Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe
Resource
win10v2004-20220901-en
General
-
Target
c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe
-
Size
186KB
-
MD5
68bab678bbf183fc9668707ea9dabb50
-
SHA1
707fa178034e4d3844b759eb8275525887cff554
-
SHA256
c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c
-
SHA512
8a948e2700cc09b1b51334a4b051eac781da984fbd1cce07c71bfd809b03f35e22387e301dd546b3b916f0ad9308b08018e5d3338f1337c51c4c9d8dc1a36f17
-
SSDEEP
3072:TLbKuZKzXw2RjwkfqrIWUEbskfsmbL9Nn0uNFi+O0xShCzukYr+:LhKDHpwspcb4mn9Nr5OCgCzuBK
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 912 wuauolts.exe 1292 wuauolts.exe 1072 wuauolts.exe 692 wuauolts.exe 1884 wuauolts.exe 1200 wuauolts.exe 1048 wuauolts.exe 1572 wuauolts.exe 1276 wuauolts.exe 1916 wuauolts.exe 672 wuauolts.exe 956 wuauolts.exe 1956 wuauolts.exe 924 wuauolts.exe 1196 wuauolts.exe 1576 wuauolts.exe 888 wuauolts.exe 572 wuauolts.exe 268 wuauolts.exe 1820 wuauolts.exe 484 wuauolts.exe 676 wuauolts.exe 2008 wuauolts.exe 1044 wuauolts.exe 1948 wuauolts.exe 616 wuauolts.exe 1724 wuauolts.exe 2032 wuauolts.exe 524 wuauolts.exe 1480 wuauolts.exe 548 wuauolts.exe 1720 wuauolts.exe 1104 wuauolts.exe 976 wuauolts.exe 1592 wuauolts.exe 988 wuauolts.exe 596 wuauolts.exe 1824 wuauolts.exe 1632 wuauolts.exe 1248 wuauolts.exe 1584 wuauolts.exe 308 wuauolts.exe 1652 wuauolts.exe 2028 wuauolts.exe 1568 wuauolts.exe 2044 wuauolts.exe 660 wuauolts.exe 1944 wuauolts.exe 240 wuauolts.exe 856 wuauolts.exe 816 wuauolts.exe 1908 wuauolts.exe 1524 wuauolts.exe 2072 wuauolts.exe 2096 wuauolts.exe 2120 wuauolts.exe 2144 wuauolts.exe 2168 wuauolts.exe 2192 wuauolts.exe 2216 wuauolts.exe 2240 wuauolts.exe 2264 wuauolts.exe 2288 wuauolts.exe 2312 wuauolts.exe -
Loads dropped DLL 64 IoCs
pid Process 948 c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe 948 c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe 912 wuauolts.exe 912 wuauolts.exe 1292 wuauolts.exe 1292 wuauolts.exe 1072 wuauolts.exe 1072 wuauolts.exe 692 wuauolts.exe 692 wuauolts.exe 1884 wuauolts.exe 1884 wuauolts.exe 1200 wuauolts.exe 1200 wuauolts.exe 1048 wuauolts.exe 1048 wuauolts.exe 1572 wuauolts.exe 1572 wuauolts.exe 1276 wuauolts.exe 1276 wuauolts.exe 1916 wuauolts.exe 1916 wuauolts.exe 672 wuauolts.exe 672 wuauolts.exe 956 wuauolts.exe 956 wuauolts.exe 1956 wuauolts.exe 1956 wuauolts.exe 924 wuauolts.exe 924 wuauolts.exe 1196 wuauolts.exe 1196 wuauolts.exe 1576 wuauolts.exe 1576 wuauolts.exe 888 wuauolts.exe 888 wuauolts.exe 572 wuauolts.exe 572 wuauolts.exe 268 wuauolts.exe 268 wuauolts.exe 1820 wuauolts.exe 1820 wuauolts.exe 484 wuauolts.exe 484 wuauolts.exe 676 wuauolts.exe 676 wuauolts.exe 2008 wuauolts.exe 2008 wuauolts.exe 1044 wuauolts.exe 1044 wuauolts.exe 1948 wuauolts.exe 1948 wuauolts.exe 616 wuauolts.exe 616 wuauolts.exe 1724 wuauolts.exe 1724 wuauolts.exe 2032 wuauolts.exe 2032 wuauolts.exe 524 wuauolts.exe 524 wuauolts.exe 1480 wuauolts.exe 1480 wuauolts.exe 548 wuauolts.exe 548 wuauolts.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\m: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\l: wuauolts.exe File opened (read-only) \??\u: wuauolts.exe File opened (read-only) \??\q: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\w: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\y: wuauolts.exe File opened (read-only) \??\m: wuauolts.exe File opened (read-only) \??\l: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\y: wuauolts.exe File opened (read-only) \??\u: wuauolts.exe File opened (read-only) \??\g: wuauolts.exe File opened (read-only) \??\j: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\m: wuauolts.exe File opened (read-only) \??\w: wuauolts.exe File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\x: wuauolts.exe File opened (read-only) \??\u: wuauolts.exe File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\y: wuauolts.exe File opened (read-only) \??\k: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\w: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\m: wuauolts.exe File opened (read-only) \??\f: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\q: wuauolts.exe File opened (read-only) \??\e: wuauolts.exe File opened (read-only) \??\f: wuauolts.exe File opened (read-only) \??\r: wuauolts.exe File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\m: wuauolts.exe File opened (read-only) \??\q: wuauolts.exe File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\y: wuauolts.exe File opened (read-only) \??\p: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\v: wuauolts.exe File opened (read-only) \??\g: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\u: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\r: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\k: wuauolts.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File opened for modification C:\Windows\SysWOW64\wuauolts.exe c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 948 c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe 912 wuauolts.exe 1292 wuauolts.exe 1072 wuauolts.exe 692 wuauolts.exe 1884 wuauolts.exe 1200 wuauolts.exe 1048 wuauolts.exe 1572 wuauolts.exe 1276 wuauolts.exe 1916 wuauolts.exe 672 wuauolts.exe 956 wuauolts.exe 1956 wuauolts.exe 924 wuauolts.exe 1196 wuauolts.exe 1576 wuauolts.exe 888 wuauolts.exe 572 wuauolts.exe 268 wuauolts.exe 1820 wuauolts.exe 484 wuauolts.exe 676 wuauolts.exe 2008 wuauolts.exe 1044 wuauolts.exe 1948 wuauolts.exe 616 wuauolts.exe 1724 wuauolts.exe 2032 wuauolts.exe 524 wuauolts.exe 1480 wuauolts.exe 548 wuauolts.exe 1720 wuauolts.exe 1104 wuauolts.exe 976 wuauolts.exe 1592 wuauolts.exe 988 wuauolts.exe 596 wuauolts.exe 1824 wuauolts.exe 1632 wuauolts.exe 1248 wuauolts.exe 1584 wuauolts.exe 308 wuauolts.exe 1652 wuauolts.exe 2028 wuauolts.exe 1568 wuauolts.exe 2044 wuauolts.exe 660 wuauolts.exe 1944 wuauolts.exe 240 wuauolts.exe 856 wuauolts.exe 816 wuauolts.exe 1908 wuauolts.exe 1524 wuauolts.exe 2072 wuauolts.exe 2096 wuauolts.exe 2120 wuauolts.exe 2144 wuauolts.exe 2168 wuauolts.exe 2192 wuauolts.exe 2216 wuauolts.exe 2240 wuauolts.exe 2264 wuauolts.exe 2288 wuauolts.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 948 wrote to memory of 912 948 c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe 27 PID 948 wrote to memory of 912 948 c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe 27 PID 948 wrote to memory of 912 948 c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe 27 PID 948 wrote to memory of 912 948 c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe 27 PID 912 wrote to memory of 1292 912 wuauolts.exe 28 PID 912 wrote to memory of 1292 912 wuauolts.exe 28 PID 912 wrote to memory of 1292 912 wuauolts.exe 28 PID 912 wrote to memory of 1292 912 wuauolts.exe 28 PID 1292 wrote to memory of 1072 1292 wuauolts.exe 29 PID 1292 wrote to memory of 1072 1292 wuauolts.exe 29 PID 1292 wrote to memory of 1072 1292 wuauolts.exe 29 PID 1292 wrote to memory of 1072 1292 wuauolts.exe 29 PID 1072 wrote to memory of 692 1072 wuauolts.exe 30 PID 1072 wrote to memory of 692 1072 wuauolts.exe 30 PID 1072 wrote to memory of 692 1072 wuauolts.exe 30 PID 1072 wrote to memory of 692 1072 wuauolts.exe 30 PID 692 wrote to memory of 1884 692 wuauolts.exe 31 PID 692 wrote to memory of 1884 692 wuauolts.exe 31 PID 692 wrote to memory of 1884 692 wuauolts.exe 31 PID 692 wrote to memory of 1884 692 wuauolts.exe 31 PID 1884 wrote to memory of 1200 1884 wuauolts.exe 32 PID 1884 wrote to memory of 1200 1884 wuauolts.exe 32 PID 1884 wrote to memory of 1200 1884 wuauolts.exe 32 PID 1884 wrote to memory of 1200 1884 wuauolts.exe 32 PID 1200 wrote to memory of 1048 1200 wuauolts.exe 33 PID 1200 wrote to memory of 1048 1200 wuauolts.exe 33 PID 1200 wrote to memory of 1048 1200 wuauolts.exe 33 PID 1200 wrote to memory of 1048 1200 wuauolts.exe 33 PID 1048 wrote to memory of 1572 1048 wuauolts.exe 34 PID 1048 wrote to memory of 1572 1048 wuauolts.exe 34 PID 1048 wrote to memory of 1572 1048 wuauolts.exe 34 PID 1048 wrote to memory of 1572 1048 wuauolts.exe 34 PID 1572 wrote to memory of 1276 1572 wuauolts.exe 35 PID 1572 wrote to memory of 1276 1572 wuauolts.exe 35 PID 1572 wrote to memory of 1276 1572 wuauolts.exe 35 PID 1572 wrote to memory of 1276 1572 wuauolts.exe 35 PID 1276 wrote to memory of 1916 1276 wuauolts.exe 36 PID 1276 wrote to memory of 1916 1276 wuauolts.exe 36 PID 1276 wrote to memory of 1916 1276 wuauolts.exe 36 PID 1276 wrote to memory of 1916 1276 wuauolts.exe 36 PID 1916 wrote to memory of 672 1916 wuauolts.exe 37 PID 1916 wrote to memory of 672 1916 wuauolts.exe 37 PID 1916 wrote to memory of 672 1916 wuauolts.exe 37 PID 1916 wrote to memory of 672 1916 wuauolts.exe 37 PID 672 wrote to memory of 956 672 wuauolts.exe 38 PID 672 wrote to memory of 956 672 wuauolts.exe 38 PID 672 wrote to memory of 956 672 wuauolts.exe 38 PID 672 wrote to memory of 956 672 wuauolts.exe 38 PID 956 wrote to memory of 1956 956 wuauolts.exe 39 PID 956 wrote to memory of 1956 956 wuauolts.exe 39 PID 956 wrote to memory of 1956 956 wuauolts.exe 39 PID 956 wrote to memory of 1956 956 wuauolts.exe 39 PID 1956 wrote to memory of 924 1956 wuauolts.exe 40 PID 1956 wrote to memory of 924 1956 wuauolts.exe 40 PID 1956 wrote to memory of 924 1956 wuauolts.exe 40 PID 1956 wrote to memory of 924 1956 wuauolts.exe 40 PID 924 wrote to memory of 1196 924 wuauolts.exe 41 PID 924 wrote to memory of 1196 924 wuauolts.exe 41 PID 924 wrote to memory of 1196 924 wuauolts.exe 41 PID 924 wrote to memory of 1196 924 wuauolts.exe 41 PID 1196 wrote to memory of 1576 1196 wuauolts.exe 42 PID 1196 wrote to memory of 1576 1196 wuauolts.exe 42 PID 1196 wrote to memory of 1576 1196 wuauolts.exe 42 PID 1196 wrote to memory of 1576 1196 wuauolts.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe"C:\Users\Admin\AppData\Local\Temp\c6755c545a7fff41b8189438102f1c776c0494df8413b4db2879933b6fce1f8c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1576 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:888 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:572 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:268 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1820 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:484 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2008 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1044 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1948 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:616 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1724 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2032 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:524 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1480 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:548 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe10⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1720 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe11⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1104 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe12⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:976 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe13⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1592 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:988 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:596 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe16⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1824 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe17⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1632 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe18⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1248 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe19⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1584 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe20⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:308 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe21⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1652 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe22⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2028 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe23⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1568 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe24⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2044 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:660 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe26⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1944 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe27⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:240 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe28⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:856 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe29⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:816 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1908 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe31⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1524 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe32⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2072 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe33⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2096 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe34⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2120 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe35⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2144 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2168 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe37⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2192 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe38⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2216 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe39⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2240 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe40⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2264 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe41⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2288 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe42⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe43⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe44⤵PID:2356
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe45⤵
- Enumerates connected drives
PID:2380 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe46⤵PID:2412
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe47⤵PID:2444
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe48⤵PID:2476
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe49⤵
- Enumerates connected drives
PID:2512 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe50⤵PID:2548
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe51⤵PID:2580
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe52⤵
- Enumerates connected drives
PID:2616 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe53⤵
- Drops file in System32 directory
PID:2648 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe54⤵PID:2688
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe55⤵PID:2720
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe56⤵PID:2756
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe57⤵
- Enumerates connected drives
PID:2788 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe58⤵PID:2820
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe59⤵PID:2852
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe60⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe61⤵
- Enumerates connected drives
PID:2920 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe62⤵PID:2956
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe63⤵
- Drops file in System32 directory
PID:2992 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe64⤵PID:3028
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe65⤵PID:3068
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe66⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe67⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe68⤵
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe69⤵
- Enumerates connected drives
PID:2296 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe70⤵PID:2368
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe71⤵PID:2428
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe72⤵PID:2492
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe73⤵PID:2532
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe74⤵PID:2592
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe75⤵PID:2656
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe76⤵PID:2676
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe77⤵PID:2712
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe78⤵PID:2740
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe79⤵PID:2772
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe80⤵PID:2808
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe81⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe82⤵PID:2872
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe83⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe84⤵
- Drops file in System32 directory
PID:2948 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe85⤵PID:3008
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe86⤵
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe87⤵
- Enumerates connected drives
PID:2080 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe88⤵PID:2180
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe89⤵
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe90⤵
- Enumerates connected drives
PID:2404 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe91⤵PID:2464
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe92⤵
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe93⤵PID:2604
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe94⤵PID:2728
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe95⤵PID:2896
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe96⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe97⤵
- Enumerates connected drives
PID:3064 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe98⤵
- Enumerates connected drives
PID:2136 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe99⤵PID:2328
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe100⤵
- Drops file in System32 directory
PID:2500 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe101⤵
- Enumerates connected drives
PID:2600 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe102⤵
- Enumerates connected drives
PID:2800 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe103⤵
- Enumerates connected drives
PID:2980 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe104⤵
- Enumerates connected drives
PID:1708 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe105⤵PID:2324
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe106⤵PID:2556
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe107⤵PID:2764
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe108⤵
- Enumerates connected drives
PID:3020 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe109⤵
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe110⤵PID:2664
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe111⤵PID:984
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe112⤵
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe113⤵PID:2880
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe114⤵
- Drops file in System32 directory
PID:2564 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe115⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe116⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe117⤵PID:3092
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe118⤵
- Enumerates connected drives
PID:3112 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe119⤵
- Drops file in System32 directory
PID:3132 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe120⤵PID:3152
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe121⤵PID:3172
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe122⤵PID:3192
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-