfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cokphejb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gldogjeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Algida32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqknfq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmdlqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aocifaog.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdekjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amenfjfn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eojpqpih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emdjbi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffokan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbcaoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dphlkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjmnck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oipdhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acmimdon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cciincqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnaffpoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Copjcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efngjalp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gffmqq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmgeedno.exe -
Executes dropped EXE 64 IoCs
pid Process 2932 Hgkknm32.exe 2496 Algida32.exe 2144 Aflmbj32.exe 1528 Amfeodoh.exe 2852 Alnoepam.exe 2748 Befcne32.exe 1652 Cehlbihg.exe 2668 Coqaknog.exe 536 Chiedc32.exe 2808 Cocnanmd.exe 1216 Dddodd32.exe 2532 Efoobkej.exe 2024 Eojpqpih.exe 1952 Eqklhh32.exe 2120 Ekcmkamj.exe 2240 Emdjbi32.exe 1768 Ffokan32.exe 1320 Fmkpchmp.exe 1800 Fefdhj32.exe 1712 Fmnmih32.exe 2324 Fnoiqpqk.exe 1628 Fidmniqa.exe 1160 Gnaffpoi.exe 1456 Gekncjfe.exe 2412 Glefpd32.exe 2016 Gabohk32.exe 1724 Glgcec32.exe 1736 Gmipmlan.exe 900 Gnhlgoia.exe 3032 Gffmqq32.exe 1580 Hidjml32.exe 2796 Hdjnje32.exe 2680 Hkoikcaq.exe 2656 Haiagm32.exe 3052 Ikafpbon.exe 1008 Impblnna.exe 2476 Idjjih32.exe 2888 Paagkq32.exe 2868 Imenpfap.exe 268 Opokbdhc.exe 2776 Jihgdd32.exe 3044 Jbqkmj32.exe 2996 Kpdlfn32.exe 2096 Koglbkdl.exe 2056 Keadoe32.exe 2256 Kojihjbi.exe 1364 Knabngen.exe 2372 Kamooe32.exe 108 Khgglp32.exe 1792 Llkijb32.exe 788 Ldbalp32.exe 1684 Ljoidf32.exe 1728 Lcgnmlkk.exe 3016 Lhdfec32.exe 868 Lqknfq32.exe 1796 Mjdcofpe.exe 2200 Mclghl32.exe 2332 Mmdlqa32.exe 2624 Mhklfbcj.exe 3068 Mkjibnbn.exe 2788 Mbcaoh32.exe 1540 Mgqigohb.exe 2548 Mqinpd32.exe 2244 Ngecbndm.exe -
Loads dropped DLL 64 IoCs
pid Process 2804 NEAS.6bb8c37026eea3c90d75edff34f10550.exe 2804 NEAS.6bb8c37026eea3c90d75edff34f10550.exe 2932 Hgkknm32.exe 2932 Hgkknm32.exe 2496 Algida32.exe 2496 Algida32.exe 2144 Aflmbj32.exe 2144 Aflmbj32.exe 1528 Amfeodoh.exe 1528 Amfeodoh.exe 2852 Alnoepam.exe 2852 Alnoepam.exe 2748 Befcne32.exe 2748 Befcne32.exe 1652 Cehlbihg.exe 1652 Cehlbihg.exe 2668 Coqaknog.exe 2668 Coqaknog.exe 536 Chiedc32.exe 536 Chiedc32.exe 2808 Cocnanmd.exe 2808 Cocnanmd.exe 1216 Dddodd32.exe 1216 Dddodd32.exe 2532 Efoobkej.exe 2532 Efoobkej.exe 2024 Eojpqpih.exe 2024 Eojpqpih.exe 1952 Eqklhh32.exe 1952 Eqklhh32.exe 2120 Ekcmkamj.exe 2120 Ekcmkamj.exe 2240 Emdjbi32.exe 2240 Emdjbi32.exe 1768 Ffokan32.exe 1768 Ffokan32.exe 1320 Fmkpchmp.exe 1320 Fmkpchmp.exe 1800 Fefdhj32.exe 1800 Fefdhj32.exe 1712 Fmnmih32.exe 1712 Fmnmih32.exe 2324 Fnoiqpqk.exe 2324 Fnoiqpqk.exe 1628 Fidmniqa.exe 1628 Fidmniqa.exe 1160 Gnaffpoi.exe 1160 Gnaffpoi.exe 1456 Gekncjfe.exe 1456 Gekncjfe.exe 2412 Glefpd32.exe 2412 Glefpd32.exe 2016 Gabohk32.exe 2016 Gabohk32.exe 1724 Glgcec32.exe 1724 Glgcec32.exe 1736 Gmipmlan.exe 1736 Gmipmlan.exe 900 Gnhlgoia.exe 900 Gnhlgoia.exe 3032 Gffmqq32.exe 3032 Gffmqq32.exe 1580 Hidjml32.exe 1580 Hidjml32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Algida32.exe Hgkknm32.exe File created C:\Windows\SysWOW64\Blmhmf32.exe Bbdcdqbc.exe File created C:\Windows\SysWOW64\Qkkohc32.exe Qaejkjhd.exe File created C:\Windows\SysWOW64\Naconeen.dll Alnoepam.exe File created C:\Windows\SysWOW64\Cpnkmh32.dll Fmnmih32.exe File opened for modification C:\Windows\SysWOW64\Bkocgape.exe Bdekjg32.exe File opened for modification C:\Windows\SysWOW64\Bjkfhm32.exe Bkocgape.exe File created C:\Windows\SysWOW64\Dqlfhp32.dll Pnbecp32.exe File created C:\Windows\SysWOW64\Fidmniqa.exe Fnoiqpqk.exe File opened for modification C:\Windows\SysWOW64\Kpdlfn32.exe Jbqkmj32.exe File created C:\Windows\SysWOW64\Mkjibnbn.exe Mhklfbcj.exe File opened for modification C:\Windows\SysWOW64\Pplcabif.exe Pbhcgn32.exe File created C:\Windows\SysWOW64\Mnfooh32.dll Fpcbik32.exe File created C:\Windows\SysWOW64\Gldogjeh.exe Gejgjp32.exe File created C:\Windows\SysWOW64\Idjjih32.exe Impblnna.exe File created C:\Windows\SysWOW64\Bjpjdi32.dll Ominjg32.exe File created C:\Windows\SysWOW64\Gejgjp32.exe Gpmnbi32.exe File created C:\Windows\SysWOW64\Oicmhmmo.dll Dnefdqke.exe File opened for modification C:\Windows\SysWOW64\Dkmqhdfi.exe Dphlkk32.exe File opened for modification C:\Windows\SysWOW64\Gnhlgoia.exe Gmipmlan.exe File created C:\Windows\SysWOW64\Gcpoaacc.dll Aghdboal.exe File created C:\Windows\SysWOW64\Moidpo32.dll Pkfemdlp.exe File opened for modification C:\Windows\SysWOW64\Aadbhl32.exe Algjpenp.exe File opened for modification C:\Windows\SysWOW64\Blmhmf32.exe Bbdcdqbc.exe File opened for modification C:\Windows\SysWOW64\Dnipop32.exe Dpepfl32.exe File opened for modification C:\Windows\SysWOW64\Llkijb32.exe Khgglp32.exe File opened for modification C:\Windows\SysWOW64\Ominjg32.exe Oabmef32.exe File created C:\Windows\SysWOW64\Doigah32.dll Dphlkk32.exe File created C:\Windows\SysWOW64\Goqblj32.dll Gnbkcedl.exe File created C:\Windows\SysWOW64\Dhadgbpa.dll Hgkknm32.exe File opened for modification C:\Windows\SysWOW64\Dddodd32.exe Cocnanmd.exe File created C:\Windows\SysWOW64\Haiagm32.exe Hkoikcaq.exe File created C:\Windows\SysWOW64\Lmjaba32.dll Bjbdnb32.exe File created C:\Windows\SysWOW64\Dlajfl32.exe Dfgaibbh.exe File created C:\Windows\SysWOW64\Pmkjog32.exe Pjmnck32.exe File opened for modification C:\Windows\SysWOW64\Aklgabbh.exe Aadbhl32.exe File created C:\Windows\SysWOW64\Bbdcdqbc.exe Bilokk32.exe File created C:\Windows\SysWOW64\Efoobkej.exe Dddodd32.exe File opened for modification C:\Windows\SysWOW64\Bdhlahfn.exe Bbgpip32.exe File created C:\Windows\SysWOW64\Fmeopo32.exe Fcmkgi32.exe File created C:\Windows\SysWOW64\Bkocgape.exe Bdekjg32.exe File created C:\Windows\SysWOW64\Gpmnbi32.exe Fmeopo32.exe File created C:\Windows\SysWOW64\Koglbkdl.exe Kpdlfn32.exe File opened for modification C:\Windows\SysWOW64\Pbhcgn32.exe Pmkjog32.exe File created C:\Windows\SysWOW64\Bajoephl.dll Algjpenp.exe File created C:\Windows\SysWOW64\Gnhlgoia.exe Gmipmlan.exe File opened for modification C:\Windows\SysWOW64\Ncqmbn32.exe Nmgeedno.exe File opened for modification C:\Windows\SysWOW64\Pbjpmmij.exe Pplcabif.exe File created C:\Windows\SysWOW64\Kedonn32.dll Phghedga.exe File created C:\Windows\SysWOW64\Apcjbeea.exe Amenfjfn.exe File created C:\Windows\SysWOW64\Mmcpjg32.dll Cehlbihg.exe File opened for modification C:\Windows\SysWOW64\Ekcmkamj.exe Eqklhh32.exe File created C:\Windows\SysWOW64\Glefpd32.exe Gekncjfe.exe File created C:\Windows\SysWOW64\Jkmddphd.dll Aadbhl32.exe File created C:\Windows\SysWOW64\Dhjkai32.exe Dapbdocn.exe File created C:\Windows\SysWOW64\Eoflbf32.exe Efngjalp.exe File created C:\Windows\SysWOW64\Kpdlfn32.exe Jbqkmj32.exe File created C:\Windows\SysWOW64\Ljoidf32.exe Ldbalp32.exe File created C:\Windows\SysWOW64\Hkigbh32.dll Mhklfbcj.exe File opened for modification C:\Windows\SysWOW64\Gekncjfe.exe Gnaffpoi.exe File created C:\Windows\SysWOW64\Gqcbihdb.dll Glefpd32.exe File opened for modification C:\Windows\SysWOW64\Opokbdhc.exe Imenpfap.exe File opened for modification C:\Windows\SysWOW64\Dpepfl32.exe Dodcncbh.exe File opened for modification C:\Windows\SysWOW64\Khgglp32.exe Kamooe32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldbalp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Canfop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmnmih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qmijij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kofbgc32.dll" Ngecbndm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gioojfke.dll" Nmgeedno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqemeo32.dll" Dapbdocn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpnkmh32.dll" Fmnmih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glefpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blmhmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdodllbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enfmio32.dll" Gekncjfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imenpfap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dncjbl32.dll" Keadoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmipmlan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mqncfh32.dll" Mclghl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qenjfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fidmniqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gekncjfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkoikcaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nimeje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naconeen.dll" Alnoepam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhepnj32.dll" Qenjfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcoegi32.dll" Glflmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ekcmkamj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gabohk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbqkmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnclge32.dll" Ohglfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cobcmk32.dll" Ncnplogn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Albpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gejgjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aelinh32.dll" Dlompl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Befcne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aipfoh32.dll" Kojihjbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apcjbeea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnipop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffokan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dddodd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emdjbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chcdqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdaqal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Coqaknog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkjibnbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pocmhnlk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blmhmf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acfcme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eiamal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gnhlgoia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hidjml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmdlqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Moidpo32.dll" Pkfemdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eojpqpih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbgpip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gejgjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahdpdfio.dll" Cmjcpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djbibm32.dll" Jbqkmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldbalp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amenfjfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bilokk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohglfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmkjog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cciincqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dphlkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kfclji32.dll" Fmkpchmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2932 2804 NEAS.6bb8c37026eea3c90d75edff34f10550.exe 28 PID 2804 wrote to memory of 2932 2804 NEAS.6bb8c37026eea3c90d75edff34f10550.exe 28 PID 2804 wrote to memory of 2932 2804 NEAS.6bb8c37026eea3c90d75edff34f10550.exe 28 PID 2804 wrote to memory of 2932 2804 NEAS.6bb8c37026eea3c90d75edff34f10550.exe 28 PID 2932 wrote to memory of 2496 2932 Hgkknm32.exe 29 PID 2932 wrote to memory of 2496 2932 Hgkknm32.exe 29 PID 2932 wrote to memory of 2496 2932 Hgkknm32.exe 29 PID 2932 wrote to memory of 2496 2932 Hgkknm32.exe 29 PID 2496 wrote to memory of 2144 2496 Algida32.exe 32 PID 2496 wrote to memory of 2144 2496 Algida32.exe 32 PID 2496 wrote to memory of 2144 2496 Algida32.exe 32 PID 2496 wrote to memory of 2144 2496 Algida32.exe 32 PID 2144 wrote to memory of 1528 2144 Aflmbj32.exe 30 PID 2144 wrote to memory of 1528 2144 Aflmbj32.exe 30 PID 2144 wrote to memory of 1528 2144 Aflmbj32.exe 30 PID 2144 wrote to memory of 1528 2144 Aflmbj32.exe 30 PID 1528 wrote to memory of 2852 1528 Amfeodoh.exe 31 PID 1528 wrote to memory of 2852 1528 Amfeodoh.exe 31 PID 1528 wrote to memory of 2852 1528 Amfeodoh.exe 31 PID 1528 wrote to memory of 2852 1528 Amfeodoh.exe 31 PID 2852 wrote to memory of 2748 2852 Alnoepam.exe 33 PID 2852 wrote to memory of 2748 2852 Alnoepam.exe 33 PID 2852 wrote to memory of 2748 2852 Alnoepam.exe 33 PID 2852 wrote to memory of 2748 2852 Alnoepam.exe 33 PID 2748 wrote to memory of 1652 2748 Befcne32.exe 34 PID 2748 wrote to memory of 1652 2748 Befcne32.exe 34 PID 2748 wrote to memory of 1652 2748 Befcne32.exe 34 PID 2748 wrote to memory of 1652 2748 Befcne32.exe 34 PID 1652 wrote to memory of 2668 1652 Cehlbihg.exe 35 PID 1652 wrote to memory of 2668 1652 Cehlbihg.exe 35 PID 1652 wrote to memory of 2668 1652 Cehlbihg.exe 35 PID 1652 wrote to memory of 2668 1652 Cehlbihg.exe 35 PID 2668 wrote to memory of 536 2668 Coqaknog.exe 36 PID 2668 wrote to memory of 536 2668 Coqaknog.exe 36 PID 2668 wrote to memory of 536 2668 Coqaknog.exe 36 PID 2668 wrote to memory of 536 2668 Coqaknog.exe 36 PID 536 wrote to memory of 2808 536 Chiedc32.exe 37 PID 536 wrote to memory of 2808 536 Chiedc32.exe 37 PID 536 wrote to memory of 2808 536 Chiedc32.exe 37 PID 536 wrote to memory of 2808 536 Chiedc32.exe 37 PID 2808 wrote to memory of 1216 2808 Cocnanmd.exe 38 PID 2808 wrote to memory of 1216 2808 Cocnanmd.exe 38 PID 2808 wrote to memory of 1216 2808 Cocnanmd.exe 38 PID 2808 wrote to memory of 1216 2808 Cocnanmd.exe 38 PID 1216 wrote to memory of 2532 1216 Dddodd32.exe 39 PID 1216 wrote to memory of 2532 1216 Dddodd32.exe 39 PID 1216 wrote to memory of 2532 1216 Dddodd32.exe 39 PID 1216 wrote to memory of 2532 1216 Dddodd32.exe 39 PID 2532 wrote to memory of 2024 2532 Efoobkej.exe 40 PID 2532 wrote to memory of 2024 2532 Efoobkej.exe 40 PID 2532 wrote to memory of 2024 2532 Efoobkej.exe 40 PID 2532 wrote to memory of 2024 2532 Efoobkej.exe 40 PID 2024 wrote to memory of 1952 2024 Eojpqpih.exe 41 PID 2024 wrote to memory of 1952 2024 Eojpqpih.exe 41 PID 2024 wrote to memory of 1952 2024 Eojpqpih.exe 41 PID 2024 wrote to memory of 1952 2024 Eojpqpih.exe 41 PID 1952 wrote to memory of 2120 1952 Eqklhh32.exe 42 PID 1952 wrote to memory of 2120 1952 Eqklhh32.exe 42 PID 1952 wrote to memory of 2120 1952 Eqklhh32.exe 42 PID 1952 wrote to memory of 2120 1952 Eqklhh32.exe 42 PID 2120 wrote to memory of 2240 2120 Ekcmkamj.exe 43 PID 2120 wrote to memory of 2240 2120 Ekcmkamj.exe 43 PID 2120 wrote to memory of 2240 2120 Ekcmkamj.exe 43 PID 2120 wrote to memory of 2240 2120 Ekcmkamj.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6bb8c37026eea3c90d75edff34f10550.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6bb8c37026eea3c90d75edff34f10550.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Hgkknm32.exeC:\Windows\system32\Hgkknm32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Algida32.exeC:\Windows\system32\Algida32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\Aflmbj32.exeC:\Windows\system32\Aflmbj32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144
-
-
-
-
C:\Windows\SysWOW64\Amfeodoh.exeC:\Windows\system32\Amfeodoh.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\Alnoepam.exeC:\Windows\system32\Alnoepam.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Befcne32.exeC:\Windows\system32\Befcne32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Cehlbihg.exeC:\Windows\system32\Cehlbihg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Coqaknog.exeC:\Windows\system32\Coqaknog.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Chiedc32.exeC:\Windows\system32\Chiedc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\Cocnanmd.exeC:\Windows\system32\Cocnanmd.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Dddodd32.exeC:\Windows\system32\Dddodd32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\Efoobkej.exeC:\Windows\system32\Efoobkej.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Eojpqpih.exeC:\Windows\system32\Eojpqpih.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\Eqklhh32.exeC:\Windows\system32\Eqklhh32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\Ekcmkamj.exeC:\Windows\system32\Ekcmkamj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Emdjbi32.exeC:\Windows\system32\Emdjbi32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\Ffokan32.exeC:\Windows\system32\Ffokan32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\Fmkpchmp.exeC:\Windows\system32\Fmkpchmp.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1320 -
C:\Windows\SysWOW64\Fefdhj32.exeC:\Windows\system32\Fefdhj32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\Fmnmih32.exeC:\Windows\system32\Fmnmih32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\Fnoiqpqk.exeC:\Windows\system32\Fnoiqpqk.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\Fidmniqa.exeC:\Windows\system32\Fidmniqa.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1628 -
C:\Windows\SysWOW64\Gnaffpoi.exeC:\Windows\system32\Gnaffpoi.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\Gekncjfe.exeC:\Windows\system32\Gekncjfe.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1456 -
C:\Windows\SysWOW64\Glefpd32.exeC:\Windows\system32\Glefpd32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\Gabohk32.exeC:\Windows\system32\Gabohk32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Glgcec32.exeC:\Windows\system32\Glgcec32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Windows\SysWOW64\Gmipmlan.exeC:\Windows\system32\Gmipmlan.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\Gnhlgoia.exeC:\Windows\system32\Gnhlgoia.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:900 -
C:\Windows\SysWOW64\Gffmqq32.exeC:\Windows\system32\Gffmqq32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Windows\SysWOW64\Hidjml32.exeC:\Windows\system32\Hidjml32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1580 -
C:\Windows\SysWOW64\Hdjnje32.exeC:\Windows\system32\Hdjnje32.exe29⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\Hkoikcaq.exeC:\Windows\system32\Hkoikcaq.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Haiagm32.exeC:\Windows\system32\Haiagm32.exe31⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\Ikafpbon.exeC:\Windows\system32\Ikafpbon.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\Impblnna.exeC:\Windows\system32\Impblnna.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1008 -
C:\Windows\SysWOW64\Idjjih32.exeC:\Windows\system32\Idjjih32.exe34⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\Paagkq32.exeC:\Windows\system32\Paagkq32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2888 -
C:\Windows\SysWOW64\Imenpfap.exeC:\Windows\system32\Imenpfap.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2868 -
C:\Windows\SysWOW64\Opokbdhc.exeC:\Windows\system32\Opokbdhc.exe37⤵
- Executes dropped EXE
PID:268 -
C:\Windows\SysWOW64\Jihgdd32.exeC:\Windows\system32\Jihgdd32.exe38⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Jbqkmj32.exeC:\Windows\system32\Jbqkmj32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Kpdlfn32.exeC:\Windows\system32\Kpdlfn32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\Koglbkdl.exeC:\Windows\system32\Koglbkdl.exe41⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\Keadoe32.exeC:\Windows\system32\Keadoe32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:2056 -
C:\Windows\SysWOW64\Kojihjbi.exeC:\Windows\system32\Kojihjbi.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Knabngen.exeC:\Windows\system32\Knabngen.exe44⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\Kamooe32.exeC:\Windows\system32\Kamooe32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\Khgglp32.exeC:\Windows\system32\Khgglp32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:108 -
C:\Windows\SysWOW64\Llkijb32.exeC:\Windows\system32\Llkijb32.exe47⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\Ldbalp32.exeC:\Windows\system32\Ldbalp32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:788 -
C:\Windows\SysWOW64\Ljoidf32.exeC:\Windows\system32\Ljoidf32.exe49⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Lcgnmlkk.exeC:\Windows\system32\Lcgnmlkk.exe50⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\Lhdfec32.exeC:\Windows\system32\Lhdfec32.exe51⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\Lqknfq32.exeC:\Windows\system32\Lqknfq32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:868 -
C:\Windows\SysWOW64\Mjdcofpe.exeC:\Windows\system32\Mjdcofpe.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Mclghl32.exeC:\Windows\system32\Mclghl32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Mmdlqa32.exeC:\Windows\system32\Mmdlqa32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Mhklfbcj.exeC:\Windows\system32\Mhklfbcj.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\Mkjibnbn.exeC:\Windows\system32\Mkjibnbn.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\Mbcaoh32.exeC:\Windows\system32\Mbcaoh32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Mgqigohb.exeC:\Windows\system32\Mgqigohb.exe59⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\Mqinpd32.exeC:\Windows\system32\Mqinpd32.exe60⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Ngecbndm.exeC:\Windows\system32\Ngecbndm.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Niilofhh.exeC:\Windows\system32\Niilofhh.exe62⤵PID:2732
-
C:\Windows\SysWOW64\Ncnplogn.exeC:\Windows\system32\Ncnplogn.exe63⤵
- Modifies registry class
PID:2472 -
C:\Windows\SysWOW64\Nmgeedno.exeC:\Windows\system32\Nmgeedno.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2896 -
C:\Windows\SysWOW64\Ncqmbn32.exeC:\Windows\system32\Ncqmbn32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2752 -
C:\Windows\SysWOW64\Nimeje32.exeC:\Windows\system32\Nimeje32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Ohglfa32.exeC:\Windows\system32\Ohglfa32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2748 -
C:\Windows\SysWOW64\Omddohbm.exeC:\Windows\system32\Omddohbm.exe68⤵PID:1632
-
C:\Windows\SysWOW64\Oncqik32.exeC:\Windows\system32\Oncqik32.exe69⤵PID:1248
-
C:\Windows\SysWOW64\Oabmef32.exeC:\Windows\system32\Oabmef32.exe70⤵
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Ominjg32.exeC:\Windows\system32\Ominjg32.exe71⤵
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\Pjmnck32.exeC:\Windows\system32\Pjmnck32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\Pmkjog32.exeC:\Windows\system32\Pmkjog32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2720 -
C:\Windows\SysWOW64\Pbhcgn32.exeC:\Windows\system32\Pbhcgn32.exe74⤵
- Drops file in System32 directory
PID:1840 -
C:\Windows\SysWOW64\Pplcabif.exeC:\Windows\system32\Pplcabif.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1152 -
C:\Windows\SysWOW64\Pbjpmmij.exeC:\Windows\system32\Pbjpmmij.exe76⤵PID:2816
-
C:\Windows\SysWOW64\Phghedga.exeC:\Windows\system32\Phghedga.exe77⤵
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\Pekhohfk.exeC:\Windows\system32\Pekhohfk.exe78⤵PID:2264
-
C:\Windows\SysWOW64\Phiekdeo.exeC:\Windows\system32\Phiekdeo.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1996 -
C:\Windows\SysWOW64\Pocmhnlk.exeC:\Windows\system32\Pocmhnlk.exe80⤵
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\Pdpepejb.exeC:\Windows\system32\Pdpepejb.exe81⤵PID:988
-
C:\Windows\SysWOW64\Qmijij32.exeC:\Windows\system32\Qmijij32.exe82⤵
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Agfhmo32.exeC:\Windows\system32\Agfhmo32.exe83⤵PID:1924
-
C:\Windows\SysWOW64\Albpef32.exeC:\Windows\system32\Albpef32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1292 -
C:\Windows\SysWOW64\Aghdboal.exeC:\Windows\system32\Aghdboal.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\Anbmoi32.exeC:\Windows\system32\Anbmoi32.exe86⤵PID:1664
-
C:\Windows\SysWOW64\Aocifaog.exeC:\Windows\system32\Aocifaog.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1636 -
C:\Windows\SysWOW64\Acoegp32.exeC:\Windows\system32\Acoegp32.exe88⤵PID:1680
-
C:\Windows\SysWOW64\Algjpenp.exeC:\Windows\system32\Algjpenp.exe89⤵
- Drops file in System32 directory
PID:2164 -
C:\Windows\SysWOW64\Aadbhl32.exeC:\Windows\system32\Aadbhl32.exe90⤵
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\Aklgabbh.exeC:\Windows\system32\Aklgabbh.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:920 -
C:\Windows\SysWOW64\Aohbaq32.exeC:\Windows\system32\Aohbaq32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3024 -
C:\Windows\SysWOW64\Bdekjg32.exeC:\Windows\system32\Bdekjg32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\Bkocgape.exeC:\Windows\system32\Bkocgape.exe94⤵
- Drops file in System32 directory
PID:2784 -
C:\Windows\SysWOW64\Bjkfhm32.exeC:\Windows\system32\Bjkfhm32.exe95⤵PID:2492
-
C:\Windows\SysWOW64\Oipdhm32.exeC:\Windows\system32\Oipdhm32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1192 -
C:\Windows\SysWOW64\Bdbjcj32.exeC:\Windows\system32\Bdbjcj32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1768 -
C:\Windows\SysWOW64\Fpcbik32.exeC:\Windows\system32\Fpcbik32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\Pnbecp32.exeC:\Windows\system32\Pnbecp32.exe99⤵
- Drops file in System32 directory
PID:368 -
C:\Windows\SysWOW64\Pigiah32.exeC:\Windows\system32\Pigiah32.exe100⤵PID:1580
-
C:\Windows\SysWOW64\Pkfemdlp.exeC:\Windows\system32\Pkfemdlp.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Qenjfi32.exeC:\Windows\system32\Qenjfi32.exe102⤵
- Modifies registry class
PID:1460 -
C:\Windows\SysWOW64\Qkhbbcjm.exeC:\Windows\system32\Qkhbbcjm.exe103⤵PID:856
-
C:\Windows\SysWOW64\Qaejkjhd.exeC:\Windows\system32\Qaejkjhd.exe104⤵
- Drops file in System32 directory
PID:1820 -
C:\Windows\SysWOW64\Qkkohc32.exeC:\Windows\system32\Qkkohc32.exe105⤵PID:1936
-
C:\Windows\SysWOW64\Acfcme32.exeC:\Windows\system32\Acfcme32.exe106⤵
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Acmimdon.exeC:\Windows\system32\Acmimdon.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:684 -
C:\Windows\SysWOW64\Amenfjfn.exeC:\Windows\system32\Amenfjfn.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:760 -
C:\Windows\SysWOW64\Apcjbeea.exeC:\Windows\system32\Apcjbeea.exe109⤵
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Abbfnade.exeC:\Windows\system32\Abbfnade.exe110⤵PID:3008
-
C:\Windows\SysWOW64\Bilokk32.exeC:\Windows\system32\Bilokk32.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:2444 -
C:\Windows\SysWOW64\Bbdcdqbc.exeC:\Windows\system32\Bbdcdqbc.exe112⤵
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\Blmhmf32.exeC:\Windows\system32\Blmhmf32.exe113⤵
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\Bbgpip32.exeC:\Windows\system32\Bbgpip32.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Bdhlahfn.exeC:\Windows\system32\Bdhlahfn.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2132 -
C:\Windows\SysWOW64\Bjbdnb32.exeC:\Windows\system32\Bjbdnb32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\Cmjcpm32.exeC:\Windows\system32\Cmjcpm32.exe117⤵
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Cokphejb.exeC:\Windows\system32\Cokphejb.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2768 -
C:\Windows\SysWOW64\Ciqdenjh.exeC:\Windows\system32\Ciqdenjh.exe119⤵PID:2180
-
C:\Windows\SysWOW64\Chcdqj32.exeC:\Windows\system32\Chcdqj32.exe120⤵
- Modifies registry class
PID:2568 -
C:\Windows\SysWOW64\Cciincqi.exeC:\Windows\system32\Cciincqi.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:780 -
C:\Windows\SysWOW64\Cicakm32.exeC:\Windows\system32\Cicakm32.exe122⤵PID:2008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-