Analysis
-
max time kernel
3s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 12:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe
Resource
win7-20240221-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe
Resource
win10v2004-20240226-en
14 signatures
150 seconds
General
-
Target
2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe
-
Size
118KB
-
MD5
0321576988e396c40d2d91ae99dc966b
-
SHA1
1b8884099a47d53d7806b48ed27c9ce370dc38fe
-
SHA256
2de41057e514675d77d69efd0b099e426c56b3ec6668a0b269f87e5798a9de51
-
SHA512
be4423aa1138ca443b39a061b261c9a1ea0049fdb43efdde9218cc7b15c94f8494d134c43cb1bc1d15969037a1c024724a7bfea0223b7565bbd8172727f8c979
-
SSDEEP
3072:Yt8G6+6EoVMOkEjvFfrmFsVF1hkBatShyqnVM:Yt8GJ6P2Ok8hDABatSfnVM
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 3012 EYkMoAgk.exe 1796 XmkEgkwA.exe -
Loads dropped DLL 4 IoCs
pid Process 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EYkMoAgk.exe = "C:\\ProgramData\\JIAAIYgQ\\EYkMoAgk.exe" 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EYkMoAgk.exe = "C:\\ProgramData\\JIAAIYgQ\\EYkMoAgk.exe" EYkMoAgk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\XmkEgkwA.exe = "C:\\Users\\Admin\\uYYQMAQs\\XmkEgkwA.exe" XmkEgkwA.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\XmkEgkwA.exe = "C:\\Users\\Admin\\uYYQMAQs\\XmkEgkwA.exe" 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2700 reg.exe 956 reg.exe 1452 reg.exe 2696 reg.exe 2556 reg.exe 1192 reg.exe 2800 reg.exe 1192 reg.exe 3236 reg.exe 908 reg.exe 2652 reg.exe 2904 reg.exe 2976 reg.exe 1696 reg.exe 2952 reg.exe 2476 reg.exe 2748 reg.exe 2348 reg.exe 2152 reg.exe 4016 reg.exe 3132 reg.exe 3672 reg.exe 3496 reg.exe 3364 reg.exe 624 reg.exe 2632 reg.exe 2796 reg.exe 2540 reg.exe 684 reg.exe 2708 reg.exe 1860 reg.exe 1068 reg.exe 2464 reg.exe 1596 reg.exe 1480 reg.exe 2384 reg.exe 908 reg.exe 2308 reg.exe 3912 reg.exe 2764 reg.exe 3196 reg.exe 2784 reg.exe 1232 reg.exe 2280 reg.exe 1712 reg.exe 1508 reg.exe 1152 reg.exe 2240 reg.exe 2460 reg.exe 1596 reg.exe 2772 reg.exe 3644 reg.exe 2580 reg.exe 1924 reg.exe 2384 reg.exe 3044 reg.exe 1704 reg.exe 3028 reg.exe 1444 reg.exe 2096 reg.exe 1748 reg.exe 872 reg.exe 2772 reg.exe 2408 reg.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 1912 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 1912 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 1696 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 1696 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2304 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2304 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 1772 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 1772 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2004 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2004 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 3044 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 3044 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2312 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 2312 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1796 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 28 PID 2904 wrote to memory of 1796 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 28 PID 2904 wrote to memory of 1796 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 28 PID 2904 wrote to memory of 1796 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 28 PID 2904 wrote to memory of 3012 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 29 PID 2904 wrote to memory of 3012 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 29 PID 2904 wrote to memory of 3012 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 29 PID 2904 wrote to memory of 3012 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 29 PID 2904 wrote to memory of 3068 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 30 PID 2904 wrote to memory of 3068 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 30 PID 2904 wrote to memory of 3068 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 30 PID 2904 wrote to memory of 3068 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 30 PID 3068 wrote to memory of 2724 3068 cmd.exe 33 PID 3068 wrote to memory of 2724 3068 cmd.exe 33 PID 3068 wrote to memory of 2724 3068 cmd.exe 33 PID 3068 wrote to memory of 2724 3068 cmd.exe 33 PID 2904 wrote to memory of 2652 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 32 PID 2904 wrote to memory of 2652 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 32 PID 2904 wrote to memory of 2652 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 32 PID 2904 wrote to memory of 2652 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 32 PID 2904 wrote to memory of 2580 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 34 PID 2904 wrote to memory of 2580 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 34 PID 2904 wrote to memory of 2580 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 34 PID 2904 wrote to memory of 2580 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 34 PID 2904 wrote to memory of 2556 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 36 PID 2904 wrote to memory of 2556 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 36 PID 2904 wrote to memory of 2556 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 36 PID 2904 wrote to memory of 2556 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 36 PID 2904 wrote to memory of 2736 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 38 PID 2904 wrote to memory of 2736 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 38 PID 2904 wrote to memory of 2736 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 38 PID 2904 wrote to memory of 2736 2904 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 38 PID 2736 wrote to memory of 2536 2736 cmd.exe 41 PID 2736 wrote to memory of 2536 2736 cmd.exe 41 PID 2736 wrote to memory of 2536 2736 cmd.exe 41 PID 2736 wrote to memory of 2536 2736 cmd.exe 41 PID 2724 wrote to memory of 1152 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 42 PID 2724 wrote to memory of 1152 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 42 PID 2724 wrote to memory of 1152 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 42 PID 2724 wrote to memory of 1152 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 42 PID 1152 wrote to memory of 1912 1152 cmd.exe 44 PID 1152 wrote to memory of 1912 1152 cmd.exe 44 PID 1152 wrote to memory of 1912 1152 cmd.exe 44 PID 1152 wrote to memory of 1912 1152 cmd.exe 44 PID 2724 wrote to memory of 2700 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 45 PID 2724 wrote to memory of 2700 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 45 PID 2724 wrote to memory of 2700 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 45 PID 2724 wrote to memory of 2700 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 45 PID 2724 wrote to memory of 2764 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 46 PID 2724 wrote to memory of 2764 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 46 PID 2724 wrote to memory of 2764 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 46 PID 2724 wrote to memory of 2764 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 46 PID 2724 wrote to memory of 2784 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 47 PID 2724 wrote to memory of 2784 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 47 PID 2724 wrote to memory of 2784 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 47 PID 2724 wrote to memory of 2784 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 47 PID 2724 wrote to memory of 2812 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 48 PID 2724 wrote to memory of 2812 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 48 PID 2724 wrote to memory of 2812 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 48 PID 2724 wrote to memory of 2812 2724 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 48 PID 1912 wrote to memory of 2944 1912 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 51 PID 1912 wrote to memory of 2944 1912 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 51 PID 1912 wrote to memory of 2944 1912 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 51 PID 1912 wrote to memory of 2944 1912 2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\uYYQMAQs\XmkEgkwA.exe"C:\Users\Admin\uYYQMAQs\XmkEgkwA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1796
-
-
C:\ProgramData\JIAAIYgQ\EYkMoAgk.exe"C:\ProgramData\JIAAIYgQ\EYkMoAgk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3012
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"6⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"8⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"10⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"12⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"14⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"16⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"18⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock19⤵PID:1292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"20⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock21⤵PID:1476
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"22⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock23⤵PID:2140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"24⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock25⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"26⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock27⤵PID:2448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"28⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock29⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"30⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock31⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"32⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock33⤵PID:1132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"34⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock35⤵PID:2776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"36⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock37⤵PID:1752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"38⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock39⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"40⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock41⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"42⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock43⤵PID:800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"44⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock45⤵PID:1284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"46⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock47⤵PID:892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"48⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock49⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"50⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock51⤵PID:2132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"52⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock53⤵PID:1508
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"54⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock55⤵PID:2092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"56⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock57⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"58⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock59⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"60⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock61⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"62⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock63⤵PID:2856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"64⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock65⤵PID:2208
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"66⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock67⤵PID:2412
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"68⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock69⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"70⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock71⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"72⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock73⤵PID:2860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"74⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock75⤵PID:2252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"76⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock77⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"78⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock79⤵PID:988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"80⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock81⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"82⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock83⤵PID:2340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"84⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock85⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"86⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock87⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"88⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock89⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"90⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock91⤵PID:2376
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"92⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock93⤵PID:1068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"94⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock95⤵PID:2808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"96⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock97⤵PID:1356
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"98⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock99⤵PID:1092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"100⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock101⤵PID:1544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"102⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock103⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"104⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock105⤵PID:2968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"106⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock107⤵PID:2692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"108⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock109⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"110⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock111⤵PID:1252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"112⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock113⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"114⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock115⤵PID:2580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"116⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock117⤵PID:2300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"118⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock119⤵PID:2216
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"120⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock121⤵PID:1960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-05_0321576988e396c40d2d91ae99dc966b_virlock"122⤵PID:2052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-