Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 06:39
Behavioral task
behavioral1
Sample
3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exe
-
Size
664KB
-
MD5
3924f69506f053c5ba22591dd037bb70
-
SHA1
c41347cad19726d7af20c06d5a422d8419e16235
-
SHA256
2f68f72e9150132396e4ca11dfc7ce39c149a30232dcb18ff755d1244b06a98c
-
SHA512
f499db10cd5d87e1400031b0b0e0ce9cb2e2b9ef2b224b8f2aa79a5bc757292e798214b1c5c66152ece1b389551c5227e81305e8127b03e5a9b1b201eeb73ae0
-
SSDEEP
12288:kWhCqODAupV6yYPVpV6yYPg058KpV6yYPNUir2MhNl6zX3w9As/xO23WM6tJmDYx:kWqLWVWleKWNUir2MhNl6zX3w9As/xOX
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jmbhoeid.exeBganhm32.exeKbbokdlk.exeHkjjlhle.exeEmmkiclm.exeQdphngfl.exeCoohhlpe.exeFkopnh32.exeAfmhck32.exeGkleeplq.exeDhjckcgi.exeGfkbde32.exeIgpdfb32.exeHiipmhmk.exeGepmlimi.exeIokgal32.exeCodhnb32.exeKfckahdj.exePgkelj32.exeJeekkafl.exeIhgnkkbd.exeQmhlgmmm.exeQklmpalf.exeEmoadlfo.exePonfka32.exeLiddbc32.exeMdckfk32.exePoodpmca.exeMlpokp32.exeQjlnnemp.exeOohgdhfn.exeBfbaonae.exeChiigadc.exeMiomdk32.exeDpnbog32.exeObjpoh32.exeOampjeml.exeColffknh.exeFafkecel.exeQkipkani.exeKdnidn32.exeMdhdajea.exeJljbeali.exeIgchfiof.exeLlflea32.exeQcclld32.exeAkamff32.exeKfjhkjle.exeEobocb32.exeCmdfgm32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jmbhoeid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bganhm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbbokdlk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkjjlhle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Emmkiclm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdphngfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Coohhlpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fkopnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afmhck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkleeplq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhjckcgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gfkbde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Igpdfb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiipmhmk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gepmlimi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iokgal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hkjjlhle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Codhnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kfckahdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgkelj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jeekkafl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihgnkkbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmhlgmmm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qklmpalf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Emoadlfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ponfka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Liddbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdckfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Poodpmca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mlpokp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjlnnemp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oohgdhfn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfbaonae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chiigadc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miomdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpnbog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Objpoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oampjeml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Colffknh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fafkecel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qkipkani.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kdnidn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdhdajea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jljbeali.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igchfiof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Llflea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcclld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Akamff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kfjhkjle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eobocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cmdfgm32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Qloebdig.exe family_berbew C:\Windows\SysWOW64\Qnnanphk.exe family_berbew C:\Windows\SysWOW64\Aejfpjne.exe family_berbew C:\Windows\SysWOW64\Abngjnmo.exe family_berbew C:\Windows\SysWOW64\Acocaf32.exe family_berbew C:\Windows\SysWOW64\Ahmlgd32.exe family_berbew C:\Windows\SysWOW64\Angddopp.exe family_berbew C:\Windows\SysWOW64\Alkdnboj.exe family_berbew C:\Windows\SysWOW64\Bdfibe32.exe family_berbew C:\Windows\SysWOW64\Beeflhdh.exe family_berbew C:\Windows\SysWOW64\Blpnib32.exe family_berbew C:\Windows\SysWOW64\Bbifelba.exe family_berbew C:\Windows\SysWOW64\Behbag32.exe family_berbew C:\Windows\SysWOW64\Bdmpcdfm.exe family_berbew C:\Windows\SysWOW64\Bhikcb32.exe family_berbew C:\Windows\SysWOW64\Cbqlfkmi.exe family_berbew C:\Windows\SysWOW64\Chmeobkq.exe family_berbew C:\Windows\SysWOW64\Cklaknjd.exe family_berbew C:\Windows\SysWOW64\Cdainc32.exe family_berbew C:\Windows\SysWOW64\Ceoibflm.exe family_berbew C:\Windows\SysWOW64\Boepel32.exe family_berbew C:\Windows\SysWOW64\Bkidenlg.exe family_berbew C:\Windows\SysWOW64\Bhkhibmc.exe family_berbew C:\Windows\SysWOW64\Bdolhc32.exe family_berbew C:\Windows\SysWOW64\Baaplhef.exe family_berbew C:\Windows\SysWOW64\Bbnpqk32.exe family_berbew C:\Windows\SysWOW64\Bobcpmfc.exe family_berbew C:\Windows\SysWOW64\Bldgdago.exe family_berbew C:\Windows\SysWOW64\Baocghgi.exe family_berbew C:\Windows\SysWOW64\Bblckl32.exe family_berbew C:\Windows\SysWOW64\Bjdkjo32.exe family_berbew C:\Windows\SysWOW64\Bhfonc32.exe family_berbew C:\Windows\SysWOW64\Gfgjgo32.exe family_berbew C:\Windows\SysWOW64\Heapdjlp.exe family_berbew C:\Windows\SysWOW64\Hfqlnm32.exe family_berbew C:\Windows\SysWOW64\Immapg32.exe family_berbew C:\Windows\SysWOW64\Iicbehnq.exe family_berbew C:\Windows\SysWOW64\Jimekgff.exe family_berbew C:\Windows\SysWOW64\Jedeph32.exe family_berbew C:\Windows\SysWOW64\Jmmjgejj.exe family_berbew C:\Windows\SysWOW64\Kbceejpf.exe family_berbew C:\Windows\SysWOW64\Kfckahdj.exe family_berbew C:\Windows\SysWOW64\Lpcfkm32.exe family_berbew C:\Windows\SysWOW64\Lmgfda32.exe family_berbew C:\Windows\SysWOW64\Mdhdajea.exe family_berbew C:\Windows\SysWOW64\Mlefklpj.exe family_berbew C:\Windows\SysWOW64\Oponmilc.exe family_berbew C:\Windows\SysWOW64\Ocbddc32.exe family_berbew C:\Windows\SysWOW64\Odapnf32.exe family_berbew C:\Windows\SysWOW64\Pfjcgn32.exe family_berbew C:\Windows\SysWOW64\Pfolbmje.exe family_berbew C:\Windows\SysWOW64\Qnhahj32.exe family_berbew C:\Windows\SysWOW64\Ajanck32.exe family_berbew C:\Windows\SysWOW64\Aqncedbp.exe family_berbew C:\Windows\SysWOW64\Afmhck32.exe family_berbew C:\Windows\SysWOW64\Aadifclh.exe family_berbew C:\Windows\SysWOW64\Bjmnoi32.exe family_berbew C:\Windows\SysWOW64\Bnpppgdj.exe family_berbew C:\Windows\SysWOW64\Caebma32.exe family_berbew C:\Windows\SysWOW64\Cnkplejl.exe family_berbew C:\Windows\SysWOW64\Daconoae.exe family_berbew C:\Windows\SysWOW64\Dddhpjof.exe family_berbew C:\Windows\SysWOW64\Eggmge32.exe family_berbew C:\Windows\SysWOW64\Ekefmc32.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Qloebdig.exeQnnanphk.exeAejfpjne.exeAbngjnmo.exeAcocaf32.exeAhmlgd32.exeAngddopp.exeAlkdnboj.exeBdfibe32.exeBeeflhdh.exeBlpnib32.exeBbifelba.exeBehbag32.exeBhfonc32.exeBjdkjo32.exeBblckl32.exeBaocghgi.exeBdmpcdfm.exeBhikcb32.exeBldgdago.exeBobcpmfc.exeBbnpqk32.exeBaaplhef.exeBdolhc32.exeBhkhibmc.exeBkidenlg.exeBoepel32.exeCbqlfkmi.exeCeoibflm.exeCdainc32.exeChmeobkq.exeCklaknjd.exeCogmkl32.exeCbcilkjg.exeCeaehfjj.exeCddecc32.exeChpada32.exeCknnpm32.exeCojjqlpk.exeCbefaj32.exeCecbmf32.exeCdfbibnb.exeClnjjpod.exeCkpjfm32.exeColffknh.exeCajcbgml.exeCefoce32.exeCdiooblp.exeChdkoa32.exeCkcgkldl.exeConclk32.exeCamphf32.exeCehkhecb.exeChghdqbf.exeClbceo32.exeCkedalaj.exeDbllbibl.exeDekhneap.exeDdmhja32.exeDldpkoil.exeDkgqfl32.exeDboigi32.exeDaaicfgd.exeDdpeoafg.exepid process 1548 Qloebdig.exe 4736 Qnnanphk.exe 912 Aejfpjne.exe 4156 Abngjnmo.exe 4232 Acocaf32.exe 3868 Ahmlgd32.exe 5024 Angddopp.exe 4272 Alkdnboj.exe 2172 Bdfibe32.exe 3596 Beeflhdh.exe 3476 Blpnib32.exe 3460 Bbifelba.exe 3100 Behbag32.exe 1352 Bhfonc32.exe 4484 Bjdkjo32.exe 4256 Bblckl32.exe 1132 Baocghgi.exe 1956 Bdmpcdfm.exe 3692 Bhikcb32.exe 2268 Bldgdago.exe 5020 Bobcpmfc.exe 2908 Bbnpqk32.exe 1456 Baaplhef.exe 3052 Bdolhc32.exe 4444 Bhkhibmc.exe 5112 Bkidenlg.exe 1908 Boepel32.exe 2192 Cbqlfkmi.exe 5000 Ceoibflm.exe 1460 Cdainc32.exe 4300 Chmeobkq.exe 4400 Cklaknjd.exe 4056 Cogmkl32.exe 3672 Cbcilkjg.exe 3016 Ceaehfjj.exe 4868 Cddecc32.exe 3764 Chpada32.exe 1916 Cknnpm32.exe 2244 Cojjqlpk.exe 4520 Cbefaj32.exe 4384 Cecbmf32.exe 3524 Cdfbibnb.exe 4208 Clnjjpod.exe 4104 Ckpjfm32.exe 4864 Colffknh.exe 2308 Cajcbgml.exe 3980 Cefoce32.exe 624 Cdiooblp.exe 548 Chdkoa32.exe 3784 Ckcgkldl.exe 4496 Conclk32.exe 4912 Camphf32.exe 3536 Cehkhecb.exe 5004 Chghdqbf.exe 1900 Clbceo32.exe 1564 Ckedalaj.exe 1092 Dbllbibl.exe 3636 Dekhneap.exe 2056 Ddmhja32.exe 2128 Dldpkoil.exe 3452 Dkgqfl32.exe 1176 Dboigi32.exe 1796 Daaicfgd.exe 2880 Ddpeoafg.exe -
Drops file in System32 directory 64 IoCs
Processes:
Jedeph32.exeGkleeplq.exeKdigadjo.exeJiiicf32.exeDfoiaj32.exeKnchpiom.exeAijnep32.exeEdjgfcec.exeDbqqkkbo.exeNljofl32.exePocfpf32.exeDiccgfpd.exeKdkdgchl.exeJfpojead.exeKenggi32.exeKggcnoic.exeHgabkoee.exeGbeejp32.exeCbqlfkmi.exeNahgoe32.exeBehbag32.exeMbbagk32.exeEnpmld32.exeBqilgmdg.exeCffmfadl.exeAnmfbl32.exeCkjbhmad.exeDddhpjof.exeFafdkmap.exeCbphdn32.exeIlafiihp.exeFbpnkama.exePjhlml32.exeDddojq32.exeCpglnhad.exeLjfhqh32.exeHibjli32.exeIgedlh32.exeEkcpbj32.exeLlflea32.exeJlgepanl.exeIomcgl32.exeBnbmefbg.exeCnnlaehj.exeEaklidoi.exePonfka32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Jpijnqkp.exe Jedeph32.exe File created C:\Windows\SysWOW64\Adfnba32.dll File created C:\Windows\SysWOW64\Lpghll32.dll File opened for modification C:\Windows\SysWOW64\Dbocfo32.exe File created C:\Windows\SysWOW64\Mjpnkbfj.dll File created C:\Windows\SysWOW64\Pjlcjf32.exe File opened for modification C:\Windows\SysWOW64\Gfbibikg.exe Gkleeplq.exe File opened for modification C:\Windows\SysWOW64\Kggcnoic.exe Kdigadjo.exe File opened for modification C:\Windows\SysWOW64\Jlgepanl.exe Jiiicf32.exe File created C:\Windows\SysWOW64\Qfkqjmdg.exe File opened for modification C:\Windows\SysWOW64\Dimenegi.exe Dfoiaj32.exe File created C:\Windows\SysWOW64\Hmokmkpo.dll Knchpiom.exe File opened for modification C:\Windows\SysWOW64\Kpiqfima.exe File opened for modification C:\Windows\SysWOW64\Ojhiogdd.exe File created C:\Windows\SysWOW64\Bbiaci32.dll Aijnep32.exe File created C:\Windows\SysWOW64\Ejdocm32.exe Edjgfcec.exe File opened for modification C:\Windows\SysWOW64\Dflmlj32.exe Dbqqkkbo.exe File opened for modification C:\Windows\SysWOW64\Keimof32.exe File created C:\Windows\SysWOW64\Gbmgladp.dll Nljofl32.exe File created C:\Windows\SysWOW64\Agadmk32.dll Pocfpf32.exe File opened for modification C:\Windows\SysWOW64\Dkbocbog.exe Diccgfpd.exe File created C:\Windows\SysWOW64\Nbkdke32.dll Kdkdgchl.exe File created C:\Windows\SysWOW64\Jiokfpph.exe Jfpojead.exe File created C:\Windows\SysWOW64\Cclnpmna.dll Kenggi32.exe File created C:\Windows\SysWOW64\Kkconn32.exe Kggcnoic.exe File opened for modification C:\Windows\SysWOW64\Ibffhhek.exe Hgabkoee.exe File created C:\Windows\SysWOW64\Lfebfnqn.dll Gbeejp32.exe File created C:\Windows\SysWOW64\Ceoibflm.exe Cbqlfkmi.exe File created C:\Windows\SysWOW64\Niooqcad.exe Nahgoe32.exe File opened for modification C:\Windows\SysWOW64\Klhnfo32.exe File created C:\Windows\SysWOW64\Mpbbmhgf.dll Behbag32.exe File created C:\Windows\SysWOW64\Meamcg32.exe Mbbagk32.exe File created C:\Windows\SysWOW64\Eejeiocj.exe Enpmld32.exe File opened for modification C:\Windows\SysWOW64\Bfedoc32.exe Bqilgmdg.exe File created C:\Windows\SysWOW64\Dmpfbk32.exe Cffmfadl.exe File opened for modification C:\Windows\SysWOW64\Aednci32.exe Anmfbl32.exe File created C:\Windows\SysWOW64\Balgcpkn.dll File opened for modification C:\Windows\SysWOW64\Cnindhpg.exe Ckjbhmad.exe File created C:\Windows\SysWOW64\Pjcikejg.exe File opened for modification C:\Windows\SysWOW64\Dahhio32.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Fknicb32.exe Fafdkmap.exe File created C:\Windows\SysWOW64\Cijpahho.exe Cbphdn32.exe File created C:\Windows\SysWOW64\Idhnkf32.exe Ilafiihp.exe File created C:\Windows\SysWOW64\Hhhbcf32.dll Fbpnkama.exe File opened for modification C:\Windows\SysWOW64\Pfolbmje.exe Pjhlml32.exe File created C:\Windows\SysWOW64\Dllfkn32.exe Dddojq32.exe File opened for modification C:\Windows\SysWOW64\Cfadkb32.exe Cpglnhad.exe File created C:\Windows\SysWOW64\Lcnmin32.exe Ljfhqh32.exe File created C:\Windows\SysWOW64\Cjgjmg32.dll Hibjli32.exe File created C:\Windows\SysWOW64\Kamojc32.dll Igedlh32.exe File created C:\Windows\SysWOW64\Jbojlfdp.exe File created C:\Windows\SysWOW64\Igoedk32.dll Ekcpbj32.exe File created C:\Windows\SysWOW64\Lbpdblmo.exe Llflea32.exe File created C:\Windows\SysWOW64\Jofalmmp.exe Jlgepanl.exe File created C:\Windows\SysWOW64\Lihcbd32.dll File opened for modification C:\Windows\SysWOW64\Iiehpahb.exe Iomcgl32.exe File created C:\Windows\SysWOW64\Gaagdbfm.dll File created C:\Windows\SysWOW64\Bbdcakkc.dll File created C:\Windows\SysWOW64\Belebq32.exe Bnbmefbg.exe File created C:\Windows\SysWOW64\Dhfajjoj.exe Cnnlaehj.exe File opened for modification C:\Windows\SysWOW64\Obqanjdb.exe File created C:\Windows\SysWOW64\Eefhjc32.exe Eaklidoi.exe File created C:\Windows\SysWOW64\Cndepccb.dll Ponfka32.exe File opened for modification C:\Windows\SysWOW64\Mnegbp32.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 16756 16676 -
Modifies registry class 64 IoCs
Processes:
Ngjbaj32.exeBoeebnhp.exeFacqkg32.exeJibmgi32.exeBepmoh32.exeBeeflhdh.exeFcfhof32.exeEkefmc32.exeFafdkmap.exeNcofplba.exeIgfclkdj.exeKpjcdn32.exePlhnda32.exeKmfhkf32.exeCbqlfkmi.exeHmlpaoaj.exeKnhakh32.exeDhhfedil.exeFkopnh32.exeBqilgmdg.exeAjbmdn32.exeMalgcg32.exePchlpfjb.exeGaamlecg.exeDeanodkh.exeFbcfhibj.exeJepjhg32.exeLmgfda32.exeOacoqnci.exeDdgkpp32.exeKnflpoqf.exeIkbfgppo.exeEaklidoi.exeIgmagnkg.exeQlmgopjq.exeDdmhja32.exeKdmqmc32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdkcckgg.dll" Ngjbaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Boeebnhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnnkgo32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Facqkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jibmgi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bepmoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpjphglm.dll" Beeflhdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gelfeh32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klambq32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgncclck.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kajefoog.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fcfhof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ekefmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fafdkmap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ncofplba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Igfclkdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpjcdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Plhnda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kmfhkf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anafep32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cbqlfkmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gddmgi32.dll" Hmlpaoaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Knhakh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjkmhmpl.dll" Dhhfedil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qedegh32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fkopnh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bqilgmdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ajbmdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhoped32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Malgcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhkjegqi.dll" Pchlpfjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dolqpa32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkiebg32.dll" Gaamlecg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Deanodkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fbcfhibj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jepjhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idkobdie.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Deimfpda.dll" Lmgfda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oacoqnci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddgkpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Knflpoqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjajmpkj.dll" Ikbfgppo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flnakb32.dll" Eaklidoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dphmbk32.dll" Igmagnkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qlmgopjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddmhja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfojfj32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gicbkkca.dll" Kdmqmc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exeQloebdig.exeQnnanphk.exeAejfpjne.exeAbngjnmo.exeAcocaf32.exeAhmlgd32.exeAngddopp.exeAlkdnboj.exeBdfibe32.exeBeeflhdh.exeBlpnib32.exeBbifelba.exeBehbag32.exeBhfonc32.exeBjdkjo32.exeBblckl32.exeBaocghgi.exeBdmpcdfm.exeBhikcb32.exeBldgdago.exeBobcpmfc.exedescription pid process target process PID 4740 wrote to memory of 1548 4740 3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exe Qloebdig.exe PID 4740 wrote to memory of 1548 4740 3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exe Qloebdig.exe PID 4740 wrote to memory of 1548 4740 3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exe Qloebdig.exe PID 1548 wrote to memory of 4736 1548 Qloebdig.exe Qnnanphk.exe PID 1548 wrote to memory of 4736 1548 Qloebdig.exe Qnnanphk.exe PID 1548 wrote to memory of 4736 1548 Qloebdig.exe Qnnanphk.exe PID 4736 wrote to memory of 912 4736 Qnnanphk.exe Aejfpjne.exe PID 4736 wrote to memory of 912 4736 Qnnanphk.exe Aejfpjne.exe PID 4736 wrote to memory of 912 4736 Qnnanphk.exe Aejfpjne.exe PID 912 wrote to memory of 4156 912 Aejfpjne.exe Abngjnmo.exe PID 912 wrote to memory of 4156 912 Aejfpjne.exe Abngjnmo.exe PID 912 wrote to memory of 4156 912 Aejfpjne.exe Abngjnmo.exe PID 4156 wrote to memory of 4232 4156 Abngjnmo.exe Acocaf32.exe PID 4156 wrote to memory of 4232 4156 Abngjnmo.exe Acocaf32.exe PID 4156 wrote to memory of 4232 4156 Abngjnmo.exe Acocaf32.exe PID 4232 wrote to memory of 3868 4232 Acocaf32.exe Ahmlgd32.exe PID 4232 wrote to memory of 3868 4232 Acocaf32.exe Ahmlgd32.exe PID 4232 wrote to memory of 3868 4232 Acocaf32.exe Ahmlgd32.exe PID 3868 wrote to memory of 5024 3868 Ahmlgd32.exe Angddopp.exe PID 3868 wrote to memory of 5024 3868 Ahmlgd32.exe Angddopp.exe PID 3868 wrote to memory of 5024 3868 Ahmlgd32.exe Angddopp.exe PID 5024 wrote to memory of 4272 5024 Angddopp.exe Alkdnboj.exe PID 5024 wrote to memory of 4272 5024 Angddopp.exe Alkdnboj.exe PID 5024 wrote to memory of 4272 5024 Angddopp.exe Alkdnboj.exe PID 4272 wrote to memory of 2172 4272 Alkdnboj.exe Bdfibe32.exe PID 4272 wrote to memory of 2172 4272 Alkdnboj.exe Bdfibe32.exe PID 4272 wrote to memory of 2172 4272 Alkdnboj.exe Bdfibe32.exe PID 2172 wrote to memory of 3596 2172 Bdfibe32.exe Beeflhdh.exe PID 2172 wrote to memory of 3596 2172 Bdfibe32.exe Beeflhdh.exe PID 2172 wrote to memory of 3596 2172 Bdfibe32.exe Beeflhdh.exe PID 3596 wrote to memory of 3476 3596 Beeflhdh.exe Blpnib32.exe PID 3596 wrote to memory of 3476 3596 Beeflhdh.exe Blpnib32.exe PID 3596 wrote to memory of 3476 3596 Beeflhdh.exe Blpnib32.exe PID 3476 wrote to memory of 3460 3476 Blpnib32.exe Bbifelba.exe PID 3476 wrote to memory of 3460 3476 Blpnib32.exe Bbifelba.exe PID 3476 wrote to memory of 3460 3476 Blpnib32.exe Bbifelba.exe PID 3460 wrote to memory of 3100 3460 Bbifelba.exe Behbag32.exe PID 3460 wrote to memory of 3100 3460 Bbifelba.exe Behbag32.exe PID 3460 wrote to memory of 3100 3460 Bbifelba.exe Behbag32.exe PID 3100 wrote to memory of 1352 3100 Behbag32.exe Bhfonc32.exe PID 3100 wrote to memory of 1352 3100 Behbag32.exe Bhfonc32.exe PID 3100 wrote to memory of 1352 3100 Behbag32.exe Bhfonc32.exe PID 1352 wrote to memory of 4484 1352 Bhfonc32.exe Bjdkjo32.exe PID 1352 wrote to memory of 4484 1352 Bhfonc32.exe Bjdkjo32.exe PID 1352 wrote to memory of 4484 1352 Bhfonc32.exe Bjdkjo32.exe PID 4484 wrote to memory of 4256 4484 Bjdkjo32.exe Bblckl32.exe PID 4484 wrote to memory of 4256 4484 Bjdkjo32.exe Bblckl32.exe PID 4484 wrote to memory of 4256 4484 Bjdkjo32.exe Bblckl32.exe PID 4256 wrote to memory of 1132 4256 Bblckl32.exe Baocghgi.exe PID 4256 wrote to memory of 1132 4256 Bblckl32.exe Baocghgi.exe PID 4256 wrote to memory of 1132 4256 Bblckl32.exe Baocghgi.exe PID 1132 wrote to memory of 1956 1132 Baocghgi.exe Bdmpcdfm.exe PID 1132 wrote to memory of 1956 1132 Baocghgi.exe Bdmpcdfm.exe PID 1132 wrote to memory of 1956 1132 Baocghgi.exe Bdmpcdfm.exe PID 1956 wrote to memory of 3692 1956 Bdmpcdfm.exe Bhikcb32.exe PID 1956 wrote to memory of 3692 1956 Bdmpcdfm.exe Bhikcb32.exe PID 1956 wrote to memory of 3692 1956 Bdmpcdfm.exe Bhikcb32.exe PID 3692 wrote to memory of 2268 3692 Bhikcb32.exe Bldgdago.exe PID 3692 wrote to memory of 2268 3692 Bhikcb32.exe Bldgdago.exe PID 3692 wrote to memory of 2268 3692 Bhikcb32.exe Bldgdago.exe PID 2268 wrote to memory of 5020 2268 Bldgdago.exe Bobcpmfc.exe PID 2268 wrote to memory of 5020 2268 Bldgdago.exe Bobcpmfc.exe PID 2268 wrote to memory of 5020 2268 Bldgdago.exe Bobcpmfc.exe PID 5020 wrote to memory of 2908 5020 Bobcpmfc.exe Bbnpqk32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3924f69506f053c5ba22591dd037bb70_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\Qloebdig.exeC:\Windows\system32\Qloebdig.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Qnnanphk.exeC:\Windows\system32\Qnnanphk.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\Aejfpjne.exeC:\Windows\system32\Aejfpjne.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\Abngjnmo.exeC:\Windows\system32\Abngjnmo.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\Acocaf32.exeC:\Windows\system32\Acocaf32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\Ahmlgd32.exeC:\Windows\system32\Ahmlgd32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\Angddopp.exeC:\Windows\system32\Angddopp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\Alkdnboj.exeC:\Windows\system32\Alkdnboj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\Bdfibe32.exeC:\Windows\system32\Bdfibe32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\Beeflhdh.exeC:\Windows\system32\Beeflhdh.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\Blpnib32.exeC:\Windows\system32\Blpnib32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\Bbifelba.exeC:\Windows\system32\Bbifelba.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\Behbag32.exeC:\Windows\system32\Behbag32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\Bhfonc32.exeC:\Windows\system32\Bhfonc32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\Bblckl32.exeC:\Windows\system32\Bblckl32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\Baocghgi.exeC:\Windows\system32\Baocghgi.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\Bdmpcdfm.exeC:\Windows\system32\Bdmpcdfm.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Bhikcb32.exeC:\Windows\system32\Bhikcb32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\Bldgdago.exeC:\Windows\system32\Bldgdago.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Bobcpmfc.exeC:\Windows\system32\Bobcpmfc.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\Bbnpqk32.exeC:\Windows\system32\Bbnpqk32.exe23⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Baaplhef.exeC:\Windows\system32\Baaplhef.exe24⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\Bdolhc32.exeC:\Windows\system32\Bdolhc32.exe25⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\Bhkhibmc.exeC:\Windows\system32\Bhkhibmc.exe26⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\SysWOW64\Bkidenlg.exeC:\Windows\system32\Bkidenlg.exe27⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\Boepel32.exeC:\Windows\system32\Boepel32.exe28⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\Cbqlfkmi.exeC:\Windows\system32\Cbqlfkmi.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\Ceoibflm.exeC:\Windows\system32\Ceoibflm.exe30⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\Cdainc32.exeC:\Windows\system32\Cdainc32.exe31⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\Chmeobkq.exeC:\Windows\system32\Chmeobkq.exe32⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\Cklaknjd.exeC:\Windows\system32\Cklaknjd.exe33⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\Cogmkl32.exeC:\Windows\system32\Cogmkl32.exe34⤵
- Executes dropped EXE
PID:4056 -
C:\Windows\SysWOW64\Cbcilkjg.exeC:\Windows\system32\Cbcilkjg.exe35⤵
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\Ceaehfjj.exeC:\Windows\system32\Ceaehfjj.exe36⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\Cddecc32.exeC:\Windows\system32\Cddecc32.exe37⤵
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\Chpada32.exeC:\Windows\system32\Chpada32.exe38⤵
- Executes dropped EXE
PID:3764 -
C:\Windows\SysWOW64\Cknnpm32.exeC:\Windows\system32\Cknnpm32.exe39⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\Cojjqlpk.exeC:\Windows\system32\Cojjqlpk.exe40⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Cbefaj32.exeC:\Windows\system32\Cbefaj32.exe41⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\SysWOW64\Cecbmf32.exeC:\Windows\system32\Cecbmf32.exe42⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Cdfbibnb.exeC:\Windows\system32\Cdfbibnb.exe43⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\Clnjjpod.exeC:\Windows\system32\Clnjjpod.exe44⤵
- Executes dropped EXE
PID:4208 -
C:\Windows\SysWOW64\Ckpjfm32.exeC:\Windows\system32\Ckpjfm32.exe45⤵
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\Colffknh.exeC:\Windows\system32\Colffknh.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\Cajcbgml.exeC:\Windows\system32\Cajcbgml.exe47⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\Cefoce32.exeC:\Windows\system32\Cefoce32.exe48⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\Cdiooblp.exeC:\Windows\system32\Cdiooblp.exe49⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Chdkoa32.exeC:\Windows\system32\Chdkoa32.exe50⤵
- Executes dropped EXE
PID:548 -
C:\Windows\SysWOW64\Ckcgkldl.exeC:\Windows\system32\Ckcgkldl.exe51⤵
- Executes dropped EXE
PID:3784 -
C:\Windows\SysWOW64\Conclk32.exeC:\Windows\system32\Conclk32.exe52⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\Camphf32.exeC:\Windows\system32\Camphf32.exe53⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\Cehkhecb.exeC:\Windows\system32\Cehkhecb.exe54⤵
- Executes dropped EXE
PID:3536 -
C:\Windows\SysWOW64\Chghdqbf.exeC:\Windows\system32\Chghdqbf.exe55⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\Clbceo32.exeC:\Windows\system32\Clbceo32.exe56⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\Ckedalaj.exeC:\Windows\system32\Ckedalaj.exe57⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\Dbllbibl.exeC:\Windows\system32\Dbllbibl.exe58⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Dekhneap.exeC:\Windows\system32\Dekhneap.exe59⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\SysWOW64\Ddmhja32.exeC:\Windows\system32\Ddmhja32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:2056 -
C:\Windows\SysWOW64\Dldpkoil.exeC:\Windows\system32\Dldpkoil.exe61⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\Dkgqfl32.exeC:\Windows\system32\Dkgqfl32.exe62⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\Dboigi32.exeC:\Windows\system32\Dboigi32.exe63⤵
- Executes dropped EXE
PID:1176 -
C:\Windows\SysWOW64\Daaicfgd.exeC:\Windows\system32\Daaicfgd.exe64⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Ddpeoafg.exeC:\Windows\system32\Ddpeoafg.exe65⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\Doeiljfn.exeC:\Windows\system32\Doeiljfn.exe66⤵PID:1480
-
C:\Windows\SysWOW64\Dadeieea.exeC:\Windows\system32\Dadeieea.exe67⤵PID:4612
-
C:\Windows\SysWOW64\Ddbbeade.exeC:\Windows\system32\Ddbbeade.exe68⤵PID:4148
-
C:\Windows\SysWOW64\Dhnnep32.exeC:\Windows\system32\Dhnnep32.exe69⤵PID:1972
-
C:\Windows\SysWOW64\Dkljak32.exeC:\Windows\system32\Dkljak32.exe70⤵PID:3116
-
C:\Windows\SysWOW64\Dohfbj32.exeC:\Windows\system32\Dohfbj32.exe71⤵PID:2380
-
C:\Windows\SysWOW64\Dccbbhld.exeC:\Windows\system32\Dccbbhld.exe72⤵PID:4340
-
C:\Windows\SysWOW64\Deanodkh.exeC:\Windows\system32\Deanodkh.exe73⤵
- Modifies registry class
PID:4372 -
C:\Windows\SysWOW64\Dddojq32.exeC:\Windows\system32\Dddojq32.exe74⤵
- Drops file in System32 directory
PID:1552 -
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe75⤵PID:4900
-
C:\Windows\SysWOW64\Dojcgi32.exeC:\Windows\system32\Dojcgi32.exe76⤵PID:2984
-
C:\Windows\SysWOW64\Dceohhja.exeC:\Windows\system32\Dceohhja.exe77⤵PID:1040
-
C:\Windows\SysWOW64\Dahode32.exeC:\Windows\system32\Dahode32.exe78⤵PID:3644
-
C:\Windows\SysWOW64\Ddgkpp32.exeC:\Windows\system32\Ddgkpp32.exe79⤵
- Modifies registry class
PID:5012 -
C:\Windows\SysWOW64\Dhbgqohi.exeC:\Windows\system32\Dhbgqohi.exe80⤵PID:1028
-
C:\Windows\SysWOW64\Ekacmjgl.exeC:\Windows\system32\Ekacmjgl.exe81⤵PID:2016
-
C:\Windows\SysWOW64\Eolpmi32.exeC:\Windows\system32\Eolpmi32.exe82⤵PID:1416
-
C:\Windows\SysWOW64\Eaklidoi.exeC:\Windows\system32\Eaklidoi.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:4436 -
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe84⤵PID:3352
-
C:\Windows\SysWOW64\Edihepnm.exeC:\Windows\system32\Edihepnm.exe85⤵PID:3092
-
C:\Windows\SysWOW64\Elppfmoo.exeC:\Windows\system32\Elppfmoo.exe86⤵PID:1344
-
C:\Windows\SysWOW64\Ekcpbj32.exeC:\Windows\system32\Ekcpbj32.exe87⤵
- Drops file in System32 directory
PID:212 -
C:\Windows\SysWOW64\Ecjhcg32.exeC:\Windows\system32\Ecjhcg32.exe88⤵PID:4012
-
C:\Windows\SysWOW64\Eeidoc32.exeC:\Windows\system32\Eeidoc32.exe89⤵PID:1128
-
C:\Windows\SysWOW64\Eocenh32.exeC:\Windows\system32\Eocenh32.exe90⤵PID:3464
-
C:\Windows\SysWOW64\Eemnjbaj.exeC:\Windows\system32\Eemnjbaj.exe91⤵PID:3204
-
C:\Windows\SysWOW64\Ehnglm32.exeC:\Windows\system32\Ehnglm32.exe92⤵PID:792
-
C:\Windows\SysWOW64\Fkmchi32.exeC:\Windows\system32\Fkmchi32.exe93⤵PID:3488
-
C:\Windows\SysWOW64\Fohoigfh.exeC:\Windows\system32\Fohoigfh.exe94⤵PID:1744
-
C:\Windows\SysWOW64\Fafkecel.exeC:\Windows\system32\Fafkecel.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1052 -
C:\Windows\SysWOW64\Fdegandp.exeC:\Windows\system32\Fdegandp.exe96⤵PID:5128
-
C:\Windows\SysWOW64\Fhqcam32.exeC:\Windows\system32\Fhqcam32.exe97⤵PID:5164
-
C:\Windows\SysWOW64\Fkopnh32.exeC:\Windows\system32\Fkopnh32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5200 -
C:\Windows\SysWOW64\Fcfhof32.exeC:\Windows\system32\Fcfhof32.exe99⤵
- Modifies registry class
PID:5236 -
C:\Windows\SysWOW64\Faihkbci.exeC:\Windows\system32\Faihkbci.exe100⤵PID:5272
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe101⤵PID:5308
-
C:\Windows\SysWOW64\Fhcpgmjf.exeC:\Windows\system32\Fhcpgmjf.exe102⤵PID:5344
-
C:\Windows\SysWOW64\Fkalchij.exeC:\Windows\system32\Fkalchij.exe103⤵PID:5380
-
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe104⤵PID:5416
-
C:\Windows\SysWOW64\Fakdpb32.exeC:\Windows\system32\Fakdpb32.exe105⤵PID:5452
-
C:\Windows\SysWOW64\Fdialn32.exeC:\Windows\system32\Fdialn32.exe106⤵PID:5492
-
C:\Windows\SysWOW64\Fhemmlhc.exeC:\Windows\system32\Fhemmlhc.exe107⤵PID:5524
-
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe108⤵PID:5560
-
C:\Windows\SysWOW64\Fooeif32.exeC:\Windows\system32\Fooeif32.exe109⤵PID:5596
-
C:\Windows\SysWOW64\Fckajehi.exeC:\Windows\system32\Fckajehi.exe110⤵PID:5632
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe111⤵PID:5668
-
C:\Windows\SysWOW64\Fdlnbm32.exeC:\Windows\system32\Fdlnbm32.exe112⤵PID:5708
-
C:\Windows\SysWOW64\Flceckoj.exeC:\Windows\system32\Flceckoj.exe113⤵PID:5740
-
C:\Windows\SysWOW64\Fkffog32.exeC:\Windows\system32\Fkffog32.exe114⤵PID:5776
-
C:\Windows\SysWOW64\Fbpnkama.exeC:\Windows\system32\Fbpnkama.exe115⤵
- Drops file in System32 directory
PID:5820 -
C:\Windows\SysWOW64\Fdnjgmle.exeC:\Windows\system32\Fdnjgmle.exe116⤵PID:5908
-
C:\Windows\SysWOW64\Gkhbdg32.exeC:\Windows\system32\Gkhbdg32.exe117⤵PID:5996
-
C:\Windows\SysWOW64\Ghlcnk32.exeC:\Windows\system32\Ghlcnk32.exe118⤵PID:6040
-
C:\Windows\SysWOW64\Gkkojgao.exeC:\Windows\system32\Gkkojgao.exe119⤵PID:6080
-
C:\Windows\SysWOW64\Gfpcgpae.exeC:\Windows\system32\Gfpcgpae.exe120⤵PID:6120
-
C:\Windows\SysWOW64\Ghopckpi.exeC:\Windows\system32\Ghopckpi.exe121⤵PID:2416
-
C:\Windows\SysWOW64\Gkmlofol.exeC:\Windows\system32\Gkmlofol.exe122⤵PID:3068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-