Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
58s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
4507297f46b12e3dbfe13893ed8e1d3b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4507297f46b12e3dbfe13893ed8e1d3b.exe
Resource
win10v2004-20231222-en
General
-
Target
4507297f46b12e3dbfe13893ed8e1d3b.exe
-
Size
649KB
-
MD5
4507297f46b12e3dbfe13893ed8e1d3b
-
SHA1
6b8c92904b69cf4dc43142eac4d1246999950757
-
SHA256
66d104ec5651e4807a32ec8ed2a83ccb2d39538123a2d72720730ed2211b1e8b
-
SHA512
eea98c5afa9202bddc2155bd06377a5f9dc534f2683b1112a80508a1cec4a6d8a7e367773416a4af3c7a153a0d623d05d270a3ff5ebd930153fe97b8f74ea75c
-
SSDEEP
12288:oxSPMVrbN+j+toNoZ893W0NNO0nb8mjEJW++GS4//v5DTB4sOR8H9:Q8wN+jDoZ63w0nb8HW++p4/31B49R8H
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 64 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ulat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate dnkj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kizm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wjya.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate pdza.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate jakj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate yasr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ezyk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate qxuj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate yrnz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bdnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jbvx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate zfic.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gpgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xxtb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion symk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4507297f46b12e3dbfe13893ed8e1d3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vfxi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate guxg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion czwk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate kqia.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate onan.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mapq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dnkj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion acrr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate apky.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate xxtb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tkmr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate nwkh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ospf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate besd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hfji.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion zfmg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ezyk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate nsvg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fmsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate qtna.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate dkeg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lcpg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate fmsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion flms.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion besd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate deqe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion town.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate lxtn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lify.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate zplv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pfhb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ulat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jxgy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate vfxi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion zvox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate svor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate cyle.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wjya.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion zplv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion deqe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dkeg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mrhl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate jbvx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ihzd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mpon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mpon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate lcpg.exe -
Executes dropped EXE 64 IoCs
pid Process 2756 gkyj.exe 1632 jxnj.exe 780 klpu.exe 2944 mpon.exe 1972 ospf.exe 1756 besd.exe 1492 kkuy.exe 1000 vfxi.exe 1992 zdbt.exe 2216 deqe.exe 2864 kizm.exe 2560 vkek.exe 1752 xirp.exe 2600 town.exe 2500 kqia.exe 2268 mizx.exe 932 zvox.exe 1644 lxtn.exe 1700 xkan.exe 2132 nsvg.exe 2196 guxg.exe 2624 dkeg.exe 608 xjvt.exe 2808 mrhl.exe 872 bdnr.exe 2888 lcpg.exe 440 svor.exe 2016 fmsm.exe 1892 rkkz.exe 1712 jbvx.exe 2924 pnvm.exe 2188 zfic.exe 644 mkak.exe 2376 twgp.exe 1156 czwk.exe 540 wjya.exe 1240 obbx.exe 1816 wflc.exe 1516 flms.exe 2208 pdza.exe 2312 wwht.exe 2620 lify.exe 2904 hfji.exe 1932 zfmg.exe 1908 jakj.exe 468 apky.exe 2968 kgpo.exe 2052 xxtb.exe 2024 gpgr.exe 1012 tkmr.exe 2728 yasr.exe 2844 cyle.exe 2832 mmmp.exe 856 vplk.exe 1072 nwkh.exe 776 ezyk.exe 2248 onan.exe 1116 alsa.exe 2044 qtna.exe 1804 zplv.exe 2704 oaja.exe 1676 ihzd.exe 1952 symk.exe 1660 xauf.exe -
Loads dropped DLL 64 IoCs
pid Process 2520 4507297f46b12e3dbfe13893ed8e1d3b.exe 2520 4507297f46b12e3dbfe13893ed8e1d3b.exe 2756 gkyj.exe 2756 gkyj.exe 1632 jxnj.exe 1632 jxnj.exe 780 klpu.exe 780 klpu.exe 2944 mpon.exe 2944 mpon.exe 1972 ospf.exe 1972 ospf.exe 1756 besd.exe 1756 besd.exe 1492 kkuy.exe 1492 kkuy.exe 1000 vfxi.exe 1000 vfxi.exe 1992 zdbt.exe 1992 zdbt.exe 2216 deqe.exe 2216 deqe.exe 2864 kizm.exe 2864 kizm.exe 2560 vkek.exe 2560 vkek.exe 1752 xirp.exe 1752 xirp.exe 2600 town.exe 2600 town.exe 2500 kqia.exe 2500 kqia.exe 2268 mizx.exe 2268 mizx.exe 932 zvox.exe 932 zvox.exe 1644 lxtn.exe 1644 lxtn.exe 1700 xkan.exe 1700 xkan.exe 2132 nsvg.exe 2132 nsvg.exe 2196 guxg.exe 2196 guxg.exe 2624 dkeg.exe 2624 dkeg.exe 608 xjvt.exe 608 xjvt.exe 2808 mrhl.exe 2808 mrhl.exe 872 bdnr.exe 872 bdnr.exe 2888 lcpg.exe 2888 lcpg.exe 440 svor.exe 440 svor.exe 2016 fmsm.exe 2016 fmsm.exe 1892 rkkz.exe 1892 rkkz.exe 1712 jbvx.exe 1712 jbvx.exe 2924 pnvm.exe 2924 pnvm.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\nsvg.exe xkan.exe File created C:\Windows\SysWOW64\dkeg.exe guxg.exe File created C:\Windows\SysWOW64\fmsm.exe svor.exe File created C:\Windows\SysWOW64\cyle.exe yasr.exe File created C:\Windows\SysWOW64\qtna.exe alsa.exe File created C:\Windows\SysWOW64\pfhb.exe dtsb.exe File created C:\Windows\SysWOW64\besd.exe ospf.exe File created C:\Windows\SysWOW64\mpon.exe klpu.exe File opened for modification C:\Windows\SysWOW64\kkuy.exe besd.exe File opened for modification C:\Windows\SysWOW64\zdbt.exe vfxi.exe File opened for modification C:\Windows\SysWOW64\lcpg.exe bdnr.exe File opened for modification C:\Windows\SysWOW64\lify.exe wwht.exe File opened for modification C:\Windows\SysWOW64\zplv.exe qtna.exe File opened for modification C:\Windows\SysWOW64\pfhb.exe dtsb.exe File created C:\Windows\SysWOW64\jxnj.exe gkyj.exe File opened for modification C:\Windows\SysWOW64\jbvx.exe rkkz.exe File created C:\Windows\SysWOW64\pnvm.exe jbvx.exe File created C:\Windows\SysWOW64\obbx.exe wjya.exe File opened for modification C:\Windows\SysWOW64\yasr.exe tkmr.exe File opened for modification C:\Windows\SysWOW64\cyle.exe yasr.exe File opened for modification C:\Windows\SysWOW64\mmmp.exe cyle.exe File created C:\Windows\SysWOW64\mapq.exe xauf.exe File opened for modification C:\Windows\SysWOW64\jxnj.exe gkyj.exe File created C:\Windows\SysWOW64\twgp.exe mkak.exe File opened for modification C:\Windows\SysWOW64\pdza.exe flms.exe File opened for modification C:\Windows\SysWOW64\wwht.exe pdza.exe File opened for modification C:\Windows\SysWOW64\jakj.exe zfmg.exe File opened for modification C:\Windows\SysWOW64\apky.exe jakj.exe File created C:\Windows\SysWOW64\vplk.exe mmmp.exe File created C:\Windows\SysWOW64\qxuj.exe jxgy.exe File opened for modification C:\Windows\SysWOW64\nsvg.exe xkan.exe File opened for modification C:\Windows\SysWOW64\wjya.exe czwk.exe File created C:\Windows\SysWOW64\ezyk.exe nwkh.exe File opened for modification C:\Windows\SysWOW64\alsa.exe onan.exe File created C:\Windows\SysWOW64\oaja.exe zplv.exe File opened for modification C:\Windows\SysWOW64\svor.exe lcpg.exe File created C:\Windows\SysWOW64\wwht.exe pdza.exe File opened for modification C:\Windows\SysWOW64\lxtn.exe zvox.exe File opened for modification C:\Windows\SysWOW64\xkan.exe lxtn.exe File opened for modification C:\Windows\SysWOW64\pnvm.exe jbvx.exe File opened for modification C:\Windows\SysWOW64\symk.exe ihzd.exe File created C:\Windows\SysWOW64\pyit.exe pfhb.exe File opened for modification C:\Windows\SysWOW64\vkek.exe kizm.exe File opened for modification C:\Windows\SysWOW64\czwk.exe twgp.exe File created C:\Windows\SysWOW64\onan.exe ezyk.exe File created C:\Windows\SysWOW64\jxgy.exe ulat.exe File opened for modification C:\Windows\SysWOW64\bdnr.exe mrhl.exe File created C:\Windows\SysWOW64\zvox.exe mizx.exe File opened for modification C:\Windows\SysWOW64\xjvt.exe dkeg.exe File created C:\Windows\SysWOW64\svor.exe lcpg.exe File opened for modification C:\Windows\SysWOW64\onan.exe ezyk.exe File opened for modification C:\Windows\SysWOW64\ulat.exe pyit.exe File opened for modification C:\Windows\SysWOW64\acrr.exe flxx.exe File created C:\Windows\SysWOW64\yrnz.exe laje.exe File opened for modification C:\Windows\SysWOW64\zvox.exe mizx.exe File created C:\Windows\SysWOW64\pdza.exe flms.exe File created C:\Windows\SysWOW64\xauf.exe symk.exe File opened for modification C:\Windows\SysWOW64\tnfk.exe dnkj.exe File opened for modification C:\Windows\SysWOW64\dkeg.exe guxg.exe File created C:\Windows\SysWOW64\bdnr.exe mrhl.exe File opened for modification C:\Windows\SysWOW64\flms.exe wflc.exe File created C:\Windows\SysWOW64\xxtb.exe kgpo.exe File opened for modification C:\Windows\SysWOW64\ihzd.exe oaja.exe File opened for modification C:\Windows\SysWOW64\flxx.exe tnfk.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn\ = "IhiISxe[xDVF`}NB~UiXkn|}ACLE]AFp" dkeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk fmsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk\ = "_wIqY\x7fTw^Ap}RFzdw_z`Y]dcrIH" pdza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxOREm{`|u_i{o" jxgy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk zdbt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn zdbt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44} mrhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\dLjcQsguf\ = "OTZxCZLURFXsqdITNrIPAqSpi^Z_zhnj" kgpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn\ = "IhiISxe[xDVF`}NB~UiXkn|}ACLE]AFp" tnfk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn xirp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj mrhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn\ = "IhiISxe[xDVF`}NB~UiXkn|}ACLE]AFp" mkak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn zfmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\dLjcQsguf\ = "OTZxCZLURFXsqdITNrIPAqSpi^Z_zhnj" dnkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "kn@SJQE{W|uxyA|@x@JBCXFSf`ZF" hfji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn pfhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxKrEm{`|cMjBn" pfhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxJBEm{`~@`}Y|" pfhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxXrAm{`|ekfr[" lxtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\dLjcQsguf\ = "OTZxCZLURFXsqdITNrIPAqSpi^Z_zhnj" pnvm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "klPSJQE{W~exyA|@x@JBCXFSf`ZF" wjya.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk tkmr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn\ = "IhiISxe[xDVF`}NB~UiXkn|}ACLE]AFp" mmmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji dtsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44} tnfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxEbEm{`~rOswB" tnfk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn klpu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj klpu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "k`PSJQE{WrexyA|@x@JBCXFSf`ZF" nsvg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "kb`SJQE{WpUxyA|@x@JBCXFSf`ZF" rkkz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk\ = "_wIqY\x7fTw^Ap}RFzdw_z`Y]dcrIH" xauf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxJrEm{`}P~WX{" pyit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk\ = "_wIqY\x7fTw^Ap}RFzdw_z`Y]dcrIH" lxtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "kapSJQE{WsExyA|@x@JBCXFSf`ZF" lxtn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "kbpSJQE{WpExyA|@x@JBCXFSf`ZF" jbvx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemx`bAm{`}P@Xdz" pdza.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "kopSJQE{W}ExyA|@x@JBCXFSf`ZF" lify.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxwrAm{`}rDM`@" symk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\dLjcQsguf\ = "OTZxCZLURFXsqdITNrIPAqSpi^Z_zhnj" mapq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk ospf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk\ = "_wIqY\x7fTw^Ap}RFzdw_z`Y]dcrIH" zdbt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk\ = "_wIqY\x7fTw^Ap}RFzdw_z`Y]dcrIH" xjvt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "kc`SJQE{WqUxyA|@x@JBCXFSf`ZF" lcpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "knpSJQE{W|ExyA|@x@JBCXFSf`ZF" jakj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji zplv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn\ = "IhiISxe[xDVF`}NB~UiXkn|}ACLE]AFp" mpon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn\ = "IhiISxe[xDVF`}NB~UiXkn|}ACLE]AFp" xirp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\dLjcQsguf\ = "OTZxCZLURFXsqdITNrIPAqSpi^Z_zhnj" lify.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\dLjcQsguf\ = "OTZxCZLURFXsqdITNrIPAqSpi^Z_zhnj" gpgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "kt@SJQE{WfuxyA|@x@JBCXFSf`ZF" pyit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk\ = "_wIqY\x7fTw^Ap}RFzdw_z`Y]dcrIH" mmmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk uvxt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\dLjcQsguf\ = "OTZxCZLURFXsqdITNrIPAqSpi^Z_zhnj" ospf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxWbAm{`|syCdy" rkkz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj guxg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "km`SJQE{W\x7fUxyA|@x@JBCXFSf`ZF" twgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn wwht.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj qtna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji oaja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\mfibAqmadfbkj\ = "kjpSJQE{WxExyA|@x@JBCXFSf`ZF" zplv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ddMUvpMlswTnk xirp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\ecarghji\ = "P[JsaZemxYrAm{`~b{ZQU" zvox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44}\qtkn\ = "IhiISxe[xDVF`}NB~UiXkn|}ACLE]AFp" hfji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1C417B47-72BF-3E64-C9F4-DA1C49645C44} yasr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2520 4507297f46b12e3dbfe13893ed8e1d3b.exe Token: SeIncBasePriorityPrivilege 2520 4507297f46b12e3dbfe13893ed8e1d3b.exe Token: 33 2756 gkyj.exe Token: SeIncBasePriorityPrivilege 2756 gkyj.exe Token: 33 1632 jxnj.exe Token: SeIncBasePriorityPrivilege 1632 jxnj.exe Token: 33 780 klpu.exe Token: SeIncBasePriorityPrivilege 780 klpu.exe Token: 33 2944 mpon.exe Token: SeIncBasePriorityPrivilege 2944 mpon.exe Token: 33 1972 ospf.exe Token: SeIncBasePriorityPrivilege 1972 ospf.exe Token: 33 1756 besd.exe Token: SeIncBasePriorityPrivilege 1756 besd.exe Token: 33 1492 kkuy.exe Token: SeIncBasePriorityPrivilege 1492 kkuy.exe Token: 33 1000 vfxi.exe Token: SeIncBasePriorityPrivilege 1000 vfxi.exe Token: 33 1992 zdbt.exe Token: SeIncBasePriorityPrivilege 1992 zdbt.exe Token: 33 2216 deqe.exe Token: SeIncBasePriorityPrivilege 2216 deqe.exe Token: 33 2864 kizm.exe Token: SeIncBasePriorityPrivilege 2864 kizm.exe Token: 33 2560 vkek.exe Token: SeIncBasePriorityPrivilege 2560 vkek.exe Token: 33 1752 xirp.exe Token: SeIncBasePriorityPrivilege 1752 xirp.exe Token: 33 2600 town.exe Token: SeIncBasePriorityPrivilege 2600 town.exe Token: 33 2500 kqia.exe Token: SeIncBasePriorityPrivilege 2500 kqia.exe Token: 33 2268 mizx.exe Token: SeIncBasePriorityPrivilege 2268 mizx.exe Token: 33 932 zvox.exe Token: SeIncBasePriorityPrivilege 932 zvox.exe Token: 33 1644 lxtn.exe Token: SeIncBasePriorityPrivilege 1644 lxtn.exe Token: 33 1700 xkan.exe Token: SeIncBasePriorityPrivilege 1700 xkan.exe Token: 33 2132 nsvg.exe Token: SeIncBasePriorityPrivilege 2132 nsvg.exe Token: 33 2196 guxg.exe Token: SeIncBasePriorityPrivilege 2196 guxg.exe Token: 33 2624 dkeg.exe Token: SeIncBasePriorityPrivilege 2624 dkeg.exe Token: 33 608 xjvt.exe Token: SeIncBasePriorityPrivilege 608 xjvt.exe Token: 33 2808 mrhl.exe Token: SeIncBasePriorityPrivilege 2808 mrhl.exe Token: 33 872 bdnr.exe Token: SeIncBasePriorityPrivilege 872 bdnr.exe Token: 33 2888 lcpg.exe Token: SeIncBasePriorityPrivilege 2888 lcpg.exe Token: 33 440 svor.exe Token: SeIncBasePriorityPrivilege 440 svor.exe Token: 33 2016 fmsm.exe Token: SeIncBasePriorityPrivilege 2016 fmsm.exe Token: 33 1892 rkkz.exe Token: SeIncBasePriorityPrivilege 1892 rkkz.exe Token: 33 1712 jbvx.exe Token: SeIncBasePriorityPrivilege 1712 jbvx.exe Token: 33 2924 pnvm.exe Token: SeIncBasePriorityPrivilege 2924 pnvm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2756 2520 4507297f46b12e3dbfe13893ed8e1d3b.exe 28 PID 2520 wrote to memory of 2756 2520 4507297f46b12e3dbfe13893ed8e1d3b.exe 28 PID 2520 wrote to memory of 2756 2520 4507297f46b12e3dbfe13893ed8e1d3b.exe 28 PID 2520 wrote to memory of 2756 2520 4507297f46b12e3dbfe13893ed8e1d3b.exe 28 PID 2756 wrote to memory of 1632 2756 gkyj.exe 29 PID 2756 wrote to memory of 1632 2756 gkyj.exe 29 PID 2756 wrote to memory of 1632 2756 gkyj.exe 29 PID 2756 wrote to memory of 1632 2756 gkyj.exe 29 PID 1632 wrote to memory of 780 1632 jxnj.exe 30 PID 1632 wrote to memory of 780 1632 jxnj.exe 30 PID 1632 wrote to memory of 780 1632 jxnj.exe 30 PID 1632 wrote to memory of 780 1632 jxnj.exe 30 PID 780 wrote to memory of 2944 780 klpu.exe 31 PID 780 wrote to memory of 2944 780 klpu.exe 31 PID 780 wrote to memory of 2944 780 klpu.exe 31 PID 780 wrote to memory of 2944 780 klpu.exe 31 PID 2944 wrote to memory of 1972 2944 mpon.exe 32 PID 2944 wrote to memory of 1972 2944 mpon.exe 32 PID 2944 wrote to memory of 1972 2944 mpon.exe 32 PID 2944 wrote to memory of 1972 2944 mpon.exe 32 PID 1972 wrote to memory of 1756 1972 ospf.exe 33 PID 1972 wrote to memory of 1756 1972 ospf.exe 33 PID 1972 wrote to memory of 1756 1972 ospf.exe 33 PID 1972 wrote to memory of 1756 1972 ospf.exe 33 PID 1756 wrote to memory of 1492 1756 besd.exe 34 PID 1756 wrote to memory of 1492 1756 besd.exe 34 PID 1756 wrote to memory of 1492 1756 besd.exe 34 PID 1756 wrote to memory of 1492 1756 besd.exe 34 PID 1492 wrote to memory of 1000 1492 kkuy.exe 35 PID 1492 wrote to memory of 1000 1492 kkuy.exe 35 PID 1492 wrote to memory of 1000 1492 kkuy.exe 35 PID 1492 wrote to memory of 1000 1492 kkuy.exe 35 PID 1000 wrote to memory of 1992 1000 vfxi.exe 36 PID 1000 wrote to memory of 1992 1000 vfxi.exe 36 PID 1000 wrote to memory of 1992 1000 vfxi.exe 36 PID 1000 wrote to memory of 1992 1000 vfxi.exe 36 PID 1992 wrote to memory of 2216 1992 zdbt.exe 37 PID 1992 wrote to memory of 2216 1992 zdbt.exe 37 PID 1992 wrote to memory of 2216 1992 zdbt.exe 37 PID 1992 wrote to memory of 2216 1992 zdbt.exe 37 PID 2216 wrote to memory of 2864 2216 deqe.exe 38 PID 2216 wrote to memory of 2864 2216 deqe.exe 38 PID 2216 wrote to memory of 2864 2216 deqe.exe 38 PID 2216 wrote to memory of 2864 2216 deqe.exe 38 PID 2864 wrote to memory of 2560 2864 kizm.exe 39 PID 2864 wrote to memory of 2560 2864 kizm.exe 39 PID 2864 wrote to memory of 2560 2864 kizm.exe 39 PID 2864 wrote to memory of 2560 2864 kizm.exe 39 PID 2560 wrote to memory of 1752 2560 vkek.exe 40 PID 2560 wrote to memory of 1752 2560 vkek.exe 40 PID 2560 wrote to memory of 1752 2560 vkek.exe 40 PID 2560 wrote to memory of 1752 2560 vkek.exe 40 PID 1752 wrote to memory of 2600 1752 xirp.exe 41 PID 1752 wrote to memory of 2600 1752 xirp.exe 41 PID 1752 wrote to memory of 2600 1752 xirp.exe 41 PID 1752 wrote to memory of 2600 1752 xirp.exe 41 PID 2600 wrote to memory of 2500 2600 town.exe 42 PID 2600 wrote to memory of 2500 2600 town.exe 42 PID 2600 wrote to memory of 2500 2600 town.exe 42 PID 2600 wrote to memory of 2500 2600 town.exe 42 PID 2500 wrote to memory of 2268 2500 kqia.exe 43 PID 2500 wrote to memory of 2268 2500 kqia.exe 43 PID 2500 wrote to memory of 2268 2500 kqia.exe 43 PID 2500 wrote to memory of 2268 2500 kqia.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4507297f46b12e3dbfe13893ed8e1d3b.exe"C:\Users\Admin\AppData\Local\Temp\4507297f46b12e3dbfe13893ed8e1d3b.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\gkyj.exeC:\Windows\system32\gkyj.exe 708 "C:\Users\Admin\AppData\Local\Temp\4507297f46b12e3dbfe13893ed8e1d3b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\jxnj.exeC:\Windows\system32\jxnj.exe 664 "C:\Windows\SysWOW64\gkyj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\klpu.exeC:\Windows\system32\klpu.exe 656 "C:\Windows\SysWOW64\jxnj.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\mpon.exeC:\Windows\system32\mpon.exe 668 "C:\Windows\SysWOW64\klpu.exe"5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\ospf.exeC:\Windows\system32\ospf.exe 672 "C:\Windows\SysWOW64\mpon.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\besd.exeC:\Windows\system32\besd.exe 680 "C:\Windows\SysWOW64\ospf.exe"7⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\kkuy.exeC:\Windows\system32\kkuy.exe 676 "C:\Windows\SysWOW64\besd.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\vfxi.exeC:\Windows\system32\vfxi.exe 688 "C:\Windows\SysWOW64\kkuy.exe"9⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\zdbt.exeC:\Windows\system32\zdbt.exe 744 "C:\Windows\SysWOW64\vfxi.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\deqe.exeC:\Windows\system32\deqe.exe 772 "C:\Windows\SysWOW64\zdbt.exe"11⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\kizm.exeC:\Windows\system32\kizm.exe 736 "C:\Windows\SysWOW64\deqe.exe"12⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\vkek.exeC:\Windows\system32\vkek.exe 732 "C:\Windows\SysWOW64\kizm.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\xirp.exeC:\Windows\system32\xirp.exe 728 "C:\Windows\SysWOW64\vkek.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\town.exeC:\Windows\system32\town.exe 784 "C:\Windows\SysWOW64\xirp.exe"15⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\kqia.exeC:\Windows\system32\kqia.exe 740 "C:\Windows\SysWOW64\town.exe"16⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\mizx.exeC:\Windows\system32\mizx.exe 684 "C:\Windows\SysWOW64\kqia.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Windows\SysWOW64\zvox.exeC:\Windows\system32\zvox.exe 752 "C:\Windows\SysWOW64\mizx.exe"18⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Windows\SysWOW64\lxtn.exeC:\Windows\system32\lxtn.exe 720 "C:\Windows\SysWOW64\zvox.exe"19⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\SysWOW64\xkan.exeC:\Windows\system32\xkan.exe 660 "C:\Windows\SysWOW64\lxtn.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\nsvg.exeC:\Windows\system32\nsvg.exe 800 "C:\Windows\SysWOW64\xkan.exe"21⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2132 -
C:\Windows\SysWOW64\guxg.exeC:\Windows\system32\guxg.exe 724 "C:\Windows\SysWOW64\nsvg.exe"22⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SysWOW64\dkeg.exeC:\Windows\system32\dkeg.exe 696 "C:\Windows\SysWOW64\guxg.exe"23⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2624 -
C:\Windows\SysWOW64\xjvt.exeC:\Windows\system32\xjvt.exe 764 "C:\Windows\SysWOW64\dkeg.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:608 -
C:\Windows\SysWOW64\mrhl.exeC:\Windows\system32\mrhl.exe 780 "C:\Windows\SysWOW64\xjvt.exe"25⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\SysWOW64\bdnr.exeC:\Windows\system32\bdnr.exe 796 "C:\Windows\SysWOW64\mrhl.exe"26⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\SysWOW64\lcpg.exeC:\Windows\system32\lcpg.exe 768 "C:\Windows\SysWOW64\bdnr.exe"27⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\svor.exeC:\Windows\system32\svor.exe 792 "C:\Windows\SysWOW64\lcpg.exe"28⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:440 -
C:\Windows\SysWOW64\fmsm.exeC:\Windows\system32\fmsm.exe 820 "C:\Windows\SysWOW64\svor.exe"29⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\rkkz.exeC:\Windows\system32\rkkz.exe 716 "C:\Windows\SysWOW64\fmsm.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\SysWOW64\jbvx.exeC:\Windows\system32\jbvx.exe 748 "C:\Windows\SysWOW64\rkkz.exe"31⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\SysWOW64\pnvm.exeC:\Windows\system32\pnvm.exe 812 "C:\Windows\SysWOW64\jbvx.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\SysWOW64\zfic.exeC:\Windows\system32\zfic.exe 788 "C:\Windows\SysWOW64\pnvm.exe"33⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\mkak.exeC:\Windows\system32\mkak.exe 760 "C:\Windows\SysWOW64\zfic.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:644 -
C:\Windows\SysWOW64\twgp.exeC:\Windows\system32\twgp.exe 712 "C:\Windows\SysWOW64\mkak.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2376 -
C:\Windows\SysWOW64\czwk.exeC:\Windows\system32\czwk.exe 704 "C:\Windows\SysWOW64\twgp.exe"36⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\wjya.exeC:\Windows\system32\wjya.exe 828 "C:\Windows\SysWOW64\czwk.exe"37⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\obbx.exeC:\Windows\system32\obbx.exe 692 "C:\Windows\SysWOW64\wjya.exe"38⤵
- Executes dropped EXE
PID:1240 -
C:\Windows\SysWOW64\wflc.exeC:\Windows\system32\wflc.exe 756 "C:\Windows\SysWOW64\obbx.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1816 -
C:\Windows\SysWOW64\flms.exeC:\Windows\system32\flms.exe 808 "C:\Windows\SysWOW64\wflc.exe"40⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
PID:1516 -
C:\Windows\SysWOW64\pdza.exeC:\Windows\system32\pdza.exe 832 "C:\Windows\SysWOW64\flms.exe"41⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2208 -
C:\Windows\SysWOW64\wwht.exeC:\Windows\system32\wwht.exe 860 "C:\Windows\SysWOW64\pdza.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\lify.exeC:\Windows\system32\lify.exe 872 "C:\Windows\SysWOW64\wwht.exe"43⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies registry class
PID:2620 -
C:\Windows\SysWOW64\hfji.exeC:\Windows\system32\hfji.exe 836 "C:\Windows\SysWOW64\lify.exe"44⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\zfmg.exeC:\Windows\system32\zfmg.exe 816 "C:\Windows\SysWOW64\hfji.exe"45⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\jakj.exeC:\Windows\system32\jakj.exe 868 "C:\Windows\SysWOW64\zfmg.exe"46⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\apky.exeC:\Windows\system32\apky.exe 824 "C:\Windows\SysWOW64\jakj.exe"47⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:468 -
C:\Windows\SysWOW64\kgpo.exeC:\Windows\system32\kgpo.exe 880 "C:\Windows\SysWOW64\apky.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\xxtb.exeC:\Windows\system32\xxtb.exe 776 "C:\Windows\SysWOW64\kgpo.exe"49⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\gpgr.exeC:\Windows\system32\gpgr.exe 888 "C:\Windows\SysWOW64\xxtb.exe"50⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies registry class
PID:2024 -
C:\Windows\SysWOW64\tkmr.exeC:\Windows\system32\tkmr.exe 856 "C:\Windows\SysWOW64\gpgr.exe"51⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\yasr.exeC:\Windows\system32\yasr.exe 884 "C:\Windows\SysWOW64\tkmr.exe"52⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2728 -
C:\Windows\SysWOW64\cyle.exeC:\Windows\system32\cyle.exe 852 "C:\Windows\SysWOW64\yasr.exe"53⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
PID:2844 -
C:\Windows\SysWOW64\mmmp.exeC:\Windows\system32\mmmp.exe 908 "C:\Windows\SysWOW64\cyle.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2832 -
C:\Windows\SysWOW64\vplk.exeC:\Windows\system32\vplk.exe 900 "C:\Windows\SysWOW64\mmmp.exe"55⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\nwkh.exeC:\Windows\system32\nwkh.exe 804 "C:\Windows\SysWOW64\vplk.exe"56⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\ezyk.exeC:\Windows\system32\ezyk.exe 840 "C:\Windows\SysWOW64\nwkh.exe"57⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
PID:776 -
C:\Windows\SysWOW64\onan.exeC:\Windows\system32\onan.exe 864 "C:\Windows\SysWOW64\ezyk.exe"58⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\alsa.exeC:\Windows\system32\alsa.exe 896 "C:\Windows\SysWOW64\onan.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\qtna.exeC:\Windows\system32\qtna.exe 916 "C:\Windows\SysWOW64\alsa.exe"60⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\zplv.exeC:\Windows\system32\zplv.exe 956 "C:\Windows\SysWOW64\qtna.exe"61⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1804 -
C:\Windows\SysWOW64\oaja.exeC:\Windows\system32\oaja.exe 924 "C:\Windows\SysWOW64\zplv.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2704 -
C:\Windows\SysWOW64\ihzd.exeC:\Windows\system32\ihzd.exe 844 "C:\Windows\SysWOW64\oaja.exe"63⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
PID:1676 -
C:\Windows\SysWOW64\symk.exeC:\Windows\system32\symk.exe 980 "C:\Windows\SysWOW64\ihzd.exe"64⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1952 -
C:\Windows\SysWOW64\xauf.exeC:\Windows\system32\xauf.exe 848 "C:\Windows\SysWOW64\symk.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\mapq.exeC:\Windows\system32\mapq.exe 892 "C:\Windows\SysWOW64\xauf.exe"66⤵
- Checks BIOS information in registry
- Modifies registry class
PID:1076 -
C:\Windows\SysWOW64\dtsb.exeC:\Windows\system32\dtsb.exe 964 "C:\Windows\SysWOW64\mapq.exe"67⤵
- Drops file in System32 directory
- Modifies registry class
PID:944 -
C:\Windows\SysWOW64\pfhb.exeC:\Windows\system32\pfhb.exe 932 "C:\Windows\SysWOW64\dtsb.exe"68⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Modifies registry class
PID:664 -
C:\Windows\SysWOW64\pyit.exeC:\Windows\system32\pyit.exe 904 "C:\Windows\SysWOW64\pfhb.exe"69⤵
- Drops file in System32 directory
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\ulat.exeC:\Windows\system32\ulat.exe 952 "C:\Windows\SysWOW64\pyit.exe"70⤵
- Checks BIOS information in registry
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\jxgy.exeC:\Windows\system32\jxgy.exe 988 "C:\Windows\SysWOW64\ulat.exe"71⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\qxuj.exeC:\Windows\system32\qxuj.exe 976 "C:\Windows\SysWOW64\jxgy.exe"72⤵
- Checks BIOS information in registry
PID:808 -
C:\Windows\SysWOW64\heug.exeC:\Windows\system32\heug.exe 948 "C:\Windows\SysWOW64\qxuj.exe"73⤵PID:2416
-
C:\Windows\SysWOW64\uvxt.exeC:\Windows\system32\uvxt.exe 984 "C:\Windows\SysWOW64\heug.exe"74⤵
- Modifies registry class
PID:2628 -
C:\Windows\SysWOW64\dnkj.exeC:\Windows\system32\dnkj.exe 1016 "C:\Windows\SysWOW64\uvxt.exe"75⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\tnfk.exeC:\Windows\system32\tnfk.exe 912 "C:\Windows\SysWOW64\dnkj.exe"76⤵
- Drops file in System32 directory
- Modifies registry class
PID:1560 -
C:\Windows\SysWOW64\flxx.exeC:\Windows\system32\flxx.exe 1008 "C:\Windows\SysWOW64\tnfk.exe"77⤵
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\acrr.exeC:\Windows\system32\acrr.exe 920 "C:\Windows\SysWOW64\flxx.exe"78⤵
- Checks BIOS information in registry
PID:1612 -
C:\Windows\SysWOW64\laje.exeC:\Windows\system32\laje.exe 1052 "C:\Windows\SysWOW64\acrr.exe"79⤵
- Drops file in System32 directory
PID:1496 -
C:\Windows\SysWOW64\yrnz.exeC:\Windows\system32\yrnz.exe 940 "C:\Windows\SysWOW64\laje.exe"80⤵
- Checks BIOS information in registry
PID:1328 -
C:\Windows\SysWOW64\abep.exeC:\Windows\system32\abep.exe 928 "C:\Windows\SysWOW64\yrnz.exe"81⤵PID:1216
-
C:\Windows\SysWOW64\nsik.exeC:\Windows\system32\nsik.exe 996 "C:\Windows\SysWOW64\abep.exe"82⤵PID:800
-
C:\Windows\SysWOW64\hqyf.exeC:\Windows\system32\hqyf.exe 1068 "C:\Windows\SysWOW64\nsik.exe"83⤵PID:2804
-
C:\Windows\SysWOW64\rilv.exeC:\Windows\system32\rilv.exe 1004 "C:\Windows\SysWOW64\hqyf.exe"84⤵PID:976
-
C:\Windows\SysWOW64\ixlk.exeC:\Windows\system32\ixlk.exe 1048 "C:\Windows\SysWOW64\rilv.exe"85⤵PID:768
-
C:\Windows\SysWOW64\adki.exeC:\Windows\system32\adki.exe 992 "C:\Windows\SysWOW64\ixlk.exe"86⤵PID:924
-
C:\Windows\SysWOW64\uypy.exeC:\Windows\system32\uypy.exe 1056 "C:\Windows\SysWOW64\adki.exe"87⤵PID:1404
-
C:\Windows\SysWOW64\jknd.exeC:\Windows\system32\jknd.exe 936 "C:\Windows\SysWOW64\uypy.exe"88⤵PID:1724
-
C:\Windows\SysWOW64\qwki.exeC:\Windows\system32\qwki.exe 1012 "C:\Windows\SysWOW64\jknd.exe"89⤵PID:2148
-
C:\Windows\SysWOW64\acuq.exeC:\Windows\system32\acuq.exe 1028 "C:\Windows\SysWOW64\qwki.exe"90⤵PID:2564
-
C:\Windows\SysWOW64\mimy.exeC:\Windows\system32\mimy.exe 1044 "C:\Windows\SysWOW64\acuq.exe"91⤵PID:1164
-
C:\Windows\SysWOW64\ygfl.exeC:\Windows\system32\ygfl.exe 1060 "C:\Windows\SysWOW64\mimy.exe"92⤵PID:1940
-
C:\Windows\SysWOW64\nscq.exeC:\Windows\system32\nscq.exe 1072 "C:\Windows\SysWOW64\ygfl.exe"93⤵PID:1776
-
C:\Windows\SysWOW64\dxlw.exeC:\Windows\system32\dxlw.exe 1036 "C:\Windows\SysWOW64\nscq.exe"94⤵PID:1872
-
C:\Windows\SysWOW64\pjse.exeC:\Windows\system32\pjse.exe 1064 "C:\Windows\SysWOW64\dxlw.exe"95⤵PID:2096
-
C:\Windows\SysWOW64\ezjo.exeC:\Windows\system32\ezjo.exe 1076 "C:\Windows\SysWOW64\pjse.exe"96⤵PID:536
-
C:\Windows\SysWOW64\wymm.exeC:\Windows\system32\wymm.exe 1088 "C:\Windows\SysWOW64\ezjo.exe"97⤵PID:2820
-
C:\Windows\SysWOW64\fbko.exeC:\Windows\system32\fbko.exe 1040 "C:\Windows\SysWOW64\wymm.exe"98⤵PID:1080
-
C:\Windows\SysWOW64\swro.exeC:\Windows\system32\swro.exe 972 "C:\Windows\SysWOW64\fbko.exe"99⤵PID:1568
-
C:\Windows\SysWOW64\efvj.exeC:\Windows\system32\efvj.exe 1084 "C:\Windows\SysWOW64\swro.exe"100⤵PID:1920
-
C:\Windows\SysWOW64\rorx.exeC:\Windows\system32\rorx.exe 1092 "C:\Windows\SysWOW64\efvj.exe"101⤵PID:1980
-
C:\Windows\SysWOW64\arpz.exeC:\Windows\system32\arpz.exe 1100 "C:\Windows\SysWOW64\rorx.exe"102⤵PID:1764
-
C:\Windows\SysWOW64\vmuh.exeC:\Windows\system32\vmuh.exe 1112 "C:\Windows\SysWOW64\arpz.exe"103⤵PID:2652
-
C:\Windows\SysWOW64\elhx.exeC:\Windows\system32\elhx.exe 1020 "C:\Windows\SysWOW64\vmuh.exe"104⤵PID:2724
-
C:\Windows\SysWOW64\ruls.exeC:\Windows\system32\ruls.exe 944 "C:\Windows\SysWOW64\elhx.exe"105⤵PID:2780
-
C:\Windows\SysWOW64\sbma.exeC:\Windows\system32\sbma.exe 1116 "C:\Windows\SysWOW64\ruls.exe"106⤵PID:1152
-
C:\Windows\SysWOW64\fgei.exeC:\Windows\system32\fgei.exe 968 "C:\Windows\SysWOW64\sbma.exe"107⤵PID:2936
-
C:\Windows\SysWOW64\pyrx.exeC:\Windows\system32\pyrx.exe 1120 "C:\Windows\SysWOW64\fgei.exe"108⤵PID:2348
-
C:\Windows\SysWOW64\ybis.exeC:\Windows\system32\ybis.exe 1108 "C:\Windows\SysWOW64\pyrx.exe"109⤵PID:1504
-
C:\Windows\SysWOW64\fytq.exeC:\Windows\system32\fytq.exe 1080 "C:\Windows\SysWOW64\ybis.exe"110⤵PID:2292
-
C:\Windows\SysWOW64\xbpa.exeC:\Windows\system32\xbpa.exe 1132 "C:\Windows\SysWOW64\fytq.exe"111⤵PID:2072
-
C:\Windows\SysWOW64\jvwa.exeC:\Windows\system32\jvwa.exe 1192 "C:\Windows\SysWOW64\xbpa.exe"112⤵PID:2540
-
C:\Windows\SysWOW64\ywqb.exeC:\Windows\system32\ywqb.exe 1104 "C:\Windows\SysWOW64\jvwa.exe"113⤵PID:1744
-
C:\Windows\SysWOW64\vxbg.exeC:\Windows\system32\vxbg.exe 1000 "C:\Windows\SysWOW64\ywqb.exe"114⤵PID:1520
-
C:\Windows\SysWOW64\cuml.exeC:\Windows\system32\cuml.exe 1188 "C:\Windows\SysWOW64\vxbg.exe"115⤵PID:2548
-
C:\Windows\SysWOW64\rjue.exeC:\Windows\system32\rjue.exe 1032 "C:\Windows\SysWOW64\cuml.exe"116⤵PID:972
-
C:\Windows\SysWOW64\eayr.exeC:\Windows\system32\eayr.exe 1096 "C:\Windows\SysWOW64\rjue.exe"117⤵PID:2308
-
C:\Windows\SysWOW64\qjcm.exeC:\Windows\system32\qjcm.exe 1124 "C:\Windows\SysWOW64\eayr.exe"118⤵PID:2848
-
C:\Windows\SysWOW64\fylw.exeC:\Windows\system32\fylw.exe 1180 "C:\Windows\SysWOW64\qjcm.exe"119⤵PID:2252
-
C:\Windows\SysWOW64\zbqm.exeC:\Windows\system32\zbqm.exe 876 "C:\Windows\SysWOW64\fylw.exe"120⤵PID:2344
-
C:\Windows\SysWOW64\oukj.exeC:\Windows\system32\oukj.exe 1136 "C:\Windows\SysWOW64\zbqm.exe"121⤵PID:2956
-
C:\Windows\SysWOW64\iaam.exeC:\Windows\system32\iaam.exe 1148 "C:\Windows\SysWOW64\oukj.exe"122⤵PID:792
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-