Analysis
-
max time kernel
275s -
max time network
269s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02-11-2023 16:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.fba527263c3d3a54b46682176c353340.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.fba527263c3d3a54b46682176c353340.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.fba527263c3d3a54b46682176c353340.exe
-
Size
364KB
-
MD5
fba527263c3d3a54b46682176c353340
-
SHA1
c440e8892696a2fe89911b4a3f727fff33de37df
-
SHA256
e1445226dc3f625e03416b1b5cdc08ee2f6062fad12dd39ead6e7d26fd9a5a0e
-
SHA512
aa8e6644529e88937ed9859fa6ba484febc2ad9e55b928051415481f48c6bcbbe45ecde0c76ce5be23985ae93f62863f9e61ab2a23b370802c1683197c1ced26
-
SSDEEP
6144:3XP70duMQbXV7Z0V+tbFOLM77OLnFe3HCqxNRmJ4PavntPRRI:D6p8l7btsNePmjvtPRRI
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chahin32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dopfpkng.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edeapm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bpdgolml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdpoeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Admnob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jgonqhqp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnigma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlajkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ecibjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jankcafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jchlkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kbbcch32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkenmidf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgdcqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imijonea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jcjhahbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nmqbib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qbidffao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oaecne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Glgephne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hnaqhbbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpjhkkbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aalemg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gjfhhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlcfel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmqbib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nigbncgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mobcmk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdpmjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fdpmjk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.fba527263c3d3a54b46682176c353340.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bihdfkoe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kiepca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ldcjooac.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkbhfk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaecne32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnaqhbbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgcdkj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knmlgdfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nffjlhji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.fba527263c3d3a54b46682176c353340.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egpdom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hphjlfbi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hakcinfe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lechcgkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ncafemqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nmjknb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glmecbbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgonqhqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kenbjd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfnjfepp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lofafhck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lajgnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kenbjd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpkifo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmcnmapk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nnbagfdg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbkamfod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccdqnhki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Khljdn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Megbof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjakldoh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlcfel32.exe -
Executes dropped EXE 64 IoCs
pid Process 2528 Hanenoeh.exe 2548 Mbdepe32.exe 1980 Opaeok32.exe 2476 Ocpakg32.exe 2988 Oofbph32.exe 1656 Pmeemp32.exe 1684 Pfnjfepp.exe 2780 Pqekin32.exe 1640 Qbidffao.exe 1964 Aacjba32.exe 808 Afbpph32.exe 1720 Bmcnmapk.exe 2684 Bpdgolml.exe 1748 Chahin32.exe 2128 Dkbnjmhq.exe 1808 Dopfpkng.exe 2144 Dhhkiq32.exe 2000 Egpdom32.exe 3060 Egbaelej.exe 2904 Eloimcca.exe 2204 Ecibjn32.exe 2288 Eqmbca32.exe 2184 Efjklh32.exe 3036 Fobodn32.exe 2224 Fmfpnb32.exe 2720 Fdadbd32.exe 2424 Fniikj32.exe 2488 Glmecbbj.exe 588 Bihdfkoe.exe 2848 Hkenmidf.exe 2532 Jeenip32.exe 944 Jpkbfi32.exe 956 Jhfgjk32.exe 2468 Jankcafl.exe 2100 Kdfjekmd.exe 2136 Kmnonqce.exe 1048 Kiepca32.exe 1548 Lcmdlgoj.exe 1156 Lelphbon.exe 1896 Lofafhck.exe 1020 Ldcjooac.exe 876 Loinlg32.exe 2068 Lgdcqj32.exe 2108 Lajgnb32.exe 2576 Lkblghdj.exe 1544 Mcmpkj32.exe 2444 Mcfcai32.exe 2636 Nkbhfk32.exe 1604 Nfglcd32.exe 2736 Nnbagfdg.exe 2744 Ndmidq32.exe 2568 Njialh32.exe 1208 Ncafemqk.exe 2960 Nmjknb32.exe 696 Oflbmg32.exe 2716 Oaecne32.exe 2992 Plkgkn32.exe 3016 Pdflopoa.exe 1072 Pnlpmiog.exe 2236 Pdkejo32.exe 1748 Plhfda32.exe 2280 Pdpoeo32.exe 1200 Qmhcnd32.exe 2204 Qbelfk32.exe -
Loads dropped DLL 64 IoCs
pid Process 2624 NEAS.fba527263c3d3a54b46682176c353340.exe 2624 NEAS.fba527263c3d3a54b46682176c353340.exe 2528 Hanenoeh.exe 2528 Hanenoeh.exe 2548 Mbdepe32.exe 2548 Mbdepe32.exe 1980 Opaeok32.exe 1980 Opaeok32.exe 2476 Ocpakg32.exe 2476 Ocpakg32.exe 2988 Oofbph32.exe 2988 Oofbph32.exe 1656 Pmeemp32.exe 1656 Pmeemp32.exe 1684 Pfnjfepp.exe 1684 Pfnjfepp.exe 2780 Pqekin32.exe 2780 Pqekin32.exe 1640 Qbidffao.exe 1640 Qbidffao.exe 1964 Aacjba32.exe 1964 Aacjba32.exe 808 Afbpph32.exe 808 Afbpph32.exe 1720 Bmcnmapk.exe 1720 Bmcnmapk.exe 2684 Bpdgolml.exe 2684 Bpdgolml.exe 1748 Chahin32.exe 1748 Chahin32.exe 2128 Dkbnjmhq.exe 2128 Dkbnjmhq.exe 1808 Dopfpkng.exe 1808 Dopfpkng.exe 2144 Dhhkiq32.exe 2144 Dhhkiq32.exe 2000 Egpdom32.exe 2000 Egpdom32.exe 3060 Egbaelej.exe 3060 Egbaelej.exe 2904 Eloimcca.exe 2904 Eloimcca.exe 2204 Ecibjn32.exe 2204 Ecibjn32.exe 2288 Eqmbca32.exe 2288 Eqmbca32.exe 2184 Efjklh32.exe 2184 Efjklh32.exe 3036 Fobodn32.exe 3036 Fobodn32.exe 2224 Fmfpnb32.exe 2224 Fmfpnb32.exe 2720 Fdadbd32.exe 2720 Fdadbd32.exe 2424 Fniikj32.exe 2424 Fniikj32.exe 2488 Glmecbbj.exe 2488 Glmecbbj.exe 588 Bihdfkoe.exe 588 Bihdfkoe.exe 2848 Hkenmidf.exe 2848 Hkenmidf.exe 2532 Jeenip32.exe 2532 Jeenip32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dcbqhkfk.dll Kbdomdca.exe File created C:\Windows\SysWOW64\Megacbqk.exe Lpjhkkbc.exe File created C:\Windows\SysWOW64\Eloimcca.exe Egbaelej.exe File opened for modification C:\Windows\SysWOW64\Lkblghdj.exe Lajgnb32.exe File created C:\Windows\SysWOW64\Hphjlfbi.exe Hfofca32.exe File created C:\Windows\SysWOW64\Onhbkd32.dll Jpkbfi32.exe File opened for modification C:\Windows\SysWOW64\Ldcjooac.exe Lofafhck.exe File created C:\Windows\SysWOW64\Lmngeg32.dll Qmhcnd32.exe File created C:\Windows\SysWOW64\Pqekin32.exe Pfnjfepp.exe File created C:\Windows\SysWOW64\Gphfgbaa.dll Fmfpnb32.exe File created C:\Windows\SysWOW64\Ifmkdp32.dll Pdflopoa.exe File created C:\Windows\SysWOW64\Nljnmbil.dll Fcejkgfb.exe File created C:\Windows\SysWOW64\Lblhgcnc.dll Jgakfgom.exe File created C:\Windows\SysWOW64\Nffjlhji.exe Mabkcbbj.exe File created C:\Windows\SysWOW64\Njegdh32.exe Nggkhl32.exe File opened for modification C:\Windows\SysWOW64\Mbdepe32.exe Hanenoeh.exe File created C:\Windows\SysWOW64\Njddec32.dll Fniikj32.exe File created C:\Windows\SysWOW64\Okmnol32.dll Lajgnb32.exe File created C:\Windows\SysWOW64\Kbbcch32.exe Kpdggm32.exe File opened for modification C:\Windows\SysWOW64\Oflbmg32.exe Nmjknb32.exe File opened for modification C:\Windows\SysWOW64\Nfglcd32.exe Nkbhfk32.exe File opened for modification C:\Windows\SysWOW64\Knmlgdfb.exe Kgcdkj32.exe File created C:\Windows\SysWOW64\Kilkpb32.exe Kfnocg32.exe File created C:\Windows\SysWOW64\Lkhcil32.dll Ecibjn32.exe File created C:\Windows\SysWOW64\Loinlg32.exe Ldcjooac.exe File created C:\Windows\SysWOW64\Chahin32.exe Bpdgolml.exe File created C:\Windows\SysWOW64\Piagjhdh.dll Dhhkiq32.exe File created C:\Windows\SysWOW64\Jeenip32.exe Hkenmidf.exe File opened for modification C:\Windows\SysWOW64\Kilkpb32.exe Kfnocg32.exe File created C:\Windows\SysWOW64\Mpkifo32.exe Miqajeaa.exe File created C:\Windows\SysWOW64\Jpkbfi32.exe Jeenip32.exe File opened for modification C:\Windows\SysWOW64\Ljnpbd32.exe Lnpimd32.exe File created C:\Windows\SysWOW64\Lemlao32.dll Aacjba32.exe File created C:\Windows\SysWOW64\Pdkejo32.exe Pnlpmiog.exe File created C:\Windows\SysWOW64\Dofdoc32.dll Gfmimank.exe File created C:\Windows\SysWOW64\Ednqgnnq.dll Jnkcca32.exe File created C:\Windows\SysWOW64\Dqjkgkaj.dll Filijijc.exe File created C:\Windows\SysWOW64\Ljnpbd32.exe Lnpimd32.exe File opened for modification C:\Windows\SysWOW64\Nbmjai32.exe Nmqbib32.exe File created C:\Windows\SysWOW64\Kkpdmjfg.exe Keclechp.exe File opened for modification C:\Windows\SysWOW64\Dkbnjmhq.exe Chahin32.exe File created C:\Windows\SysWOW64\Dopfpkng.exe Dkbnjmhq.exe File created C:\Windows\SysWOW64\Daoklean.dll Nfglcd32.exe File created C:\Windows\SysWOW64\Gfmimank.exe Glgephne.exe File created C:\Windows\SysWOW64\Llcfaajh.dll Ljnpbd32.exe File created C:\Windows\SysWOW64\Oenhak32.dll Nmqbib32.exe File opened for modification C:\Windows\SysWOW64\Fmfpnb32.exe Fobodn32.exe File opened for modification C:\Windows\SysWOW64\Mbkamfod.exe Megacbqk.exe File opened for modification C:\Windows\SysWOW64\Nffjlhji.exe Mabkcbbj.exe File created C:\Windows\SysWOW64\Fniikj32.exe Fdadbd32.exe File created C:\Windows\SysWOW64\Neelhckg.dll Mcfcai32.exe File opened for modification C:\Windows\SysWOW64\Hnaqhbbl.exe Hhghkh32.exe File created C:\Windows\SysWOW64\Ecpohp32.dll Pfnjfepp.exe File opened for modification C:\Windows\SysWOW64\Jpkbfi32.exe Jeenip32.exe File opened for modification C:\Windows\SysWOW64\Nmjknb32.exe Ncafemqk.exe File created C:\Windows\SysWOW64\Mghddpgb.dll Hakcinfe.exe File opened for modification C:\Windows\SysWOW64\Pdflopoa.exe Plkgkn32.exe File created C:\Windows\SysWOW64\Filijijc.exe Fdpmjk32.exe File opened for modification C:\Windows\SysWOW64\Ifobbd32.exe Iabjim32.exe File created C:\Windows\SysWOW64\Jnnphadg.exe Jchlkh32.exe File opened for modification C:\Windows\SysWOW64\Mlcfel32.exe Mbkamfod.exe File opened for modification C:\Windows\SysWOW64\Hhghkh32.exe Hnodbben.exe File created C:\Windows\SysWOW64\Jqpkkadl.dll Hfmeld32.exe File opened for modification C:\Windows\SysWOW64\Jgonqhqp.exe Jenbioka.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Glmecbbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qhadob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mabkcbbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fobodn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jeenip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Neelhckg.dll" Mcfcai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iefiphie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jnkcca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njddec32.dll" Fniikj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifghcg32.dll" Gcggqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdhabcg.dll" Hfofca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kkmcfiia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Miqajeaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jankcafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fdpmjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jgonqhqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jnnphadg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhibdl32.dll" Oflbmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olnlgjof.dll" Efjklh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mcfcai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nkbhfk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ndmidq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gljaehlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kfnocg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eqmbca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajgfdhmb.dll" Pnlpmiog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgalhoip.dll" Nffjlhji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oenhak32.dll" Nmqbib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kilkpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjcfbigh.dll" Bmcnmapk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kcmefhpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Klejomgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kpdggm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdkejo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajhchojg.dll" Adokdbib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pmeemp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gjfhhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gljaehlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hhghkh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kfnnhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kbpfni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oofbph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Plkgkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pnlpmiog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnmnbiph.dll" Egbaelej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fdpmjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kfnnhb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lnpimd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Plkgkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfhaef32.dll" Mpkifo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nmqbib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fniikj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Anebhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mlcfel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eeehchdj.dll" Phejbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pqekin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdpoeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kkpdmjfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eloimcca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kbdomdca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjpiiajg.dll" Eloimcca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jeenip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Padbmn32.dll" Dopfpkng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flachdmk.dll" Pdpoeo32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2528 2624 NEAS.fba527263c3d3a54b46682176c353340.exe 27 PID 2624 wrote to memory of 2528 2624 NEAS.fba527263c3d3a54b46682176c353340.exe 27 PID 2624 wrote to memory of 2528 2624 NEAS.fba527263c3d3a54b46682176c353340.exe 27 PID 2624 wrote to memory of 2528 2624 NEAS.fba527263c3d3a54b46682176c353340.exe 27 PID 2528 wrote to memory of 2548 2528 Hanenoeh.exe 30 PID 2528 wrote to memory of 2548 2528 Hanenoeh.exe 30 PID 2528 wrote to memory of 2548 2528 Hanenoeh.exe 30 PID 2528 wrote to memory of 2548 2528 Hanenoeh.exe 30 PID 2548 wrote to memory of 1980 2548 Mbdepe32.exe 29 PID 2548 wrote to memory of 1980 2548 Mbdepe32.exe 29 PID 2548 wrote to memory of 1980 2548 Mbdepe32.exe 29 PID 2548 wrote to memory of 1980 2548 Mbdepe32.exe 29 PID 1980 wrote to memory of 2476 1980 Opaeok32.exe 28 PID 1980 wrote to memory of 2476 1980 Opaeok32.exe 28 PID 1980 wrote to memory of 2476 1980 Opaeok32.exe 28 PID 1980 wrote to memory of 2476 1980 Opaeok32.exe 28 PID 2476 wrote to memory of 2988 2476 Ocpakg32.exe 31 PID 2476 wrote to memory of 2988 2476 Ocpakg32.exe 31 PID 2476 wrote to memory of 2988 2476 Ocpakg32.exe 31 PID 2476 wrote to memory of 2988 2476 Ocpakg32.exe 31 PID 2988 wrote to memory of 1656 2988 Oofbph32.exe 32 PID 2988 wrote to memory of 1656 2988 Oofbph32.exe 32 PID 2988 wrote to memory of 1656 2988 Oofbph32.exe 32 PID 2988 wrote to memory of 1656 2988 Oofbph32.exe 32 PID 1656 wrote to memory of 1684 1656 Pmeemp32.exe 34 PID 1656 wrote to memory of 1684 1656 Pmeemp32.exe 34 PID 1656 wrote to memory of 1684 1656 Pmeemp32.exe 34 PID 1656 wrote to memory of 1684 1656 Pmeemp32.exe 34 PID 1684 wrote to memory of 2780 1684 Pfnjfepp.exe 33 PID 1684 wrote to memory of 2780 1684 Pfnjfepp.exe 33 PID 1684 wrote to memory of 2780 1684 Pfnjfepp.exe 33 PID 1684 wrote to memory of 2780 1684 Pfnjfepp.exe 33 PID 2780 wrote to memory of 1640 2780 Pqekin32.exe 35 PID 2780 wrote to memory of 1640 2780 Pqekin32.exe 35 PID 2780 wrote to memory of 1640 2780 Pqekin32.exe 35 PID 2780 wrote to memory of 1640 2780 Pqekin32.exe 35 PID 1640 wrote to memory of 1964 1640 Qbidffao.exe 36 PID 1640 wrote to memory of 1964 1640 Qbidffao.exe 36 PID 1640 wrote to memory of 1964 1640 Qbidffao.exe 36 PID 1640 wrote to memory of 1964 1640 Qbidffao.exe 36 PID 1964 wrote to memory of 808 1964 Aacjba32.exe 37 PID 1964 wrote to memory of 808 1964 Aacjba32.exe 37 PID 1964 wrote to memory of 808 1964 Aacjba32.exe 37 PID 1964 wrote to memory of 808 1964 Aacjba32.exe 37 PID 808 wrote to memory of 1720 808 Afbpph32.exe 38 PID 808 wrote to memory of 1720 808 Afbpph32.exe 38 PID 808 wrote to memory of 1720 808 Afbpph32.exe 38 PID 808 wrote to memory of 1720 808 Afbpph32.exe 38 PID 1720 wrote to memory of 2684 1720 Bmcnmapk.exe 39 PID 1720 wrote to memory of 2684 1720 Bmcnmapk.exe 39 PID 1720 wrote to memory of 2684 1720 Bmcnmapk.exe 39 PID 1720 wrote to memory of 2684 1720 Bmcnmapk.exe 39 PID 2684 wrote to memory of 1748 2684 Bpdgolml.exe 40 PID 2684 wrote to memory of 1748 2684 Bpdgolml.exe 40 PID 2684 wrote to memory of 1748 2684 Bpdgolml.exe 40 PID 2684 wrote to memory of 1748 2684 Bpdgolml.exe 40 PID 1748 wrote to memory of 2128 1748 Chahin32.exe 41 PID 1748 wrote to memory of 2128 1748 Chahin32.exe 41 PID 1748 wrote to memory of 2128 1748 Chahin32.exe 41 PID 1748 wrote to memory of 2128 1748 Chahin32.exe 41 PID 2128 wrote to memory of 1808 2128 Dkbnjmhq.exe 42 PID 2128 wrote to memory of 1808 2128 Dkbnjmhq.exe 42 PID 2128 wrote to memory of 1808 2128 Dkbnjmhq.exe 42 PID 2128 wrote to memory of 1808 2128 Dkbnjmhq.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fba527263c3d3a54b46682176c353340.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fba527263c3d3a54b46682176c353340.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Hanenoeh.exeC:\Windows\system32\Hanenoeh.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\Mbdepe32.exeC:\Windows\system32\Mbdepe32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548
-
-
-
C:\Windows\SysWOW64\Ocpakg32.exeC:\Windows\system32\Ocpakg32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\Oofbph32.exeC:\Windows\system32\Oofbph32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\Pmeemp32.exeC:\Windows\system32\Pmeemp32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Pfnjfepp.exeC:\Windows\system32\Pfnjfepp.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1684
-
-
-
-
C:\Windows\SysWOW64\Opaeok32.exeC:\Windows\system32\Opaeok32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980
-
C:\Windows\SysWOW64\Pqekin32.exeC:\Windows\system32\Pqekin32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Qbidffao.exeC:\Windows\system32\Qbidffao.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Aacjba32.exeC:\Windows\system32\Aacjba32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\Afbpph32.exeC:\Windows\system32\Afbpph32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\Bmcnmapk.exeC:\Windows\system32\Bmcnmapk.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\Bpdgolml.exeC:\Windows\system32\Bpdgolml.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Chahin32.exeC:\Windows\system32\Chahin32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\Dkbnjmhq.exeC:\Windows\system32\Dkbnjmhq.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\Dopfpkng.exeC:\Windows\system32\Dopfpkng.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\Dhhkiq32.exeC:\Windows\system32\Dhhkiq32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2144 -
C:\Windows\SysWOW64\Egpdom32.exeC:\Windows\system32\Egpdom32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Windows\SysWOW64\Egbaelej.exeC:\Windows\system32\Egbaelej.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\Eloimcca.exeC:\Windows\system32\Eloimcca.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\Ecibjn32.exeC:\Windows\system32\Ecibjn32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\Eqmbca32.exeC:\Windows\system32\Eqmbca32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Efjklh32.exeC:\Windows\system32\Efjklh32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2184 -
C:\Windows\SysWOW64\Fobodn32.exeC:\Windows\system32\Fobodn32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:3036 -
C:\Windows\SysWOW64\Fmfpnb32.exeC:\Windows\system32\Fmfpnb32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2224 -
C:\Windows\SysWOW64\Fdadbd32.exeC:\Windows\system32\Fdadbd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2720 -
C:\Windows\SysWOW64\Fniikj32.exeC:\Windows\system32\Fniikj32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2424 -
C:\Windows\SysWOW64\Glmecbbj.exeC:\Windows\system32\Glmecbbj.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Bihdfkoe.exeC:\Windows\system32\Bihdfkoe.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:588 -
C:\Windows\SysWOW64\Hkenmidf.exeC:\Windows\system32\Hkenmidf.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Jeenip32.exeC:\Windows\system32\Jeenip32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Jpkbfi32.exeC:\Windows\system32\Jpkbfi32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:944 -
C:\Windows\SysWOW64\Jhfgjk32.exeC:\Windows\system32\Jhfgjk32.exe26⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Jankcafl.exeC:\Windows\system32\Jankcafl.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Kdfjekmd.exeC:\Windows\system32\Kdfjekmd.exe28⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\Kmnonqce.exeC:\Windows\system32\Kmnonqce.exe29⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\Kiepca32.exeC:\Windows\system32\Kiepca32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1048 -
C:\Windows\SysWOW64\Lcmdlgoj.exeC:\Windows\system32\Lcmdlgoj.exe31⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Lelphbon.exeC:\Windows\system32\Lelphbon.exe32⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\Lofafhck.exeC:\Windows\system32\Lofafhck.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1896 -
C:\Windows\SysWOW64\Ldcjooac.exeC:\Windows\system32\Ldcjooac.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1020 -
C:\Windows\SysWOW64\Loinlg32.exeC:\Windows\system32\Loinlg32.exe35⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\Lgdcqj32.exeC:\Windows\system32\Lgdcqj32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Lajgnb32.exeC:\Windows\system32\Lajgnb32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Lkblghdj.exeC:\Windows\system32\Lkblghdj.exe38⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\Mcmpkj32.exeC:\Windows\system32\Mcmpkj32.exe39⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\Mcfcai32.exeC:\Windows\system32\Mcfcai32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2444 -
C:\Windows\SysWOW64\Nkbhfk32.exeC:\Windows\system32\Nkbhfk32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Nfglcd32.exeC:\Windows\system32\Nfglcd32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\Nnbagfdg.exeC:\Windows\system32\Nnbagfdg.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\Ndmidq32.exeC:\Windows\system32\Ndmidq32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Njialh32.exeC:\Windows\system32\Njialh32.exe45⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Ncafemqk.exeC:\Windows\system32\Ncafemqk.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\Nmjknb32.exeC:\Windows\system32\Nmjknb32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\Oflbmg32.exeC:\Windows\system32\Oflbmg32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:696 -
C:\Windows\SysWOW64\Oaecne32.exeC:\Windows\system32\Oaecne32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Plkgkn32.exeC:\Windows\system32\Plkgkn32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2992 -
C:\Windows\SysWOW64\Pdflopoa.exeC:\Windows\system32\Pdflopoa.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\Pnlpmiog.exeC:\Windows\system32\Pnlpmiog.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1072 -
C:\Windows\SysWOW64\Pdkejo32.exeC:\Windows\system32\Pdkejo32.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\Plhfda32.exeC:\Windows\system32\Plhfda32.exe54⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\Pdpoeo32.exeC:\Windows\system32\Pdpoeo32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2280 -
C:\Windows\SysWOW64\Qmhcnd32.exeC:\Windows\system32\Qmhcnd32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1200 -
C:\Windows\SysWOW64\Qbelfk32.exeC:\Windows\system32\Qbelfk32.exe57⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Qhadob32.exeC:\Windows\system32\Qhadob32.exe58⤵
- Modifies registry class
PID:880 -
C:\Windows\SysWOW64\Aalemg32.exeC:\Windows\system32\Aalemg32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:300 -
C:\Windows\SysWOW64\Albijp32.exeC:\Windows\system32\Albijp32.exe60⤵PID:1092
-
C:\Windows\SysWOW64\Admnob32.exeC:\Windows\system32\Admnob32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1756 -
C:\Windows\SysWOW64\Anebhh32.exeC:\Windows\system32\Anebhh32.exe62⤵
- Modifies registry class
PID:2368 -
C:\Windows\SysWOW64\Adokdbib.exeC:\Windows\system32\Adokdbib.exe63⤵
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\Anhomg32.exeC:\Windows\system32\Anhomg32.exe64⤵PID:2360
-
C:\Windows\SysWOW64\Iefiphie.exeC:\Windows\system32\Iefiphie.exe65⤵
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\Edeapm32.exeC:\Windows\system32\Edeapm32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2700 -
C:\Windows\SysWOW64\Acnbqcjm.exeC:\Windows\system32\Acnbqcjm.exe67⤵PID:3064
-
C:\Windows\SysWOW64\Fdpmjk32.exeC:\Windows\system32\Fdpmjk32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1340 -
C:\Windows\SysWOW64\Filijijc.exeC:\Windows\system32\Filijijc.exe69⤵
- Drops file in System32 directory
PID:2856 -
C:\Windows\SysWOW64\Fqgnolgo.exeC:\Windows\system32\Fqgnolgo.exe70⤵PID:2628
-
C:\Windows\SysWOW64\Fcejkgfb.exeC:\Windows\system32\Fcejkgfb.exe71⤵
- Drops file in System32 directory
PID:2564 -
C:\Windows\SysWOW64\Gqikdk32.exeC:\Windows\system32\Gqikdk32.exe72⤵PID:1084
-
C:\Windows\SysWOW64\Gcggqg32.exeC:\Windows\system32\Gcggqg32.exe73⤵
- Modifies registry class
PID:596 -
C:\Windows\SysWOW64\Gjaomall.exeC:\Windows\system32\Gjaomall.exe74⤵PID:2732
-
C:\Windows\SysWOW64\Gjfhhp32.exeC:\Windows\system32\Gjfhhp32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Glgephne.exeC:\Windows\system32\Glgephne.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Gfmimank.exeC:\Windows\system32\Gfmimank.exe77⤵
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\Gljaehlb.exeC:\Windows\system32\Gljaehlb.exe78⤵
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\Hfofca32.exeC:\Windows\system32\Hfofca32.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\Hphjlfbi.exeC:\Windows\system32\Hphjlfbi.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:436 -
C:\Windows\SysWOW64\Haigco32.exeC:\Windows\system32\Haigco32.exe81⤵PID:2184
-
C:\Windows\SysWOW64\Hjakldoh.exeC:\Windows\system32\Hjakldoh.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1164 -
C:\Windows\SysWOW64\Hakcinfe.exeC:\Windows\system32\Hakcinfe.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:940 -
C:\Windows\SysWOW64\Hnodbben.exeC:\Windows\system32\Hnodbben.exe84⤵
- Drops file in System32 directory
PID:1768 -
C:\Windows\SysWOW64\Hhghkh32.exeC:\Windows\system32\Hhghkh32.exe85⤵
- Drops file in System32 directory
- Modifies registry class
PID:2228 -
C:\Windows\SysWOW64\Hnaqhbbl.exeC:\Windows\system32\Hnaqhbbl.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2504 -
C:\Windows\SysWOW64\Hdnipi32.exeC:\Windows\system32\Hdnipi32.exe87⤵PID:1552
-
C:\Windows\SysWOW64\Hfmeld32.exeC:\Windows\system32\Hfmeld32.exe88⤵
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\Iabjim32.exeC:\Windows\system32\Iabjim32.exe89⤵
- Drops file in System32 directory
PID:2416 -
C:\Windows\SysWOW64\Ifobbd32.exeC:\Windows\system32\Ifobbd32.exe90⤵PID:640
-
C:\Windows\SysWOW64\Imijonea.exeC:\Windows\system32\Imijonea.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1492 -
C:\Windows\SysWOW64\Jabfhq32.exeC:\Windows\system32\Jabfhq32.exe92⤵PID:1876
-
C:\Windows\SysWOW64\Jenbioka.exeC:\Windows\system32\Jenbioka.exe93⤵
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\Jgonqhqp.exeC:\Windows\system32\Jgonqhqp.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Jnigma32.exeC:\Windows\system32\Jnigma32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2436 -
C:\Windows\SysWOW64\Jdcojlpi.exeC:\Windows\system32\Jdcojlpi.exe96⤵PID:2168
-
C:\Windows\SysWOW64\Jgakfgom.exeC:\Windows\system32\Jgakfgom.exe97⤵
- Drops file in System32 directory
PID:524 -
C:\Windows\SysWOW64\Jnkcca32.exeC:\Windows\system32\Jnkcca32.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Jchlkh32.exeC:\Windows\system32\Jchlkh32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\Jnnphadg.exeC:\Windows\system32\Jnnphadg.exe100⤵
- Modifies registry class
PID:1348 -
C:\Windows\SysWOW64\Jcjhahbo.exeC:\Windows\system32\Jcjhahbo.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1200 -
C:\Windows\SysWOW64\Kcmefhpl.exeC:\Windows\system32\Kcmefhpl.exe102⤵
- Modifies registry class
PID:884 -
C:\Windows\SysWOW64\Klejomgl.exeC:\Windows\system32\Klejomgl.exe103⤵
- Modifies registry class
PID:1692 -
C:\Windows\SysWOW64\Kfnnhb32.exeC:\Windows\system32\Kfnnhb32.exe104⤵
- Modifies registry class
PID:2612 -
C:\Windows\SysWOW64\Khljdn32.exeC:\Windows\system32\Khljdn32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2212 -
C:\Windows\SysWOW64\Kbdomdca.exeC:\Windows\system32\Kbdomdca.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Kkmcfiia.exeC:\Windows\system32\Kkmcfiia.exe107⤵
- Modifies registry class
PID:924 -
C:\Windows\SysWOW64\Kbflbc32.exeC:\Windows\system32\Kbflbc32.exe108⤵PID:1520
-
C:\Windows\SysWOW64\Kgcdkj32.exeC:\Windows\system32\Kgcdkj32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1464 -
C:\Windows\SysWOW64\Knmlgdfb.exeC:\Windows\system32\Knmlgdfb.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2496 -
C:\Windows\SysWOW64\Kdgddo32.exeC:\Windows\system32\Kdgddo32.exe111⤵PID:2172
-
C:\Windows\SysWOW64\Lnpimd32.exeC:\Windows\system32\Lnpimd32.exe112⤵
- Drops file in System32 directory
- Modifies registry class
PID:1628 -
C:\Windows\SysWOW64\Ljnpbd32.exeC:\Windows\system32\Ljnpbd32.exe113⤵
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\Lpjhkkbc.exeC:\Windows\system32\Lpjhkkbc.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\Megacbqk.exeC:\Windows\system32\Megacbqk.exe115⤵
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\Mbkamfod.exeC:\Windows\system32\Mbkamfod.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1888 -
C:\Windows\SysWOW64\Mlcfel32.exeC:\Windows\system32\Mlcfel32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\Meljna32.exeC:\Windows\system32\Meljna32.exe118⤵PID:2800
-
C:\Windows\SysWOW64\Mgjfjm32.exeC:\Windows\system32\Mgjfjm32.exe119⤵PID:1180
-
C:\Windows\SysWOW64\Mabkcbbj.exeC:\Windows\system32\Mabkcbbj.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\Nffjlhji.exeC:\Windows\system32\Nffjlhji.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1124 -
C:\Windows\SysWOW64\Nmqbib32.exeC:\Windows\system32\Nmqbib32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-