Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
1cdcb2aa7ed94048ce05a71cbf911b33.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cdcb2aa7ed94048ce05a71cbf911b33.exe
Resource
win10v2004-20231222-en
General
-
Target
1cdcb2aa7ed94048ce05a71cbf911b33.exe
-
Size
471KB
-
MD5
1cdcb2aa7ed94048ce05a71cbf911b33
-
SHA1
2f5d084011b7a7942bd0c90a6557397ce87f730b
-
SHA256
1fdb72c9f14350081f3717e6a70df391fa1aa5ca938c8bd82769bc0c254c17dd
-
SHA512
5f55cb852349f775cb7dcdcf5de4294c549e7b4a0d44e37f03580b91c5b4175f21c005446c16fc48fab718ac6baf46ee7b4b20236d92ef5ad772561ea91b1263
-
SSDEEP
6144:/1XacXavNFEoNkqPg5I0KVTHyPWOYMI6dn0z76fcCEmi/id6mmtCv1HC:/1Xa02H2KV+WKI6V0ZCEmi/i8m4Cg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 1cdcb2aa7ed94048ce05a71cbf911b33.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Csrtss.exe -
Executes dropped EXE 17 IoCs
pid Process 2080 Csrtss.exe 3716 Csrtss.exe 2512 Csrtss.exe 4020 Csrtss.exe 1808 Csrtss.exe 4028 Csrtss.exe 4364 Csrtss.exe 3468 Csrtss.exe 4264 Csrtss.exe 2824 Csrtss.exe 2848 Csrtss.exe 3812 Csrtss.exe 768 Csrtss.exe 2704 Csrtss.exe 2528 Csrtss.exe 4992 Csrtss.exe 4356 Csrtss.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" 1cdcb2aa7ed94048ce05a71cbf911b33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System132 = "C:\\Windows\\system32\\Csrtss.exe" Csrtss.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe 1cdcb2aa7ed94048ce05a71cbf911b33.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe 1cdcb2aa7ed94048ce05a71cbf911b33.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File opened for modification C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe File created C:\Windows\SysWOW64\Csrtss.exe Csrtss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe Token: SeDebugPrivilege 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe Token: SeDebugPrivilege 2080 Csrtss.exe Token: SeDebugPrivilege 2080 Csrtss.exe Token: SeDebugPrivilege 3716 Csrtss.exe Token: SeDebugPrivilege 3716 Csrtss.exe Token: SeDebugPrivilege 2512 Csrtss.exe Token: SeDebugPrivilege 2512 Csrtss.exe Token: SeDebugPrivilege 4020 Csrtss.exe Token: SeDebugPrivilege 4020 Csrtss.exe Token: SeDebugPrivilege 1808 Csrtss.exe Token: SeDebugPrivilege 1808 Csrtss.exe Token: SeDebugPrivilege 4028 Csrtss.exe Token: SeDebugPrivilege 4028 Csrtss.exe Token: SeDebugPrivilege 4364 Csrtss.exe Token: SeDebugPrivilege 4364 Csrtss.exe Token: SeDebugPrivilege 3468 Csrtss.exe Token: SeDebugPrivilege 3468 Csrtss.exe Token: SeDebugPrivilege 4264 Csrtss.exe Token: SeDebugPrivilege 4264 Csrtss.exe Token: SeDebugPrivilege 2824 Csrtss.exe Token: SeDebugPrivilege 2824 Csrtss.exe Token: SeDebugPrivilege 2848 Csrtss.exe Token: SeDebugPrivilege 2848 Csrtss.exe Token: SeDebugPrivilege 3812 Csrtss.exe Token: SeDebugPrivilege 3812 Csrtss.exe Token: SeDebugPrivilege 768 Csrtss.exe Token: SeDebugPrivilege 768 Csrtss.exe Token: SeDebugPrivilege 2704 Csrtss.exe Token: SeDebugPrivilege 2704 Csrtss.exe Token: SeDebugPrivilege 2528 Csrtss.exe Token: SeDebugPrivilege 2528 Csrtss.exe Token: SeDebugPrivilege 4992 Csrtss.exe Token: SeDebugPrivilege 4992 Csrtss.exe Token: SeDebugPrivilege 4356 Csrtss.exe Token: SeDebugPrivilege 4356 Csrtss.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2080 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 273 PID 1752 wrote to memory of 2080 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 273 PID 1752 wrote to memory of 2080 1752 1cdcb2aa7ed94048ce05a71cbf911b33.exe 273 PID 2080 wrote to memory of 3716 2080 Csrtss.exe 160 PID 2080 wrote to memory of 3716 2080 Csrtss.exe 160 PID 2080 wrote to memory of 3716 2080 Csrtss.exe 160 PID 3716 wrote to memory of 2512 3716 Csrtss.exe 236 PID 3716 wrote to memory of 2512 3716 Csrtss.exe 236 PID 3716 wrote to memory of 2512 3716 Csrtss.exe 236 PID 2512 wrote to memory of 4020 2512 Csrtss.exe 95 PID 2512 wrote to memory of 4020 2512 Csrtss.exe 95 PID 2512 wrote to memory of 4020 2512 Csrtss.exe 95 PID 4020 wrote to memory of 1808 4020 Csrtss.exe 135 PID 4020 wrote to memory of 1808 4020 Csrtss.exe 135 PID 4020 wrote to memory of 1808 4020 Csrtss.exe 135 PID 1808 wrote to memory of 4028 1808 Csrtss.exe 97 PID 1808 wrote to memory of 4028 1808 Csrtss.exe 97 PID 1808 wrote to memory of 4028 1808 Csrtss.exe 97 PID 4028 wrote to memory of 4364 4028 Csrtss.exe 261 PID 4028 wrote to memory of 4364 4028 Csrtss.exe 261 PID 4028 wrote to memory of 4364 4028 Csrtss.exe 261 PID 4364 wrote to memory of 3468 4364 Csrtss.exe 99 PID 4364 wrote to memory of 3468 4364 Csrtss.exe 99 PID 4364 wrote to memory of 3468 4364 Csrtss.exe 99 PID 3468 wrote to memory of 4264 3468 Csrtss.exe 100 PID 3468 wrote to memory of 4264 3468 Csrtss.exe 100 PID 3468 wrote to memory of 4264 3468 Csrtss.exe 100 PID 4264 wrote to memory of 2824 4264 Csrtss.exe 101 PID 4264 wrote to memory of 2824 4264 Csrtss.exe 101 PID 4264 wrote to memory of 2824 4264 Csrtss.exe 101 PID 2824 wrote to memory of 2848 2824 Csrtss.exe 104 PID 2824 wrote to memory of 2848 2824 Csrtss.exe 104 PID 2824 wrote to memory of 2848 2824 Csrtss.exe 104 PID 2848 wrote to memory of 3812 2848 Csrtss.exe 105 PID 2848 wrote to memory of 3812 2848 Csrtss.exe 105 PID 2848 wrote to memory of 3812 2848 Csrtss.exe 105 PID 3812 wrote to memory of 768 3812 Csrtss.exe 108 PID 3812 wrote to memory of 768 3812 Csrtss.exe 108 PID 3812 wrote to memory of 768 3812 Csrtss.exe 108 PID 768 wrote to memory of 2704 768 Csrtss.exe 109 PID 768 wrote to memory of 2704 768 Csrtss.exe 109 PID 768 wrote to memory of 2704 768 Csrtss.exe 109 PID 2704 wrote to memory of 2528 2704 Csrtss.exe 110 PID 2704 wrote to memory of 2528 2704 Csrtss.exe 110 PID 2704 wrote to memory of 2528 2704 Csrtss.exe 110 PID 2528 wrote to memory of 4992 2528 Csrtss.exe 111 PID 2528 wrote to memory of 4992 2528 Csrtss.exe 111 PID 2528 wrote to memory of 4992 2528 Csrtss.exe 111 PID 4992 wrote to memory of 4356 4992 Csrtss.exe 303 PID 4992 wrote to memory of 4356 4992 Csrtss.exe 303 PID 4992 wrote to memory of 4356 4992 Csrtss.exe 303
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cdcb2aa7ed94048ce05a71cbf911b33.exe"C:\Users\Admin\AppData\Local\Temp\1cdcb2aa7ed94048ce05a71cbf911b33.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Users\Admin\AppData\Local\Temp\1cdcb2aa7ed94048ce05a71cbf911b33.exe"2⤵PID:2080
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"3⤵PID:3716
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"4⤵PID:2512
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"6⤵PID:1808
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"8⤵PID:4364
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"18⤵PID:4356
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"19⤵PID:1728
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"20⤵PID:2552
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"21⤵PID:220
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"22⤵PID:1180
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"23⤵PID:2920
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"24⤵PID:1052
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"25⤵PID:4972
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"26⤵PID:556
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"27⤵PID:4040
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"28⤵PID:3700
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"29⤵PID:5104
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"30⤵PID:4800
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"31⤵PID:1252
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"32⤵PID:2956
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"33⤵PID:1176
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"34⤵PID:2884
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"35⤵PID:3716
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"36⤵PID:3708
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"37⤵PID:3244
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"39⤵PID:3668
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"40⤵PID:2476
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"41⤵PID:2472
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"42⤵PID:4808
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"43⤵PID:3000
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"44⤵PID:4980
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"45⤵PID:3392
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"46⤵PID:3996
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"47⤵PID:808
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"48⤵PID:3868
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"49⤵PID:1020
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"50⤵PID:352
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"51⤵PID:1048
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"52⤵PID:3220
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"53⤵PID:2344
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"54⤵PID:1552
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"55⤵PID:640
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"56⤵PID:3268
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"57⤵PID:932
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"58⤵PID:1456
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"59⤵PID:3296
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"60⤵PID:808
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"62⤵PID:3880
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"63⤵PID:4120
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"64⤵PID:536
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"65⤵PID:3004
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"66⤵PID:2316
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"67⤵PID:3888
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"68⤵PID:1332
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"69⤵PID:4044
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"70⤵PID:2340
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"71⤵PID:1068
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"72⤵PID:1252
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"73⤵PID:3200
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"74⤵PID:3868
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"75⤵PID:1296
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"76⤵PID:2700
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"77⤵PID:1092
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"78⤵PID:1280
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"79⤵PID:4368
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"80⤵PID:3292
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"81⤵PID:3004
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"82⤵PID:4712
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"83⤵PID:1392
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"84⤵PID:1276
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"85⤵PID:4448
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"86⤵PID:1052
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"87⤵PID:1064
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"88⤵PID:4216
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"89⤵PID:4404
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"90⤵PID:4196
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"91⤵PID:1132
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"92⤵PID:4328
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"93⤵PID:4840
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"94⤵PID:4364
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"95⤵PID:2964
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"96⤵PID:2976
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"97⤵PID:3388
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"98⤵PID:4712
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"99⤵PID:4808
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"100⤵PID:1492
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"101⤵PID:4844
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"102⤵PID:2920
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"103⤵PID:1472
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"104⤵PID:696
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"105⤵PID:208
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"106⤵PID:3196
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"107⤵PID:5096
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"108⤵PID:3444
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"109⤵PID:3356
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"110⤵PID:4960
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"111⤵PID:4388
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"112⤵PID:2476
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"113⤵PID:3588
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"114⤵PID:2316
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"115⤵PID:4712
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"116⤵PID:1204
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"117⤵PID:2152
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"118⤵PID:2204
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"119⤵PID:560
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"120⤵PID:3008
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"121⤵PID:1176
-
C:\Windows\SysWOW64\Csrtss.exe"C:\Windows\system32\Csrtss.exe" "C:\Windows\SysWOW64\Csrtss.exe"122⤵PID:2284
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-