Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
195s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 13:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.cadf8f339f099b8e045a07d9b12883d0.exe
Resource
win7-20231023-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.cadf8f339f099b8e045a07d9b12883d0.exe
Resource
win10v2004-20231020-en
6 signatures
150 seconds
General
-
Target
NEAS.cadf8f339f099b8e045a07d9b12883d0.exe
-
Size
296KB
-
MD5
cadf8f339f099b8e045a07d9b12883d0
-
SHA1
4d5ea5a7b9e2a61ea5c248e0c9a9b62b57d350f5
-
SHA256
915ae7c833a4d07c9a3f85ac2985e6c05c16c37822e473710a87a9f189a858b7
-
SHA512
0193872884b57eb668ef15b8347b763e7c5bdd73986d4051da16a22323e271f0d833f657b0dfc176af4f80b1e6405f1150243b18fcb6ffe2659d05d98984add2
-
SSDEEP
3072:ArRx7hXBaVdAZCMuxVTAWY+ARA1+6NhZ6P0c9fpxg6pg:6hX43kJMVNnNPKG6g
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nlcnaaog.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odbhofjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnbbpkjg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afoqbpid.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqapek32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqcmkjje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajnnipnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dbenhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhdcfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Johoic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Naqkki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olfkge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pajjpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Alojlgii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Deanooeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kffpcilf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pagmjlhj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cahbem32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caohfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmhfpmee.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qnpbbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anbohn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aipickfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Palgek32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpfmageg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nocgbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Minpeh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akdgmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dehdpnok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aagadh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mfpdim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Boppmf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cefkkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dcpagg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbenhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nadpdg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfdnnlbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ammjekmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpqnpacp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pclolakk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aagadh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mcoioi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mnbbpkjg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plhdkhoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpfblh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Defljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmpdoffo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phaegfpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Plhdkhoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Angmdoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ammjekmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.cadf8f339f099b8e045a07d9b12883d0.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jqpebg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qlaffbqk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alfpab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofgfio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhlkkabh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpqnpacp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dlmcaijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Afoqbpid.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfpdim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Penlon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bgbncdmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Boblbe32.exe -
Executes dropped EXE 64 IoCs
pid Process 2828 Ilifndlo.exe 2768 Idekbgji.exe 2516 Jcleiclo.exe 2900 Jqpebg32.exe 2024 Johoic32.exe 2784 Amglgn32.exe 2104 Mmmnkglp.exe 1928 Defljp32.exe 1080 Hcpqfgol.exe 2004 Pacbel32.exe 3008 Kffpcilf.exe 1884 Kakdpb32.exe 3036 Kpcngnob.exe 1744 Lljolodf.exe 1608 Lafgdfbm.exe 2224 Lmpdoffo.exe 2068 Lpqnpacp.exe 1676 Mpjqfpke.exe 2952 Mamjchoa.exe 1580 Nlcnaaog.exe 1576 Nocgbl32.exe 2420 Nhlkkabh.exe 1684 Nadpdg32.exe 2484 Njbanida.exe 2596 Ogfagmck.exe 2532 Oqnfqcjk.exe 2536 Ofkoijhc.exe 1088 Okhgaqfj.exe 2676 Omgckcmm.exe 1016 Odbhofjh.exe 2884 Pclolakk.exe 1616 Pmecdgbk.exe 948 Pjicnlqe.exe 1796 Pinqoh32.exe 1900 Qfbahldf.exe 2840 Qfdnnlbc.exe 2448 Qlaffbqk.exe 1348 Qnpbbn32.exe 2972 Aiegpg32.exe 1764 Anbohn32.exe 2316 Abmkhmfe.exe 1868 Alfpab32.exe 2852 Aabhiikm.exe 2132 Afoqbpid.exe 952 Ahomlb32.exe 648 Aipickfe.exe 1620 Aagadh32.exe 1548 Akpfmnmh.exe 1460 Bplofekp.exe 2060 Bmpooiji.exe 1164 Boakgapg.exe 1668 Mcoioi32.exe 1740 Fgdjipfc.exe 1680 Odknmi32.exe 2712 Lqnbffkn.exe 2908 Mfkjnmje.exe 2440 Mnbbpkjg.exe 476 Mocogc32.exe 2552 Mjicdl32.exe 2800 Mmgoqg32.exe 1092 Mfpdim32.exe 1632 Minpeh32.exe 1756 Mcddca32.exe 2820 Meeqkijg.exe -
Loads dropped DLL 64 IoCs
pid Process 2704 NEAS.cadf8f339f099b8e045a07d9b12883d0.exe 2704 NEAS.cadf8f339f099b8e045a07d9b12883d0.exe 2828 Ilifndlo.exe 2828 Ilifndlo.exe 2768 Idekbgji.exe 2768 Idekbgji.exe 2516 Jcleiclo.exe 2516 Jcleiclo.exe 2900 Jqpebg32.exe 2900 Jqpebg32.exe 2024 Johoic32.exe 2024 Johoic32.exe 2784 Amglgn32.exe 2784 Amglgn32.exe 2104 Mmmnkglp.exe 2104 Mmmnkglp.exe 1928 Defljp32.exe 1928 Defljp32.exe 1080 Hcpqfgol.exe 1080 Hcpqfgol.exe 2004 Pacbel32.exe 2004 Pacbel32.exe 3008 Kffpcilf.exe 3008 Kffpcilf.exe 1884 Kakdpb32.exe 1884 Kakdpb32.exe 3036 Kpcngnob.exe 3036 Kpcngnob.exe 1744 Lljolodf.exe 1744 Lljolodf.exe 1608 Lafgdfbm.exe 1608 Lafgdfbm.exe 2224 Lmpdoffo.exe 2224 Lmpdoffo.exe 2068 Lpqnpacp.exe 2068 Lpqnpacp.exe 1676 Mpjqfpke.exe 1676 Mpjqfpke.exe 2952 Mamjchoa.exe 2952 Mamjchoa.exe 1580 Nlcnaaog.exe 1580 Nlcnaaog.exe 1576 Nocgbl32.exe 1576 Nocgbl32.exe 2420 Nhlkkabh.exe 2420 Nhlkkabh.exe 1684 Nadpdg32.exe 1684 Nadpdg32.exe 2484 Njbanida.exe 2484 Njbanida.exe 2596 Ogfagmck.exe 2596 Ogfagmck.exe 2532 Oqnfqcjk.exe 2532 Oqnfqcjk.exe 2536 Ofkoijhc.exe 2536 Ofkoijhc.exe 1088 Okhgaqfj.exe 1088 Okhgaqfj.exe 2676 Omgckcmm.exe 2676 Omgckcmm.exe 1016 Odbhofjh.exe 1016 Odbhofjh.exe 2884 Pclolakk.exe 2884 Pclolakk.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Alfpab32.exe Abmkhmfe.exe File opened for modification C:\Windows\SysWOW64\Oobkna32.exe Oiebej32.exe File created C:\Windows\SysWOW64\Egaepoqh.dll Penlon32.exe File created C:\Windows\SysWOW64\Qcgfcbbh.exe Qhabfibb.exe File opened for modification C:\Windows\SysWOW64\Akdgmd32.exe Adjoqjfc.exe File created C:\Windows\SysWOW64\Donlcdgn.exe Dhdcfj32.exe File created C:\Windows\SysWOW64\Jpenhj32.dll Mamjchoa.exe File created C:\Windows\SysWOW64\Anbohn32.exe Aiegpg32.exe File created C:\Windows\SysWOW64\Nldbbbno.exe Nlafmcpa.exe File created C:\Windows\SysWOW64\Afebpmal.exe Qcgfcbbh.exe File created C:\Windows\SysWOW64\Jqpebg32.exe Jcleiclo.exe File opened for modification C:\Windows\SysWOW64\Dpfblh32.exe Dmhfpmee.exe File created C:\Windows\SysWOW64\Hfndae32.dll Amglgn32.exe File created C:\Windows\SysWOW64\Palgek32.exe Pmqkellk.exe File opened for modification C:\Windows\SysWOW64\Dehdpnok.exe Donlcdgn.exe File opened for modification C:\Windows\SysWOW64\Okhgaqfj.exe Ofkoijhc.exe File opened for modification C:\Windows\SysWOW64\Pacbel32.exe Hcpqfgol.exe File created C:\Windows\SysWOW64\Aiegpg32.exe Qnpbbn32.exe File opened for modification C:\Windows\SysWOW64\Abmkhmfe.exe Anbohn32.exe File opened for modification C:\Windows\SysWOW64\Defljp32.exe Mmmnkglp.exe File created C:\Windows\SysWOW64\Bmpooiji.exe Bplofekp.exe File created C:\Windows\SysWOW64\Oqjedjbn.dll Aalcdngp.exe File created C:\Windows\SysWOW64\Bkimgflg.exe Beoekl32.exe File opened for modification C:\Windows\SysWOW64\Deanooeb.exe Dcpagg32.exe File created C:\Windows\SysWOW64\Kgokdhjl.dll Odbhofjh.exe File created C:\Windows\SysWOW64\Qnpbbn32.exe Qlaffbqk.exe File created C:\Windows\SysWOW64\Ajnnipnc.exe Adaeai32.exe File created C:\Windows\SysWOW64\Boppmf32.exe Bmacqj32.exe File created C:\Windows\SysWOW64\Nlcnaaog.exe Mamjchoa.exe File opened for modification C:\Windows\SysWOW64\Omgckcmm.exe Okhgaqfj.exe File created C:\Windows\SysWOW64\Pmqkellk.exe Phcbmend.exe File created C:\Windows\SysWOW64\Oqibkj32.dll Dbenhc32.exe File created C:\Windows\SysWOW64\Fbfilc32.dll Hcpqfgol.exe File opened for modification C:\Windows\SysWOW64\Ofdicodf.exe Njiocobg.exe File created C:\Windows\SysWOW64\Qecejnco.exe Qpfmageg.exe File opened for modification C:\Windows\SysWOW64\Bimnqk32.exe Bbbedqcc.exe File opened for modification C:\Windows\SysWOW64\Ogfagmck.exe Njbanida.exe File created C:\Windows\SysWOW64\Aphdchgf.dll Cbpendha.exe File created C:\Windows\SysWOW64\Jhiiaqdl.dll Belhem32.exe File opened for modification C:\Windows\SysWOW64\Phcbmend.exe Pajjpk32.exe File opened for modification C:\Windows\SysWOW64\Aalcdngp.exe Alojlgii.exe File created C:\Windows\SysWOW64\Bklhpc32.dll Mpkehbjm.exe File created C:\Windows\SysWOW64\Nadbgo32.dll Olkebejb.exe File opened for modification C:\Windows\SysWOW64\Beoekl32.exe Boblbe32.exe File created C:\Windows\SysWOW64\Olkebejb.exe Okkhhb32.exe File created C:\Windows\SysWOW64\Oeogmkbe.dll Omgckcmm.exe File created C:\Windows\SysWOW64\Hjkgob32.dll Minpeh32.exe File opened for modification C:\Windows\SysWOW64\Alojlgii.exe Afebpmal.exe File opened for modification C:\Windows\SysWOW64\Ajnnipnc.exe Adaeai32.exe File opened for modification C:\Windows\SysWOW64\Cjnjhcqo.exe Bimnqk32.exe File created C:\Windows\SysWOW64\Cefkkk32.exe Cnlcoage.exe File opened for modification C:\Windows\SysWOW64\Ahomlb32.exe Afoqbpid.exe File created C:\Windows\SysWOW64\Lqnbffkn.exe Odknmi32.exe File created C:\Windows\SysWOW64\Ofdicodf.exe Njiocobg.exe File created C:\Windows\SysWOW64\Qpfmageg.exe Plhdkhoq.exe File opened for modification C:\Windows\SysWOW64\Boblbe32.exe Belhem32.exe File created C:\Windows\SysWOW64\Cgbjbgph.exe Cahbem32.exe File created C:\Windows\SysWOW64\Heaeli32.dll Qlaffbqk.exe File opened for modification C:\Windows\SysWOW64\Bickkl32.exe Bgbncdmm.exe File opened for modification C:\Windows\SysWOW64\Bbbedqcc.exe Bkimgflg.exe File created C:\Windows\SysWOW64\Cahbem32.exe Cjnjhcqo.exe File opened for modification C:\Windows\SysWOW64\Phaegfpg.exe Pagmjlhj.exe File created C:\Windows\SysWOW64\Ncpdlhhj.dll Pinqoh32.exe File created C:\Windows\SysWOW64\Lkojhefn.dll Nadpdg32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihmbpdjj.dll" Mjicdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dbenhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpqijqhf.dll" Idekbgji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofkoijhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpfeadne.dll" Aagadh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjabnoie.dll" Cgbjbgph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cbpendha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Abmkhmfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mpkehbjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bimnqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ammjekmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gljbaeaa.dll" Alfpab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aipickfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjmnbnnd.dll" Plfhfiqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pacbel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Niohnd32.dll" Cjgmoahd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njbanida.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Meeqkijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfndae32.dll" Amglgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cjgmoahd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajnncp32.dll" Kffpcilf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjedajfi.dll" Fgdjipfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qpfmageg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dcpagg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlbgkjec.dll" Mfpdim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qhabfibb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Angmdoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plhfdicc.dll" Cefkkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiogmeom.dll" Nhlkkabh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdmjhb32.dll" Ofkoijhc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bbbedqcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjhlii32.dll" Palgek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bciohe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mpjqfpke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mcoioi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofdicodf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dlmcaijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oeogmkbe.dll" Omgckcmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghlacg32.dll" Lqnbffkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhbagmmf.dll" Ofdicodf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noagionb.dll" Okhgaqfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afoqbpid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oabdol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hniaeb32.dll" Anbohn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ahomlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjicnk32.dll" Mcddca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bgbncdmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Boblbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pinqoh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Boakgapg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mjicdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Defljp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjgapg32.dll" Oelcjkgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bjcgdojn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Alojlgii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Caohfl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aiegpg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aagadh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkhmce32.dll" Pkdknq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghfcbfjl.dll" Dajkjphd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Alfpab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmpooiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lqnbffkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oehgnffj.dll" Bbbedqcc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2828 2704 NEAS.cadf8f339f099b8e045a07d9b12883d0.exe 29 PID 2704 wrote to memory of 2828 2704 NEAS.cadf8f339f099b8e045a07d9b12883d0.exe 29 PID 2704 wrote to memory of 2828 2704 NEAS.cadf8f339f099b8e045a07d9b12883d0.exe 29 PID 2704 wrote to memory of 2828 2704 NEAS.cadf8f339f099b8e045a07d9b12883d0.exe 29 PID 2828 wrote to memory of 2768 2828 Ilifndlo.exe 30 PID 2828 wrote to memory of 2768 2828 Ilifndlo.exe 30 PID 2828 wrote to memory of 2768 2828 Ilifndlo.exe 30 PID 2828 wrote to memory of 2768 2828 Ilifndlo.exe 30 PID 2768 wrote to memory of 2516 2768 Idekbgji.exe 31 PID 2768 wrote to memory of 2516 2768 Idekbgji.exe 31 PID 2768 wrote to memory of 2516 2768 Idekbgji.exe 31 PID 2768 wrote to memory of 2516 2768 Idekbgji.exe 31 PID 2516 wrote to memory of 2900 2516 Jcleiclo.exe 32 PID 2516 wrote to memory of 2900 2516 Jcleiclo.exe 32 PID 2516 wrote to memory of 2900 2516 Jcleiclo.exe 32 PID 2516 wrote to memory of 2900 2516 Jcleiclo.exe 32 PID 2900 wrote to memory of 2024 2900 Jqpebg32.exe 33 PID 2900 wrote to memory of 2024 2900 Jqpebg32.exe 33 PID 2900 wrote to memory of 2024 2900 Jqpebg32.exe 33 PID 2900 wrote to memory of 2024 2900 Jqpebg32.exe 33 PID 2024 wrote to memory of 2784 2024 Johoic32.exe 34 PID 2024 wrote to memory of 2784 2024 Johoic32.exe 34 PID 2024 wrote to memory of 2784 2024 Johoic32.exe 34 PID 2024 wrote to memory of 2784 2024 Johoic32.exe 34 PID 2784 wrote to memory of 2104 2784 Amglgn32.exe 35 PID 2784 wrote to memory of 2104 2784 Amglgn32.exe 35 PID 2784 wrote to memory of 2104 2784 Amglgn32.exe 35 PID 2784 wrote to memory of 2104 2784 Amglgn32.exe 35 PID 2104 wrote to memory of 1928 2104 Mmmnkglp.exe 36 PID 2104 wrote to memory of 1928 2104 Mmmnkglp.exe 36 PID 2104 wrote to memory of 1928 2104 Mmmnkglp.exe 36 PID 2104 wrote to memory of 1928 2104 Mmmnkglp.exe 36 PID 1928 wrote to memory of 1080 1928 Defljp32.exe 37 PID 1928 wrote to memory of 1080 1928 Defljp32.exe 37 PID 1928 wrote to memory of 1080 1928 Defljp32.exe 37 PID 1928 wrote to memory of 1080 1928 Defljp32.exe 37 PID 1080 wrote to memory of 2004 1080 Hcpqfgol.exe 38 PID 1080 wrote to memory of 2004 1080 Hcpqfgol.exe 38 PID 1080 wrote to memory of 2004 1080 Hcpqfgol.exe 38 PID 1080 wrote to memory of 2004 1080 Hcpqfgol.exe 38 PID 2004 wrote to memory of 3008 2004 Pacbel32.exe 39 PID 2004 wrote to memory of 3008 2004 Pacbel32.exe 39 PID 2004 wrote to memory of 3008 2004 Pacbel32.exe 39 PID 2004 wrote to memory of 3008 2004 Pacbel32.exe 39 PID 3008 wrote to memory of 1884 3008 Kffpcilf.exe 40 PID 3008 wrote to memory of 1884 3008 Kffpcilf.exe 40 PID 3008 wrote to memory of 1884 3008 Kffpcilf.exe 40 PID 3008 wrote to memory of 1884 3008 Kffpcilf.exe 40 PID 1884 wrote to memory of 3036 1884 Kakdpb32.exe 41 PID 1884 wrote to memory of 3036 1884 Kakdpb32.exe 41 PID 1884 wrote to memory of 3036 1884 Kakdpb32.exe 41 PID 1884 wrote to memory of 3036 1884 Kakdpb32.exe 41 PID 3036 wrote to memory of 1744 3036 Kpcngnob.exe 42 PID 3036 wrote to memory of 1744 3036 Kpcngnob.exe 42 PID 3036 wrote to memory of 1744 3036 Kpcngnob.exe 42 PID 3036 wrote to memory of 1744 3036 Kpcngnob.exe 42 PID 1744 wrote to memory of 1608 1744 Lljolodf.exe 43 PID 1744 wrote to memory of 1608 1744 Lljolodf.exe 43 PID 1744 wrote to memory of 1608 1744 Lljolodf.exe 43 PID 1744 wrote to memory of 1608 1744 Lljolodf.exe 43 PID 1608 wrote to memory of 2224 1608 Lafgdfbm.exe 44 PID 1608 wrote to memory of 2224 1608 Lafgdfbm.exe 44 PID 1608 wrote to memory of 2224 1608 Lafgdfbm.exe 44 PID 1608 wrote to memory of 2224 1608 Lafgdfbm.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cadf8f339f099b8e045a07d9b12883d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cadf8f339f099b8e045a07d9b12883d0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\Ilifndlo.exeC:\Windows\system32\Ilifndlo.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Idekbgji.exeC:\Windows\system32\Idekbgji.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\Jcleiclo.exeC:\Windows\system32\Jcleiclo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\Jqpebg32.exeC:\Windows\system32\Jqpebg32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Johoic32.exeC:\Windows\system32\Johoic32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\Amglgn32.exeC:\Windows\system32\Amglgn32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Mmmnkglp.exeC:\Windows\system32\Mmmnkglp.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Defljp32.exeC:\Windows\system32\Defljp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\Hcpqfgol.exeC:\Windows\system32\Hcpqfgol.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\Pacbel32.exeC:\Windows\system32\Pacbel32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Kffpcilf.exeC:\Windows\system32\Kffpcilf.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Kakdpb32.exeC:\Windows\system32\Kakdpb32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Kpcngnob.exeC:\Windows\system32\Kpcngnob.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Lljolodf.exeC:\Windows\system32\Lljolodf.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Lafgdfbm.exeC:\Windows\system32\Lafgdfbm.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\Lmpdoffo.exeC:\Windows\system32\Lmpdoffo.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2224 -
C:\Windows\SysWOW64\Lpqnpacp.exeC:\Windows\system32\Lpqnpacp.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Windows\SysWOW64\Mpjqfpke.exeC:\Windows\system32\Mpjqfpke.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Mamjchoa.exeC:\Windows\system32\Mamjchoa.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\Nlcnaaog.exeC:\Windows\system32\Nlcnaaog.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1580 -
C:\Windows\SysWOW64\Nocgbl32.exeC:\Windows\system32\Nocgbl32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1576 -
C:\Windows\SysWOW64\Nhlkkabh.exeC:\Windows\system32\Nhlkkabh.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Nadpdg32.exeC:\Windows\system32\Nadpdg32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\Njbanida.exeC:\Windows\system32\Njbanida.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2484 -
C:\Windows\SysWOW64\Ogfagmck.exeC:\Windows\system32\Ogfagmck.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2596 -
C:\Windows\SysWOW64\Oqnfqcjk.exeC:\Windows\system32\Oqnfqcjk.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Windows\SysWOW64\Ofkoijhc.exeC:\Windows\system32\Ofkoijhc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Okhgaqfj.exeC:\Windows\system32\Okhgaqfj.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1088 -
C:\Windows\SysWOW64\Omgckcmm.exeC:\Windows\system32\Omgckcmm.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Odbhofjh.exeC:\Windows\system32\Odbhofjh.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1016 -
C:\Windows\SysWOW64\Pclolakk.exeC:\Windows\system32\Pclolakk.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Windows\SysWOW64\Pmecdgbk.exeC:\Windows\system32\Pmecdgbk.exe33⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Pjicnlqe.exeC:\Windows\system32\Pjicnlqe.exe34⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\Pinqoh32.exeC:\Windows\system32\Pinqoh32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Qfbahldf.exeC:\Windows\system32\Qfbahldf.exe36⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\Qfdnnlbc.exeC:\Windows\system32\Qfdnnlbc.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\Qlaffbqk.exeC:\Windows\system32\Qlaffbqk.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\Qnpbbn32.exeC:\Windows\system32\Qnpbbn32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1348 -
C:\Windows\SysWOW64\Aiegpg32.exeC:\Windows\system32\Aiegpg32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\Anbohn32.exeC:\Windows\system32\Anbohn32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1764 -
C:\Windows\SysWOW64\Abmkhmfe.exeC:\Windows\system32\Abmkhmfe.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2316 -
C:\Windows\SysWOW64\Alfpab32.exeC:\Windows\system32\Alfpab32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1868 -
C:\Windows\SysWOW64\Aabhiikm.exeC:\Windows\system32\Aabhiikm.exe44⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\Afoqbpid.exeC:\Windows\system32\Afoqbpid.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Ahomlb32.exeC:\Windows\system32\Ahomlb32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:952 -
C:\Windows\SysWOW64\Aipickfe.exeC:\Windows\system32\Aipickfe.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:648 -
C:\Windows\SysWOW64\Aagadh32.exeC:\Windows\system32\Aagadh32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\Akpfmnmh.exeC:\Windows\system32\Akpfmnmh.exe49⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Bplofekp.exeC:\Windows\system32\Bplofekp.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1460 -
C:\Windows\SysWOW64\Bmpooiji.exeC:\Windows\system32\Bmpooiji.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:2060 -
C:\Windows\SysWOW64\Boakgapg.exeC:\Windows\system32\Boakgapg.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\Mcoioi32.exeC:\Windows\system32\Mcoioi32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1668 -
C:\Windows\SysWOW64\Fgdjipfc.exeC:\Windows\system32\Fgdjipfc.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:1740 -
C:\Windows\SysWOW64\Odknmi32.exeC:\Windows\system32\Odknmi32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Lqnbffkn.exeC:\Windows\system32\Lqnbffkn.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Mfkjnmje.exeC:\Windows\system32\Mfkjnmje.exe57⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Mnbbpkjg.exeC:\Windows\system32\Mnbbpkjg.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\Mocogc32.exeC:\Windows\system32\Mocogc32.exe59⤵
- Executes dropped EXE
PID:476 -
C:\Windows\SysWOW64\Mjicdl32.exeC:\Windows\system32\Mjicdl32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\Mmgoqg32.exeC:\Windows\system32\Mmgoqg32.exe61⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Mfpdim32.exeC:\Windows\system32\Mfpdim32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1092 -
C:\Windows\SysWOW64\Minpeh32.exeC:\Windows\system32\Minpeh32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1632 -
C:\Windows\SysWOW64\Mcddca32.exeC:\Windows\system32\Mcddca32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Meeqkijg.exeC:\Windows\system32\Meeqkijg.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:2820 -
C:\Windows\SysWOW64\Mpkehbjm.exeC:\Windows\system32\Mpkehbjm.exe66⤵
- Drops file in System32 directory
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Nlafmcpa.exeC:\Windows\system32\Nlafmcpa.exe67⤵
- Drops file in System32 directory
PID:1444 -
C:\Windows\SysWOW64\Nldbbbno.exeC:\Windows\system32\Nldbbbno.exe68⤵PID:2416
-
C:\Windows\SysWOW64\Naqkki32.exeC:\Windows\system32\Naqkki32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1224 -
C:\Windows\SysWOW64\Njiocobg.exeC:\Windows\system32\Njiocobg.exe70⤵
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\Ofdicodf.exeC:\Windows\system32\Ofdicodf.exe71⤵
- Modifies registry class
PID:1968 -
C:\Windows\SysWOW64\Ofgfio32.exeC:\Windows\system32\Ofgfio32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2836 -
C:\Windows\SysWOW64\Oiebej32.exeC:\Windows\system32\Oiebej32.exe73⤵
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\Oobkna32.exeC:\Windows\system32\Oobkna32.exe74⤵PID:3052
-
C:\Windows\SysWOW64\Oelcjkgk.exeC:\Windows\system32\Oelcjkgk.exe75⤵
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Olfkge32.exeC:\Windows\system32\Olfkge32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:544 -
C:\Windows\SysWOW64\Oabdol32.exeC:\Windows\system32\Oabdol32.exe77⤵
- Modifies registry class
PID:1360 -
C:\Windows\SysWOW64\Okkhhb32.exeC:\Windows\system32\Okkhhb32.exe78⤵
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\Olkebejb.exeC:\Windows\system32\Olkebejb.exe79⤵
- Drops file in System32 directory
PID:980 -
C:\Windows\SysWOW64\Pagmjlhj.exeC:\Windows\system32\Pagmjlhj.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Phaegfpg.exeC:\Windows\system32\Phaegfpg.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2036 -
C:\Windows\SysWOW64\Pajjpk32.exeC:\Windows\system32\Pajjpk32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\Phcbmend.exeC:\Windows\system32\Phcbmend.exe83⤵
- Drops file in System32 directory
PID:704 -
C:\Windows\SysWOW64\Pmqkellk.exeC:\Windows\system32\Pmqkellk.exe84⤵
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\Palgek32.exeC:\Windows\system32\Palgek32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1200 -
C:\Windows\SysWOW64\Pkdknq32.exeC:\Windows\system32\Pkdknq32.exe86⤵
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\Plfhfiqc.exeC:\Windows\system32\Plfhfiqc.exe87⤵
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Penlon32.exeC:\Windows\system32\Penlon32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\Plhdkhoq.exeC:\Windows\system32\Plhdkhoq.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1864 -
C:\Windows\SysWOW64\Qpfmageg.exeC:\Windows\system32\Qpfmageg.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2448 -
C:\Windows\SysWOW64\Qecejnco.exeC:\Windows\system32\Qecejnco.exe91⤵PID:1344
-
C:\Windows\SysWOW64\Qhabfibb.exeC:\Windows\system32\Qhabfibb.exe92⤵
- Drops file in System32 directory
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Qcgfcbbh.exeC:\Windows\system32\Qcgfcbbh.exe93⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\Afebpmal.exeC:\Windows\system32\Afebpmal.exe94⤵
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\Alojlgii.exeC:\Windows\system32\Alojlgii.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Aalcdngp.exeC:\Windows\system32\Aalcdngp.exe96⤵
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\Adjoqjfc.exeC:\Windows\system32\Adjoqjfc.exe97⤵
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\Akdgmd32.exeC:\Windows\system32\Akdgmd32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2472 -
C:\Windows\SysWOW64\Aqapek32.exeC:\Windows\system32\Aqapek32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2772 -
C:\Windows\SysWOW64\Ahhhgh32.exeC:\Windows\system32\Ahhhgh32.exe100⤵PID:320
-
C:\Windows\SysWOW64\Aqcmkjje.exeC:\Windows\system32\Aqcmkjje.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3068 -
C:\Windows\SysWOW64\Acbigfii.exeC:\Windows\system32\Acbigfii.exe102⤵PID:956
-
C:\Windows\SysWOW64\Angmdoho.exeC:\Windows\system32\Angmdoho.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:944 -
C:\Windows\SysWOW64\Adaeai32.exeC:\Windows\system32\Adaeai32.exe104⤵
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\Ajnnipnc.exeC:\Windows\system32\Ajnnipnc.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2324 -
C:\Windows\SysWOW64\Ammjekmg.exeC:\Windows\system32\Ammjekmg.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2900 -
C:\Windows\SysWOW64\Bgbncdmm.exeC:\Windows\system32\Bgbncdmm.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\Bickkl32.exeC:\Windows\system32\Bickkl32.exe108⤵PID:2412
-
C:\Windows\SysWOW64\Bciohe32.exeC:\Windows\system32\Bciohe32.exe109⤵
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Bjcgdojn.exeC:\Windows\system32\Bjcgdojn.exe110⤵
- Modifies registry class
PID:852 -
C:\Windows\SysWOW64\Bmacqj32.exeC:\Windows\system32\Bmacqj32.exe111⤵
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\Boppmf32.exeC:\Windows\system32\Boppmf32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2956 -
C:\Windows\SysWOW64\Belhem32.exeC:\Windows\system32\Belhem32.exe113⤵
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\Boblbe32.exeC:\Windows\system32\Boblbe32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1060 -
C:\Windows\SysWOW64\Beoekl32.exeC:\Windows\system32\Beoekl32.exe115⤵
- Drops file in System32 directory
PID:1928 -
C:\Windows\SysWOW64\Bkimgflg.exeC:\Windows\system32\Bkimgflg.exe116⤵
- Drops file in System32 directory
PID:2088 -
C:\Windows\SysWOW64\Bbbedqcc.exeC:\Windows\system32\Bbbedqcc.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\Bimnqk32.exeC:\Windows\system32\Bimnqk32.exe118⤵
- Drops file in System32 directory
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Cjnjhcqo.exeC:\Windows\system32\Cjnjhcqo.exe119⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Cahbem32.exeC:\Windows\system32\Cahbem32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\Cgbjbgph.exeC:\Windows\system32\Cgbjbgph.exe121⤵
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\Cnlcoage.exeC:\Windows\system32\Cnlcoage.exe122⤵
- Drops file in System32 directory
PID:2892
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-