Analysis
-
max time kernel
157s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 13:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.0224e09d0fff4bf1622df67b77f019b0.exe
Resource
win7-20231020-en
5 signatures
150 seconds
General
-
Target
NEAS.0224e09d0fff4bf1622df67b77f019b0.exe
-
Size
712KB
-
MD5
0224e09d0fff4bf1622df67b77f019b0
-
SHA1
a443cad812e72aa3a2d5a062e312990a9a158c66
-
SHA256
15a1ba1da8731132d0ca9faf53988d3e6f80f77c750a7472b8dce7314c45d03e
-
SHA512
3d2767569f07ac6e5d6b140622701995460c35c6247d34f877e5ac1449f9506ded7fe2c0f7b3d53e845c9f1358739597df8fa3bf8601ebfe9179d4b23ec2a18a
-
SSDEEP
12288:n3C9yMo+S0L9xRnoq7H9xqYL5oeEF5rna9sUxg7udOxPJVSjYg8lcmJ1MZxEkTs2:SgD4bhoqLDqYLS7w4i
Malware Config
Signatures
-
Detect Blackmoon payload 29 IoCs
resource yara_rule behavioral1/memory/2092-2-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1108-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2560-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2548-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1976-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/760-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1512-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1372-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2036-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/980-238-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1656-249-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2372-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-307-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1496-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-333-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-342-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1324-384-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3004-407-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-417-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-465-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1108 83k7q5e.exe 2780 ai90733.exe 2952 a99m1s.exe 2840 93x5i0u.exe 2700 t56u35.exe 2560 lik9w5.exe 2548 ba9stu7.exe 2824 0d1444.exe 2904 9775m7.exe 3020 k8984.exe 1976 d4q7i.exe 2228 fo0w1a1.exe 1952 4bmek.exe 760 u928lt.exe 1624 384g38.exe 1512 a4jnd.exe 1372 ei387ux.exe 2036 2f338.exe 2024 u413t93.exe 2416 r62633v.exe 1552 95jo6.exe 1496 6231ib6.exe 980 16oh101.exe 1656 dug9kd.exe 2372 1v14ot2.exe 2148 2dd4r.exe 560 4451o.exe 688 25acab.exe 756 0amq1.exe 2216 554oi8o.exe 2644 7t55m.exe 2136 at1b21.exe 2960 97ds0.exe 2780 ai90733.exe 2836 51q3h9u.exe 2768 vb9a14i.exe 2580 5e02347.exe 3060 6e4531.exe 1324 7159g5.exe 380 tk95q39.exe 3028 suwc12r.exe 3004 89owqb2.exe 2900 99375l.exe 1572 6ix8v7.exe 1984 83wo3i.exe 1972 we69n.exe 1484 jg655q.exe 1860 f5u7m1.exe 1624 384g38.exe 2324 rhod4.exe 2444 u7ur86n.exe 2356 47956.exe 2412 j0192.exe 2120 r614l.exe 1524 5859w.exe 752 35gb2e.exe 1680 u498qf8.exe 876 qwv259a.exe 1528 035a4.exe 1336 om7w9m.exe 2060 9bm6l.exe 1792 6ecq7.exe 2116 91o3350.exe 1628 va5e5ac.exe -
resource yara_rule behavioral1/memory/2092-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1108-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1976-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/760-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1512-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1372-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1552-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/980-238-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1656-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2372-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-307-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/688-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1496-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-333-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-342-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-341-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-357-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1512-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-365-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-384-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-382-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/380-391-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-407-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-417-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1572-424-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1972-439-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-465-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-463-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1524-511-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-489-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-481-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2324-473-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1484-447-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-415-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1680-527-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/752-519-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-399-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-374-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-74-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1108 2092 NEAS.0224e09d0fff4bf1622df67b77f019b0.exe 22 PID 2092 wrote to memory of 1108 2092 NEAS.0224e09d0fff4bf1622df67b77f019b0.exe 22 PID 2092 wrote to memory of 1108 2092 NEAS.0224e09d0fff4bf1622df67b77f019b0.exe 22 PID 2092 wrote to memory of 1108 2092 NEAS.0224e09d0fff4bf1622df67b77f019b0.exe 22 PID 1108 wrote to memory of 2780 1108 83k7q5e.exe 57 PID 1108 wrote to memory of 2780 1108 83k7q5e.exe 57 PID 1108 wrote to memory of 2780 1108 83k7q5e.exe 57 PID 1108 wrote to memory of 2780 1108 83k7q5e.exe 57 PID 2780 wrote to memory of 2952 2780 ai90733.exe 29 PID 2780 wrote to memory of 2952 2780 ai90733.exe 29 PID 2780 wrote to memory of 2952 2780 ai90733.exe 29 PID 2780 wrote to memory of 2952 2780 ai90733.exe 29 PID 2952 wrote to memory of 2840 2952 a99m1s.exe 30 PID 2952 wrote to memory of 2840 2952 a99m1s.exe 30 PID 2952 wrote to memory of 2840 2952 a99m1s.exe 30 PID 2952 wrote to memory of 2840 2952 a99m1s.exe 30 PID 2840 wrote to memory of 2700 2840 93x5i0u.exe 31 PID 2840 wrote to memory of 2700 2840 93x5i0u.exe 31 PID 2840 wrote to memory of 2700 2840 93x5i0u.exe 31 PID 2840 wrote to memory of 2700 2840 93x5i0u.exe 31 PID 2700 wrote to memory of 2560 2700 t56u35.exe 32 PID 2700 wrote to memory of 2560 2700 t56u35.exe 32 PID 2700 wrote to memory of 2560 2700 t56u35.exe 32 PID 2700 wrote to memory of 2560 2700 t56u35.exe 32 PID 2560 wrote to memory of 2548 2560 lik9w5.exe 33 PID 2560 wrote to memory of 2548 2560 lik9w5.exe 33 PID 2560 wrote to memory of 2548 2560 lik9w5.exe 33 PID 2560 wrote to memory of 2548 2560 lik9w5.exe 33 PID 2548 wrote to memory of 2824 2548 ba9stu7.exe 34 PID 2548 wrote to memory of 2824 2548 ba9stu7.exe 34 PID 2548 wrote to memory of 2824 2548 ba9stu7.exe 34 PID 2548 wrote to memory of 2824 2548 ba9stu7.exe 34 PID 2824 wrote to memory of 2904 2824 0d1444.exe 90 PID 2824 wrote to memory of 2904 2824 0d1444.exe 90 PID 2824 wrote to memory of 2904 2824 0d1444.exe 90 PID 2824 wrote to memory of 2904 2824 0d1444.exe 90 PID 2904 wrote to memory of 3020 2904 9775m7.exe 35 PID 2904 wrote to memory of 3020 2904 9775m7.exe 35 PID 2904 wrote to memory of 3020 2904 9775m7.exe 35 PID 2904 wrote to memory of 3020 2904 9775m7.exe 35 PID 3020 wrote to memory of 1976 3020 k8984.exe 36 PID 3020 wrote to memory of 1976 3020 k8984.exe 36 PID 3020 wrote to memory of 1976 3020 k8984.exe 36 PID 3020 wrote to memory of 1976 3020 k8984.exe 36 PID 1976 wrote to memory of 2228 1976 d4q7i.exe 37 PID 1976 wrote to memory of 2228 1976 d4q7i.exe 37 PID 1976 wrote to memory of 2228 1976 d4q7i.exe 37 PID 1976 wrote to memory of 2228 1976 d4q7i.exe 37 PID 2228 wrote to memory of 1952 2228 fo0w1a1.exe 38 PID 2228 wrote to memory of 1952 2228 fo0w1a1.exe 38 PID 2228 wrote to memory of 1952 2228 fo0w1a1.exe 38 PID 2228 wrote to memory of 1952 2228 fo0w1a1.exe 38 PID 1952 wrote to memory of 760 1952 4bmek.exe 89 PID 1952 wrote to memory of 760 1952 4bmek.exe 89 PID 1952 wrote to memory of 760 1952 4bmek.exe 89 PID 1952 wrote to memory of 760 1952 4bmek.exe 89 PID 760 wrote to memory of 1624 760 u928lt.exe 88 PID 760 wrote to memory of 1624 760 u928lt.exe 88 PID 760 wrote to memory of 1624 760 u928lt.exe 88 PID 760 wrote to memory of 1624 760 u928lt.exe 88 PID 1624 wrote to memory of 1512 1624 384g38.exe 87 PID 1624 wrote to memory of 1512 1624 384g38.exe 87 PID 1624 wrote to memory of 1512 1624 384g38.exe 87 PID 1624 wrote to memory of 1512 1624 384g38.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0224e09d0fff4bf1622df67b77f019b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0224e09d0fff4bf1622df67b77f019b0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\83k7q5e.exec:\83k7q5e.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\d981gq.exec:\d981gq.exe3⤵PID:2780
-
\??\c:\a99m1s.exec:\a99m1s.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\93x5i0u.exec:\93x5i0u.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\t56u35.exec:\t56u35.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\lik9w5.exec:\lik9w5.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\ba9stu7.exec:\ba9stu7.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\0d1444.exec:\0d1444.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\9775m7.exec:\9775m7.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904
-
-
-
-
-
-
-
-
\??\c:\51q3h9u.exec:\51q3h9u.exe4⤵
- Executes dropped EXE
PID:2836 -
\??\c:\vb9a14i.exec:\vb9a14i.exe5⤵
- Executes dropped EXE
PID:2768 -
\??\c:\5e02347.exec:\5e02347.exe6⤵
- Executes dropped EXE
PID:2580 -
\??\c:\6e4531.exec:\6e4531.exe7⤵
- Executes dropped EXE
PID:3060
-
-
-
-
-
-
-
\??\c:\k8984.exec:\k8984.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\d4q7i.exec:\d4q7i.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
\??\c:\fo0w1a1.exec:\fo0w1a1.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\4bmek.exec:\4bmek.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\u928lt.exec:\u928lt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760
-
-
-
-
-
\??\c:\16oh101.exec:\16oh101.exe1⤵
- Executes dropped EXE
PID:980 -
\??\c:\dug9kd.exec:\dug9kd.exe2⤵
- Executes dropped EXE
PID:1656 -
\??\c:\1v14ot2.exec:\1v14ot2.exe3⤵
- Executes dropped EXE
PID:2372 -
\??\c:\2dd4r.exec:\2dd4r.exe4⤵
- Executes dropped EXE
PID:2148
-
-
-
-
\??\c:\25acab.exec:\25acab.exe1⤵
- Executes dropped EXE
PID:688 -
\??\c:\0amq1.exec:\0amq1.exe2⤵
- Executes dropped EXE
PID:756
-
-
\??\c:\eo3wf43.exec:\eo3wf43.exe2⤵PID:620
-
-
\??\c:\7t55m.exec:\7t55m.exe1⤵
- Executes dropped EXE
PID:2644 -
\??\c:\at1b21.exec:\at1b21.exe2⤵
- Executes dropped EXE
PID:2136 -
\??\c:\97ds0.exec:\97ds0.exe3⤵
- Executes dropped EXE
PID:2960 -
\??\c:\ai90733.exec:\ai90733.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780
-
-
-
\??\c:\dajsw76.exec:\dajsw76.exe3⤵PID:2724
-
\??\c:\4s1w1.exec:\4s1w1.exe4⤵PID:2776
-
\??\c:\jvk2w0.exec:\jvk2w0.exe5⤵PID:2672
-
\??\c:\225sk5.exec:\225sk5.exe6⤵PID:2832
-
\??\c:\5og5v5.exec:\5og5v5.exe7⤵PID:2732
-
-
-
-
-
-
-
\??\c:\554oi8o.exec:\554oi8o.exe1⤵
- Executes dropped EXE
PID:2216
-
\??\c:\4451o.exec:\4451o.exe1⤵
- Executes dropped EXE
PID:560
-
\??\c:\6231ib6.exec:\6231ib6.exe1⤵
- Executes dropped EXE
PID:1496
-
\??\c:\95jo6.exec:\95jo6.exe1⤵
- Executes dropped EXE
PID:1552
-
\??\c:\r62633v.exec:\r62633v.exe1⤵
- Executes dropped EXE
PID:2416
-
\??\c:\u413t93.exec:\u413t93.exe1⤵
- Executes dropped EXE
PID:2024
-
\??\c:\2f338.exec:\2f338.exe1⤵
- Executes dropped EXE
PID:2036
-
\??\c:\ei387ux.exec:\ei387ux.exe1⤵
- Executes dropped EXE
PID:1372
-
\??\c:\tk95q39.exec:\tk95q39.exe1⤵
- Executes dropped EXE
PID:380 -
\??\c:\suwc12r.exec:\suwc12r.exe2⤵
- Executes dropped EXE
PID:3028 -
\??\c:\89owqb2.exec:\89owqb2.exe3⤵
- Executes dropped EXE
PID:3004
-
-
\??\c:\p6wao0.exec:\p6wao0.exe3⤵PID:1992
-
\??\c:\5v56g5c.exec:\5v56g5c.exe4⤵PID:440
-
\??\c:\t55a35a.exec:\t55a35a.exe5⤵PID:1744
-
-
-
-
-
\??\c:\99375l.exec:\99375l.exe1⤵
- Executes dropped EXE
PID:2900 -
\??\c:\6ix8v7.exec:\6ix8v7.exe2⤵
- Executes dropped EXE
PID:1572 -
\??\c:\acip7.exec:\acip7.exe3⤵PID:3024
-
-
-
\??\c:\f5u7m1.exec:\f5u7m1.exe1⤵
- Executes dropped EXE
PID:1860 -
\??\c:\99oi21.exec:\99oi21.exe2⤵PID:1624
-
\??\c:\rhod4.exec:\rhod4.exe3⤵
- Executes dropped EXE
PID:2324 -
\??\c:\u7ur86n.exec:\u7ur86n.exe4⤵
- Executes dropped EXE
PID:2444 -
\??\c:\47956.exec:\47956.exe5⤵
- Executes dropped EXE
PID:2356
-
-
-
-
\??\c:\a4jnd.exec:\a4jnd.exe3⤵
- Executes dropped EXE
PID:1512
-
-
-
\??\c:\r614l.exec:\r614l.exe1⤵
- Executes dropped EXE
PID:2120 -
\??\c:\5859w.exec:\5859w.exe2⤵
- Executes dropped EXE
PID:1524 -
\??\c:\35gb2e.exec:\35gb2e.exe3⤵
- Executes dropped EXE
PID:752
-
-
-
\??\c:\j0192.exec:\j0192.exe1⤵
- Executes dropped EXE
PID:2412
-
\??\c:\jg655q.exec:\jg655q.exe1⤵
- Executes dropped EXE
PID:1484
-
\??\c:\we69n.exec:\we69n.exe1⤵
- Executes dropped EXE
PID:1972
-
\??\c:\83wo3i.exec:\83wo3i.exe1⤵
- Executes dropped EXE
PID:1984
-
\??\c:\u498qf8.exec:\u498qf8.exe1⤵
- Executes dropped EXE
PID:1680 -
\??\c:\qwv259a.exec:\qwv259a.exe2⤵
- Executes dropped EXE
PID:876
-
-
\??\c:\07sml46.exec:\07sml46.exe2⤵PID:1176
-
\??\c:\ha5gr.exec:\ha5gr.exe3⤵PID:840
-
-
-
\??\c:\om7w9m.exec:\om7w9m.exe1⤵
- Executes dropped EXE
PID:1336 -
\??\c:\9bm6l.exec:\9bm6l.exe2⤵
- Executes dropped EXE
PID:2060 -
\??\c:\6ecq7.exec:\6ecq7.exe3⤵
- Executes dropped EXE
PID:1792 -
\??\c:\91o3350.exec:\91o3350.exe4⤵
- Executes dropped EXE
PID:2116 -
\??\c:\lq519.exec:\lq519.exe5⤵PID:1592
-
-
-
-
-
\??\c:\035a4.exec:\035a4.exe1⤵
- Executes dropped EXE
PID:1528
-
\??\c:\7159g5.exec:\7159g5.exe1⤵
- Executes dropped EXE
PID:1324
-
\??\c:\384g38.exec:\384g38.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624
-
\??\c:\ir7j54.exec:\ir7j54.exe1⤵PID:2772
-
\??\c:\o2w4i92.exec:\o2w4i92.exe2⤵PID:2236
-
-
\??\c:\4nxngqd.exec:\4nxngqd.exe1⤵PID:2844
-
\??\c:\gawwko.exec:\gawwko.exe2⤵PID:2140
-
\??\c:\7ve5r.exec:\7ve5r.exe3⤵PID:2820
-
\??\c:\q87b610.exec:\q87b610.exe4⤵PID:1352
-
\??\c:\eqgr47b.exec:\eqgr47b.exe5⤵PID:240
-
\??\c:\1s333.exec:\1s333.exe6⤵PID:2892
-
\??\c:\66d35ks.exec:\66d35ks.exe7⤵PID:2008
-
\??\c:\6k4u4u.exec:\6k4u4u.exe8⤵PID:2864
-
\??\c:\0m4en1x.exec:\0m4en1x.exe9⤵PID:2868
-
\??\c:\q5hk72.exec:\q5hk72.exe10⤵PID:664
-
\??\c:\36j826.exec:\36j826.exe11⤵PID:1980
-
\??\c:\oq691r7.exec:\oq691r7.exe12⤵PID:2512
-
\??\c:\7q1o9.exec:\7q1o9.exe13⤵PID:2040
-
\??\c:\s21e7.exec:\s21e7.exe14⤵PID:628
-
\??\c:\r5i12.exec:\r5i12.exe15⤵PID:760
-
\??\c:\2u2sx8.exec:\2u2sx8.exe16⤵PID:1508
-
\??\c:\41r5gb.exec:\41r5gb.exe17⤵PID:2144
-
\??\c:\n2b50u.exec:\n2b50u.exe18⤵PID:1532
-
\??\c:\ect3b3.exec:\ect3b3.exe19⤵PID:3016
-
\??\c:\eq307.exec:\eq307.exe20⤵PID:1932
-
\??\c:\77kc6q1.exec:\77kc6q1.exe21⤵PID:552
-
\??\c:\c5cma6.exec:\c5cma6.exe22⤵PID:1940
-
\??\c:\429jii.exec:\429jii.exe23⤵PID:2860
-
\??\c:\j9w7o3.exec:\j9w7o3.exe24⤵PID:1420
-
\??\c:\6ml3f2.exec:\6ml3f2.exe25⤵PID:1896
-
\??\c:\1s0c76.exec:\1s0c76.exe26⤵PID:1672
-
\??\c:\9gi04ul.exec:\9gi04ul.exe27⤵PID:980
-
\??\c:\e31bc.exec:\e31bc.exe28⤵PID:576
-
\??\c:\6e2e2.exec:\6e2e2.exe29⤵PID:832
-
\??\c:\99mgs.exec:\99mgs.exe30⤵PID:2076
-
\??\c:\wu13a.exec:\wu13a.exe31⤵PID:2524
-
\??\c:\0a5i11.exec:\0a5i11.exe32⤵PID:1732
-
\??\c:\42is2.exec:\42is2.exe33⤵PID:2112
-
\??\c:\0577a5a.exec:\0577a5a.exe34⤵PID:1592
-
\??\c:\1hqkuh.exec:\1hqkuh.exe35⤵PID:3068
-
\??\c:\191ma.exec:\191ma.exe36⤵PID:2428
-
\??\c:\d851qt.exec:\d851qt.exe37⤵PID:1108
-
\??\c:\poexk.exec:\poexk.exe38⤵PID:2776
-
\??\c:\2eq8p3.exec:\2eq8p3.exe39⤵PID:2920
-
\??\c:\1o6x52.exec:\1o6x52.exe40⤵PID:2728
-
\??\c:\q1q46j7.exec:\q1q46j7.exe41⤵PID:1556
-
\??\c:\pu6c1.exec:\pu6c1.exe42⤵PID:2768
-
\??\c:\d6sgc.exec:\d6sgc.exe43⤵PID:2592
-
\??\c:\9jww3i0.exec:\9jww3i0.exe44⤵PID:2880
-
\??\c:\u8j33d.exec:\u8j33d.exe45⤵PID:812
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\uu309w.exec:\uu309w.exe35⤵PID:2656
-
-
-
-
-
-
-
\??\c:\614o50.exec:\614o50.exe30⤵PID:1892
-
-
-
\??\c:\am5ov93.exec:\am5ov93.exe29⤵PID:832
-
-
-
-
-
-
-
\??\c:\4v5aam.exec:\4v5aam.exe24⤵PID:1420
-
\??\c:\51w064.exec:\51w064.exe25⤵PID:1604
-
-
-
-
-
\??\c:\66o98ij.exec:\66o98ij.exe22⤵PID:2264
-
\??\c:\9ol6f34.exec:\9ol6f34.exe23⤵PID:2296
-
-
-
-
\??\c:\950f60.exec:\950f60.exe21⤵PID:2956
-
\??\c:\23j5l.exec:\23j5l.exe22⤵PID:1940
-
\??\c:\ih6o1mn.exec:\ih6o1mn.exe23⤵PID:2860
-
-
-
-
-
-
-
\??\c:\k302r5e.exec:\k302r5e.exe18⤵PID:2004
-
\??\c:\2h10aj.exec:\2h10aj.exe19⤵PID:2632
-
\??\c:\r52d9.exec:\r52d9.exe20⤵PID:2132
-
\??\c:\t6jl1.exec:\t6jl1.exe21⤵PID:552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\x9cx8w9.exec:\x9cx8w9.exe6⤵PID:1352
-
\??\c:\09x7mr.exec:\09x7mr.exe7⤵PID:2008
-
\??\c:\kw38r.exec:\kw38r.exe8⤵PID:1728
-
\??\c:\5396d7.exec:\5396d7.exe9⤵PID:2740
-
-
-
-
-
-
\??\c:\vwk93p.exec:\vwk93p.exe5⤵PID:2564
-
-
-
-
-
\??\c:\es5l1u.exec:\es5l1u.exe1⤵PID:1560
-
\??\c:\va5e5ac.exec:\va5e5ac.exe1⤵
- Executes dropped EXE
PID:1628 -
\??\c:\ssa7o.exec:\ssa7o.exe2⤵PID:2796
-
\??\c:\h2voutr.exec:\h2voutr.exe3⤵PID:2772
-
\??\c:\p6smj.exec:\p6smj.exe4⤵PID:2760
-
\??\c:\2305x5l.exec:\2305x5l.exe5⤵PID:2780
-
\??\c:\c48l93.exec:\c48l93.exe6⤵PID:2832
-
-
-
-
-
-
\??\c:\001hsf6.exec:\001hsf6.exe1⤵PID:2664
-
\??\c:\d3l471.exec:\d3l471.exe2⤵PID:2620
-
-
\??\c:\f21b5m.exec:\f21b5m.exe1⤵PID:3004
-
\??\c:\tntec.exec:\tntec.exe2⤵PID:1976
-
\??\c:\7dtk68.exec:\7dtk68.exe3⤵PID:1572
-
\??\c:\87shmc9.exec:\87shmc9.exe4⤵PID:1688
-
\??\c:\n45gn7w.exec:\n45gn7w.exe5⤵PID:528
-
\??\c:\tud14cn.exec:\tud14cn.exe6⤵PID:1512
-
\??\c:\5v9rst.exec:\5v9rst.exe7⤵PID:2180
-
\??\c:\12rn0u.exec:\12rn0u.exe8⤵PID:920
-
\??\c:\q0a3kc.exec:\q0a3kc.exe9⤵PID:1760
-
-
-
-
-
-
-
-
-
\??\c:\5o01u5.exec:\5o01u5.exe1⤵PID:528
-
\??\c:\mu9kv1q.exec:\mu9kv1q.exe2⤵PID:628
-
\??\c:\4ij550.exec:\4ij550.exe3⤵PID:2284
-
-
-
\??\c:\490c7.exec:\490c7.exe1⤵PID:2344
-
\??\c:\tqgj0c.exec:\tqgj0c.exe2⤵PID:1624
-
\??\c:\w8gvv.exec:\w8gvv.exe3⤵PID:3016
-
\??\c:\ucr5si7.exec:\ucr5si7.exe4⤵PID:1932
-
-
-
-
\??\c:\caio9q.exec:\caio9q.exe1⤵PID:1772
-
\??\c:\6ikj4r3.exec:\6ikj4r3.exe1⤵PID:872
-
\??\c:\c176pw.exec:\c176pw.exe2⤵PID:1208
-
\??\c:\35s9ia5.exec:\35s9ia5.exe3⤵PID:2220
-
\??\c:\m414d.exec:\m414d.exe4⤵PID:1944
-
\??\c:\uql3a97.exec:\uql3a97.exe5⤵PID:1584
-
-
-
-
-
\??\c:\c91jq8.exec:\c91jq8.exe1⤵PID:2176
-
\??\c:\8q95w.exec:\8q95w.exe2⤵PID:2628
-
\??\c:\s3mv98.exec:\s3mv98.exe3⤵PID:1352
-
-
-
\??\c:\k219o.exec:\k219o.exe1⤵PID:2740
-
\??\c:\83a1sk6.exec:\83a1sk6.exe2⤵PID:3028
-
-
\??\c:\w8590.exec:\w8590.exe2⤵PID:1576
-
\??\c:\ww3sr9.exec:\ww3sr9.exe3⤵PID:1092
-
-
-
\??\c:\xir1qn4.exec:\xir1qn4.exe1⤵PID:2872
-
\??\c:\893fwf.exec:\893fwf.exe1⤵PID:296
-
\??\c:\dgbw32.exec:\dgbw32.exe2⤵PID:1484
-
\??\c:\2127o2.exec:\2127o2.exe3⤵PID:1544
-
\??\c:\5392wj6.exec:\5392wj6.exe4⤵PID:2144
-
-
-
-
\??\c:\0g6w5a1.exec:\0g6w5a1.exe1⤵PID:1688
-
\??\c:\behi9s5.exec:\behi9s5.exe1⤵PID:1628
-
\??\c:\ow7c74.exec:\ow7c74.exe1⤵PID:1680
-
\??\c:\c939g.exec:\c939g.exe1⤵PID:1684
-
\??\c:\5xkqj23.exec:\5xkqj23.exe1⤵PID:1756
-
\??\c:\6673m59.exec:\6673m59.exe2⤵PID:2068
-
\??\c:\97l7ra1.exec:\97l7ra1.exe3⤵PID:1064
-
-
-
\??\c:\ms5ax5.exec:\ms5ax5.exe1⤵PID:1084
-
\??\c:\qi2m1h.exec:\qi2m1h.exe2⤵PID:576
-
-
\??\c:\246fgxa.exec:\246fgxa.exe1⤵PID:2060
-
\??\c:\9m5m5.exec:\9m5m5.exe2⤵PID:600
-
\??\c:\se775.exec:\se775.exe3⤵PID:1196
-
\??\c:\hbcqh7.exec:\hbcqh7.exe4⤵PID:1872
-
-
-
-
\??\c:\ec3as9a.exec:\ec3as9a.exe1⤵PID:2136
-
\??\c:\r0evei.exec:\r0evei.exe1⤵PID:240
-
\??\c:\039c3.exec:\039c3.exe1⤵PID:1984
-
\??\c:\3o09m.exec:\3o09m.exe2⤵PID:1572
-
-
\??\c:\5t5q57.exec:\5t5q57.exe1⤵PID:2116
-
\??\c:\1fa10.exec:\1fa10.exe1⤵PID:2432
-
\??\c:\qe5ij.exec:\qe5ij.exe2⤵PID:2988
-
\??\c:\se3079.exec:\se3079.exe3⤵PID:1932
-
\??\c:\09fj7.exec:\09fj7.exe4⤵PID:2100
-
\??\c:\4ls96b.exec:\4ls96b.exe5⤵PID:2268
-
-
-
-
-
\??\c:\fwc1ap.exec:\fwc1ap.exe1⤵PID:2300
-
\??\c:\84o1sx.exec:\84o1sx.exe1⤵PID:1524
-
\??\c:\lix5x.exec:\lix5x.exe2⤵PID:1812
-
\??\c:\41wt9me.exec:\41wt9me.exe3⤵PID:1656
-
\??\c:\s36k04l.exec:\s36k04l.exe4⤵PID:2440
-
\??\c:\gb89k4e.exec:\gb89k4e.exe5⤵PID:976
-
-
-
-
-
\??\c:\2wtb3u.exec:\2wtb3u.exe1⤵PID:2964
-
\??\c:\x0m98ot.exec:\x0m98ot.exe2⤵PID:1752
-
-
\??\c:\lu3d09k.exec:\lu3d09k.exe1⤵PID:1792
-
\??\c:\0g2v6k3.exec:\0g2v6k3.exe2⤵PID:1304
-
-
\??\c:\gd9ae4.exec:\gd9ae4.exe1⤵PID:2128
-
\??\c:\s2mp2q.exec:\s2mp2q.exe2⤵PID:1872
-
\??\c:\032e57w.exec:\032e57w.exe3⤵PID:2116
-
\??\c:\jsp0av.exec:\jsp0av.exe4⤵PID:2212
-
\??\c:\tg2aj9.exec:\tg2aj9.exe5⤵PID:2692
-
\??\c:\eo37gv.exec:\eo37gv.exe6⤵PID:1312
-
\??\c:\9s94d.exec:\9s94d.exe7⤵PID:2844
-
\??\c:\16w16.exec:\16w16.exe8⤵PID:2700
-
\??\c:\73a5a32.exec:\73a5a32.exe9⤵PID:992
-
\??\c:\2k4a3w.exec:\2k4a3w.exe10⤵PID:2756
-
\??\c:\49b1g3.exec:\49b1g3.exe11⤵PID:3060
-
\??\c:\81i5d.exec:\81i5d.exe12⤵PID:2548
-
\??\c:\tkgt5o.exec:\tkgt5o.exe13⤵PID:548
-
\??\c:\qv50qd8.exec:\qv50qd8.exe14⤵PID:2504
-
\??\c:\07e92u.exec:\07e92u.exe15⤵PID:2028
-
\??\c:\7sb5c3.exec:\7sb5c3.exe16⤵PID:2912
-
\??\c:\f14q7.exec:\f14q7.exe17⤵PID:1976
-
\??\c:\37rl7.exec:\37rl7.exe18⤵PID:1096
-
\??\c:\6k370f.exec:\6k370f.exe19⤵PID:1908
-
\??\c:\7h2sq.exec:\7h2sq.exe20⤵PID:2924
-
\??\c:\0g9w58n.exec:\0g9w58n.exe21⤵PID:2392
-
\??\c:\26t9ka5.exec:\26t9ka5.exe22⤵PID:3044
-
\??\c:\919k4mk.exec:\919k4mk.exe23⤵PID:2232
-
\??\c:\v5747.exec:\v5747.exe24⤵PID:1648
-
\??\c:\b5pp4s.exec:\b5pp4s.exe25⤵PID:796
-
\??\c:\s8a3tnb.exec:\s8a3tnb.exe26⤵PID:1876
-
\??\c:\87d1ux9.exec:\87d1ux9.exe27⤵PID:3008
-
\??\c:\91g3g.exec:\91g3g.exe28⤵PID:2152
-
\??\c:\5kb16g.exec:\5kb16g.exe29⤵PID:2540
-
\??\c:\n913b9c.exec:\n913b9c.exe30⤵PID:3036
-
\??\c:\195j7.exec:\195j7.exe31⤵PID:1580
-
\??\c:\21f92.exec:\21f92.exe32⤵PID:1928
-
\??\c:\p29sa.exec:\p29sa.exe33⤵PID:1552
-
\??\c:\ecqu34.exec:\ecqu34.exe34⤵PID:1696
-
\??\c:\273u7.exec:\273u7.exe35⤵PID:2984
-
\??\c:\0181l.exec:\0181l.exe36⤵PID:2080
-
\??\c:\sk1op6m.exec:\sk1op6m.exe37⤵PID:2076
-
\??\c:\6g8veu.exec:\6g8veu.exe38⤵PID:840
-
\??\c:\ba11d2.exec:\ba11d2.exe39⤵PID:108
-
\??\c:\4h95e7i.exec:\4h95e7i.exe40⤵PID:1208
-
\??\c:\eoka35.exec:\eoka35.exe41⤵PID:828
-
\??\c:\s3iuk.exec:\s3iuk.exe42⤵PID:2208
-
\??\c:\1ik3t.exec:\1ik3t.exe43⤵PID:2092
-
\??\c:\q9um2oa.exec:\q9um2oa.exe44⤵PID:1592
-
\??\c:\5a77g.exec:\5a77g.exe45⤵PID:2428
-
\??\c:\160s56w.exec:\160s56w.exe46⤵PID:2468
-
\??\c:\6sacc.exec:\6sacc.exe47⤵PID:2720
-
\??\c:\1t74j5.exec:\1t74j5.exe48⤵PID:2788
-
\??\c:\15gw13m.exec:\15gw13m.exe49⤵PID:2844
-
\??\c:\bqb37.exec:\bqb37.exe50⤵PID:2588
-
\??\c:\0557ko.exec:\0557ko.exe51⤵PID:2260
-
\??\c:\hhx97.exec:\hhx97.exe52⤵PID:2896
-
\??\c:\qc53v7q.exec:\qc53v7q.exe53⤵PID:1324
-
\??\c:\kc8c5.exec:\kc8c5.exe54⤵PID:1988
-
\??\c:\apwd8a5.exec:\apwd8a5.exe55⤵PID:2884
-
\??\c:\81uhe.exec:\81uhe.exe56⤵PID:1808
-
\??\c:\a307s.exec:\a307s.exe57⤵PID:1348
-
\??\c:\3g51uh.exec:\3g51uh.exe58⤵PID:112
-
\??\c:\53o714.exec:\53o714.exe59⤵PID:1964
-
\??\c:\iwmn1i.exec:\iwmn1i.exe60⤵PID:1664
-
\??\c:\39c18v.exec:\39c18v.exe61⤵PID:1652
-
\??\c:\4q8h7q9.exec:\4q8h7q9.exe62⤵PID:1484
-
\??\c:\f734g5.exec:\f734g5.exe63⤵PID:2476
-
\??\c:\n1k14.exec:\n1k14.exe64⤵PID:1616
-
\??\c:\594q9wu.exec:\594q9wu.exe65⤵PID:928
-
\??\c:\i77m9.exec:\i77m9.exe66⤵PID:1492
-
\??\c:\52aufu6.exec:\52aufu6.exe67⤵PID:1468
-
\??\c:\km5uw4.exec:\km5uw4.exe68⤵PID:3016
-
\??\c:\gqs5g.exec:\gqs5g.exe69⤵PID:2356
-
\??\c:\r92je7.exec:\r92je7.exe70⤵PID:2024
-
\??\c:\c2r27k.exec:\c2r27k.exe71⤵PID:2908
-
\??\c:\545r3vg.exec:\545r3vg.exe72⤵PID:320
-
\??\c:\0932j.exec:\0932j.exe73⤵PID:2860
-
\??\c:\5108j14.exec:\5108j14.exe74⤵PID:2516
-
\??\c:\9736r.exec:\9736r.exe75⤵PID:1604
-
\??\c:\j591s91.exec:\j591s91.exe76⤵PID:2372
-
\??\c:\wm14d1.exec:\wm14d1.exe77⤵PID:1680
-
\??\c:\467317.exec:\467317.exe78⤵PID:368
-
\??\c:\0sq638.exec:\0sq638.exe79⤵PID:1668
-
\??\c:\r1af4u9.exec:\r1af4u9.exe80⤵PID:2936
-
\??\c:\59n3s7.exec:\59n3s7.exe81⤵PID:844
-
\??\c:\7h9235e.exec:\7h9235e.exe82⤵PID:2072
-
\??\c:\0w5g7.exec:\0w5g7.exe83⤵PID:2128
-
\??\c:\r59e95.exec:\r59e95.exe84⤵PID:2784
-
\??\c:\p61hs.exec:\p61hs.exe85⤵PID:2216
-
\??\c:\n1g3aq.exec:\n1g3aq.exe86⤵PID:2796
-
\??\c:\3841j1.exec:\3841j1.exe87⤵PID:2212
-
\??\c:\6971r.exec:\6971r.exe88⤵PID:2572
-
\??\c:\v9mlc.exec:\v9mlc.exe89⤵PID:2676
-
\??\c:\3x24v70.exec:\3x24v70.exe90⤵PID:2612
-
\??\c:\ii0g52n.exec:\ii0g52n.exe91⤵PID:2684
-
\??\c:\b177w.exec:\b177w.exe92⤵PID:1428
-
\??\c:\we3g1.exec:\we3g1.exe93⤵PID:2580
-
\??\c:\53bm4l3.exec:\53bm4l3.exe94⤵PID:2828
-
\??\c:\vm82fl7.exec:\vm82fl7.exe95⤵PID:2872
-
\??\c:\b907m5.exec:\b907m5.exe96⤵PID:2892
-
\??\c:\2576p1g.exec:\2576p1g.exe97⤵PID:2868
-
\??\c:\f3o910.exec:\f3o910.exe98⤵PID:1388
-
\??\c:\51c96w.exec:\51c96w.exe99⤵PID:1992
-
\??\c:\9uac1.exec:\9uac1.exe100⤵PID:2472
-
\??\c:\gs9ut.exec:\gs9ut.exe101⤵PID:2228
-
\??\c:\87xou.exec:\87xou.exe102⤵PID:1972
-
\??\c:\pb9ux.exec:\pb9ux.exe103⤵PID:528
-
\??\c:\mi871wo.exec:\mi871wo.exe104⤵PID:1072
-
\??\c:\62067.exec:\62067.exe105⤵PID:2284
-
\??\c:\st2xj.exec:\st2xj.exe106⤵PID:1772
-
\??\c:\1h17f5.exec:\1h17f5.exe107⤵PID:1960
-
\??\c:\j1m70.exec:\j1m70.exe108⤵PID:1500
-
\??\c:\35c38i.exec:\35c38i.exe109⤵PID:1088
-
\??\c:\b7b54.exec:\b7b54.exe110⤵PID:1372
-
\??\c:\m118795.exec:\m118795.exe111⤵PID:488
-
\??\c:\3it5s.exec:\3it5s.exe112⤵PID:1068
-
\??\c:\57mi17.exec:\57mi17.exe113⤵PID:1212
-
\??\c:\4wwak.exec:\4wwak.exe114⤵PID:2456
-
\??\c:\337517.exec:\337517.exe115⤵PID:1896
-
\??\c:\9758g.exec:\9758g.exe116⤵PID:692
-
\??\c:\33avau.exec:\33avau.exe117⤵PID:2224
-
\??\c:\5p9vcea.exec:\5p9vcea.exe118⤵PID:888
-
\??\c:\kud2c.exec:\kud2c.exe119⤵PID:2964
-
\??\c:\us56v7.exec:\us56v7.exe120⤵PID:1052
-
\??\c:\m88o7.exec:\m88o7.exe121⤵PID:688
-
\??\c:\cq0q9.exec:\cq0q9.exe122⤵PID:108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-