Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 02:28
Behavioral task
behavioral1
Sample
ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe
Resource
win10v2004-20240226-en
General
-
Target
ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe
-
Size
220KB
-
MD5
7bf06159642e43b3afe14f12065eba7c
-
SHA1
786487a5dd5b43f6dfa4f900064f66d6082779b5
-
SHA256
ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477
-
SHA512
b832245303ca44b0f39c57423fd1aa529a2e3c425e3d29348d96bbbf292208effce571decd471e833ce20d2536cdfc613ddcb96df4e4afeef50df05b7d60b99d
-
SSDEEP
3072:adEUfKj8BYbDiC1ZTK7sxtLUIGsqDiC1ZBdEUfKjj9dEUfKj8BYbDiC1ZTK7sxtP:aUSiZTK40QuZBUX9USiZTK40+HMHO
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 59 IoCs
resource yara_rule behavioral2/files/0x000a0000000231b5-6.dat UPX behavioral2/files/0x000e00000002313e-42.dat UPX behavioral2/files/0x0007000000023216-72.dat UPX behavioral2/files/0x000b00000002320b-108.dat UPX behavioral2/files/0x0007000000023217-144.dat UPX behavioral2/memory/4832-176-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/2384-178-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x0007000000023218-184.dat UPX behavioral2/memory/60-216-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x0007000000023219-223.dat UPX behavioral2/files/0x000700000002321b-258.dat UPX behavioral2/memory/3812-266-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x000700000002321d-296.dat UPX behavioral2/memory/5064-328-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x000700000002321e-334.dat UPX behavioral2/memory/544-367-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x000700000002321f-373.dat UPX behavioral2/memory/4628-375-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/5044-381-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x0007000000023220-411.dat UPX behavioral2/memory/112-419-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x0007000000023221-449.dat UPX behavioral2/memory/1148-453-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x0007000000023222-487.dat UPX behavioral2/files/0x0009000000023223-523.dat UPX behavioral2/memory/876-531-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x0008000000023226-561.dat UPX behavioral2/files/0x0007000000023227-597.dat UPX behavioral2/memory/4628-629-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x0009000000023125-635.dat UPX behavioral2/memory/3588-637-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/files/0x0007000000023228-671.dat UPX behavioral2/memory/4440-702-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4336-742-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/2660-743-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/3964-781-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/628-807-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/1408-818-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/1992-848-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4732-853-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/3588-879-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4820-885-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/3700-914-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/536-949-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4232-955-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/2660-961-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4628-994-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4576-1020-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/2456-1026-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/1992-1031-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4820-1057-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4568-1066-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/1008-1092-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4232-1127-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/2960-1162-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/2456-1197-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/3300-1203-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4568-1232-0x0000000000400000-0x00000000004B4000-memory.dmp UPX behavioral2/memory/4908-1266-0x0000000000400000-0x00000000004B4000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqempotzw.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemgkdfn.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemhfqnb.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemjtesv.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemsyuxj.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemqlmmp.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemcdmen.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemnlvze.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemwaytf.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemmkfyd.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemqtica.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemwwupj.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemwjyga.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemgyqzg.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemarpwk.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemuvfpn.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemqtrvk.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqembkzvi.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemtpqut.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemurwxf.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemcsqcv.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemoorlc.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemggktu.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemwomsn.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemgzljl.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemgojuo.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemyhhtr.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqembhfox.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemvwvey.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemqalfs.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemxnzaa.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemumyzv.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemwhywc.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemqxpyy.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemeueod.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemrnmrw.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqembfmcw.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemllzye.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemzbqjl.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemcmnaf.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemutmek.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemggppk.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemwydcf.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemermar.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemwofui.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemigfsf.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemlbtai.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemcqofn.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemohkzm.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemgevoz.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemggzos.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqembzkxg.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqempnjsl.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemmqopr.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemuntdf.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemrueor.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemwzqda.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemritbi.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqembkurp.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqembtpbq.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemgnzum.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemvfqqk.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation Sysqemfunkh.exe -
Executes dropped EXE 64 IoCs
pid Process 2384 Sysqempjwyd.exe 60 Sysqemcllta.exe 3812 Sysqemjpvyr.exe 5064 Sysqemeueod.exe 544 Sysqemwgber.exe 5044 Sysqemwydcf.exe 112 Sysqemhfqnb.exe 1148 Sysqemermar.exe 876 Sysqemwomsn.exe 4628 Sysqemjtesv.exe 4440 Sysqemggzos.exe 4336 Sysqemrnmrw.exe 3964 Sysqemgnyjw.exe 628 Sysqemgzljl.exe 1408 Sysqemlxqry.exe 4732 Sysqemwwupj.exe 3588 Sysqemgojuo.exe 3700 Sysqemrkked.exe 536 Sysqembcaki.exe 2660 Sysqembfmcw.exe 4628 Sysqemmmqap.exe 4576 Sysqemwwgfu.exe 1992 Sysqemrzlnm.exe 4820 Sysqemyvvad.exe 1008 Sysqemyhhtr.exe 4232 Sysqembkkqe.exe 2960 Sysqemdxntz.exe 2456 Sysqemwtndv.exe 4568 Sysqemgphbo.exe 4908 Sysqembkurp.exe 912 Sysqembzkxg.exe 4696 Sysqemtryuz.exe 3300 Sysqemduxkg.exe 3500 Sysqemlzgxe.exe 1464 Sysqemihqxr.exe 4856 Sysqemvnjgr.exe 3512 Sysqemwjyga.exe 4112 Sysqembtpbq.exe 4996 Sysqemlvfrx.exe 3584 Sysqemgnzum.exe 1088 Sysqemwofui.exe 3604 Sysqemvksfy.exe 2720 Sysqemgrxhu.exe 4816 Sysqemjxnyv.exe 4240 Sysqemqcxlm.exe 3812 Sysqemyghqw.exe 752 Sysqemllzye.exe 4388 Sysqemqvjgy.exe 5064 Sysqemdtnoa.exe 1340 Sysqemqzfwa.exe 1900 Sysqemqcrpo.exe 1236 Sysqemqoehd.exe 2792 Sysqemigfsf.exe 2164 Sysqemsyuxj.exe 628 Sysqemvimvc.exe 2736 Sysqemiveqt.exe 4860 Sysqemlbtai.exe 4764 Sysqemizsbb.exe 3616 Sysqemftnoa.exe 2348 Sysqemyektt.exe 1900 Sysqemdchbz.exe 1236 Sysqemaocox.exe 724 Sysqemszrzz.exe 4576 Sysqemqlmmp.exe -
resource yara_rule behavioral2/memory/4832-0-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000a0000000231b5-6.dat upx behavioral2/memory/2384-37-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000e00000002313e-42.dat upx behavioral2/files/0x0007000000023216-72.dat upx behavioral2/memory/60-74-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000b00000002320b-108.dat upx behavioral2/memory/3812-110-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023217-144.dat upx behavioral2/memory/5064-146-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4832-176-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2384-178-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023218-184.dat upx behavioral2/memory/544-186-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/60-216-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/5044-224-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023219-223.dat upx behavioral2/files/0x000700000002321b-258.dat upx behavioral2/memory/112-260-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3812-266-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000700000002321d-296.dat upx behavioral2/memory/1148-298-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/5064-328-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000700000002321e-334.dat upx behavioral2/memory/876-336-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/544-367-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x000700000002321f-373.dat upx behavioral2/memory/4628-375-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/5044-381-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023220-411.dat upx behavioral2/memory/4440-413-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/112-419-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023221-449.dat upx behavioral2/memory/4336-450-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/1148-453-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023222-487.dat upx behavioral2/memory/3964-488-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0009000000023223-523.dat upx behavioral2/memory/628-525-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/876-531-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0008000000023226-561.dat upx behavioral2/memory/1408-563-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023227-597.dat upx behavioral2/memory/4732-599-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4628-629-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0009000000023125-635.dat upx behavioral2/memory/3588-637-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/files/0x0007000000023228-671.dat upx behavioral2/memory/4440-702-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/536-708-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4336-742-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2660-743-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4628-776-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3964-781-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/628-807-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4576-813-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/1408-818-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/1992-848-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4732-853-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3588-879-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/4820-885-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/3700-914-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/1008-920-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/536-949-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwwupj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsyuxj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjand.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuvfpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgnyjw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqvjgy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcqofn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuzgqp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempmysk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhfox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhfqnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemduxkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvnjgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembtpbq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyghqw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkcopm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemskxky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemukttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtxzie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuplui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqcdec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrzlnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdxntz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaocox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemumyzv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuohkw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemritbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwtndv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtryuz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqalfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemacrmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsrmlt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwaytf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembkurp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemihqxr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemscecd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxtfdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemftrwq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrueor.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwjyga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqoehd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemggktu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvwvey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembkkqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqiwlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxvalm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwgber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgphbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqcxlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemggppk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjydck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtpqut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqlmmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfawcu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkwpen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzgcvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemllzye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemizsbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyxxuy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxbfji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhnffr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwzqda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwvbah.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2384 4832 ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe 90 PID 4832 wrote to memory of 2384 4832 ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe 90 PID 4832 wrote to memory of 2384 4832 ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe 90 PID 2384 wrote to memory of 60 2384 Sysqempjwyd.exe 92 PID 2384 wrote to memory of 60 2384 Sysqempjwyd.exe 92 PID 2384 wrote to memory of 60 2384 Sysqempjwyd.exe 92 PID 60 wrote to memory of 3812 60 Sysqemcllta.exe 93 PID 60 wrote to memory of 3812 60 Sysqemcllta.exe 93 PID 60 wrote to memory of 3812 60 Sysqemcllta.exe 93 PID 3812 wrote to memory of 5064 3812 Sysqemjpvyr.exe 94 PID 3812 wrote to memory of 5064 3812 Sysqemjpvyr.exe 94 PID 3812 wrote to memory of 5064 3812 Sysqemjpvyr.exe 94 PID 5064 wrote to memory of 544 5064 Sysqemeueod.exe 95 PID 5064 wrote to memory of 544 5064 Sysqemeueod.exe 95 PID 5064 wrote to memory of 544 5064 Sysqemeueod.exe 95 PID 544 wrote to memory of 5044 544 Sysqemwgber.exe 96 PID 544 wrote to memory of 5044 544 Sysqemwgber.exe 96 PID 544 wrote to memory of 5044 544 Sysqemwgber.exe 96 PID 5044 wrote to memory of 112 5044 Sysqemwydcf.exe 97 PID 5044 wrote to memory of 112 5044 Sysqemwydcf.exe 97 PID 5044 wrote to memory of 112 5044 Sysqemwydcf.exe 97 PID 112 wrote to memory of 1148 112 Sysqemhfqnb.exe 98 PID 112 wrote to memory of 1148 112 Sysqemhfqnb.exe 98 PID 112 wrote to memory of 1148 112 Sysqemhfqnb.exe 98 PID 1148 wrote to memory of 876 1148 Sysqemermar.exe 99 PID 1148 wrote to memory of 876 1148 Sysqemermar.exe 99 PID 1148 wrote to memory of 876 1148 Sysqemermar.exe 99 PID 876 wrote to memory of 4628 876 Sysqemwomsn.exe 100 PID 876 wrote to memory of 4628 876 Sysqemwomsn.exe 100 PID 876 wrote to memory of 4628 876 Sysqemwomsn.exe 100 PID 4628 wrote to memory of 4440 4628 Sysqemjtesv.exe 101 PID 4628 wrote to memory of 4440 4628 Sysqemjtesv.exe 101 PID 4628 wrote to memory of 4440 4628 Sysqemjtesv.exe 101 PID 4440 wrote to memory of 4336 4440 Sysqemggzos.exe 102 PID 4440 wrote to memory of 4336 4440 Sysqemggzos.exe 102 PID 4440 wrote to memory of 4336 4440 Sysqemggzos.exe 102 PID 4336 wrote to memory of 3964 4336 Sysqemrnmrw.exe 105 PID 4336 wrote to memory of 3964 4336 Sysqemrnmrw.exe 105 PID 4336 wrote to memory of 3964 4336 Sysqemrnmrw.exe 105 PID 3964 wrote to memory of 628 3964 Sysqemgnyjw.exe 106 PID 3964 wrote to memory of 628 3964 Sysqemgnyjw.exe 106 PID 3964 wrote to memory of 628 3964 Sysqemgnyjw.exe 106 PID 628 wrote to memory of 1408 628 Sysqemgzljl.exe 107 PID 628 wrote to memory of 1408 628 Sysqemgzljl.exe 107 PID 628 wrote to memory of 1408 628 Sysqemgzljl.exe 107 PID 1408 wrote to memory of 4732 1408 Sysqemlxqry.exe 109 PID 1408 wrote to memory of 4732 1408 Sysqemlxqry.exe 109 PID 1408 wrote to memory of 4732 1408 Sysqemlxqry.exe 109 PID 4732 wrote to memory of 3588 4732 Sysqemwwupj.exe 111 PID 4732 wrote to memory of 3588 4732 Sysqemwwupj.exe 111 PID 4732 wrote to memory of 3588 4732 Sysqemwwupj.exe 111 PID 3588 wrote to memory of 3700 3588 Sysqemgojuo.exe 112 PID 3588 wrote to memory of 3700 3588 Sysqemgojuo.exe 112 PID 3588 wrote to memory of 3700 3588 Sysqemgojuo.exe 112 PID 3700 wrote to memory of 536 3700 Sysqemrkked.exe 113 PID 3700 wrote to memory of 536 3700 Sysqemrkked.exe 113 PID 3700 wrote to memory of 536 3700 Sysqemrkked.exe 113 PID 536 wrote to memory of 2660 536 Sysqembcaki.exe 114 PID 536 wrote to memory of 2660 536 Sysqembcaki.exe 114 PID 536 wrote to memory of 2660 536 Sysqembcaki.exe 114 PID 2660 wrote to memory of 4628 2660 Sysqembfmcw.exe 115 PID 2660 wrote to memory of 4628 2660 Sysqembfmcw.exe 115 PID 2660 wrote to memory of 4628 2660 Sysqembfmcw.exe 115 PID 4628 wrote to memory of 4576 4628 Sysqemmmqap.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe"C:\Users\Admin\AppData\Local\Temp\ec3fa2f01d6af9f951a4a95b9a16d14e23a34c9856c74989c3dd41815cf22477.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Sysqempjwyd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjwyd.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcllta.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcllta.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpvyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpvyr.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeueod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeueod.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwgber.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwgber.exe"6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwydcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwydcf.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhfqnb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhfqnb.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemermar.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemermar.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwomsn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwomsn.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjtesv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtesv.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemggzos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemggzos.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrnmrw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrnmrw.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnyjw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnyjw.exe"14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgzljl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgzljl.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlxqry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlxqry.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwwupj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwupj.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgojuo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgojuo.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkked.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkked.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\Sysqembcaki.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembcaki.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqembfmcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembfmcw.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmqap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmqap.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwwgfu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwwgfu.exe"23⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzlnm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzlnm.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyvvad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyvvad.exe"25⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyhhtr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyhhtr.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkkqe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkkqe.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxntz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxntz.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwtndv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwtndv.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgphbo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgphbo.exe"30⤵
- Executes dropped EXE
- Modifies registry class
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqembkurp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembkurp.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzkxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzkxg.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtryuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtryuz.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemduxkg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemduxkg.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlzgxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlzgxe.exe"35⤵
- Executes dropped EXE
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Sysqemihqxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemihqxr.exe"36⤵
- Executes dropped EXE
- Modifies registry class
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvnjgr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvnjgr.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwjyga.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwjyga.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtpbq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtpbq.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvfrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvfrx.exe"40⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnzum.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwofui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwofui.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvksfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvksfy.exe"43⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"44⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjxnyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxnyv.exe"45⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcxlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcxlm.exe"46⤵
- Executes dropped EXE
- Modifies registry class
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyghqw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyghqw.exe"47⤵
- Executes dropped EXE
- Modifies registry class
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemllzye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllzye.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqvjgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqvjgy.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdtnoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdtnoa.exe"50⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqzfwa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqzfwa.exe"51⤵
- Executes dropped EXE
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqcrpo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqcrpo.exe"52⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqoehd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqoehd.exe"53⤵
- Executes dropped EXE
- Modifies registry class
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemigfsf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemigfsf.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsyuxj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsyuxj.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvimvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvimvc.exe"56⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiveqt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiveqt.exe"57⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbtai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbtai.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemizsbb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizsbb.exe"59⤵
- Executes dropped EXE
- Modifies registry class
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemftnoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemftnoa.exe"60⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyektt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyektt.exe"61⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdchbz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdchbz.exe"62⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaocox.exe"63⤵
- Executes dropped EXE
- Modifies registry class
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszrzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszrzz.exe"64⤵
- Executes dropped EXE
PID:724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqlmmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqlmmp.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyxxuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyxxuy.exe"66⤵
- Modifies registry class
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkcopm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkcopm.exe"67⤵
- Modifies registry class
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqemasaxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemasaxt.exe"68⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqalfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqalfs.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrnip.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrnip.exe"70⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdcbfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcbfi.exe"71⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvfqqk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfqqk.exe"72⤵
- Checks computer location settings
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvrciy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvrciy.exe"73⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqiwlo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqiwlo.exe"74⤵
- Modifies registry class
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyqzg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyqzg.exe"75⤵
- Checks computer location settings
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxbfji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxbfji.exe"76⤵
- Modifies registry class
PID:368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcdmen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcdmen.exe"77⤵
- Checks computer location settings
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhxxi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhxxi.exe"78⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdexhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdexhe.exe"79⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Sysqemveifd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemveifd.exe"80⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhjand.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjand.exe"81⤵
- Modifies registry class
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhnffr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhnffr.exe"82⤵
- Modifies registry class
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxvalm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxvalm.exe"83⤵
- Modifies registry class
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnlvze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlvze.exe"84⤵
- Checks computer location settings
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacrmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacrmh.exe"85⤵
- Modifies registry class
PID:216 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfawcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfawcu.exe"86⤵
- Modifies registry class
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqslzz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqslzz.exe"87⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\Sysqemarpwk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemarpwk.exe"88⤵
- Checks computer location settings
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnehup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnehup.exe"89⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\Sysqemscecd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemscecd.exe"90⤵
- Modifies registry class
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqofn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqofn.exe"91⤵
- Checks computer location settings
- Modifies registry class
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjccy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjccy.exe"92⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsrmlt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrmlt.exe"93⤵
- Modifies registry class
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiowyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiowyr.exe"94⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxtfdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtfdp.exe"95⤵
- Modifies registry class
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Sysqemftrwq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemftrwq.exe"96⤵
- Modifies registry class
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\Sysqempxttj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempxttj.exe"97⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemppcml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppcml.exe"98⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\Sysqemskxky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemskxky.exe"99⤵
- Modifies registry class
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkhxum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhxum.exe"100⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfunkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfunkh.exe"101⤵
- Checks computer location settings
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemurwxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemurwxf.exe"102⤵
- Checks computer location settings
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnzaa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnzaa.exe"103⤵
- Checks computer location settings
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Sysqempuctq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempuctq.exe"104⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Sysqemczvtq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczvtq.exe"105⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuzgqp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzgqp.exe"106⤵
- Modifies registry class
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkwpen.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkwpen.exe"107⤵
- Modifies registry class
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzbqjl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbqjl.exe"108⤵
- Checks computer location settings
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcsqcv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcsqcv.exe"109⤵
- Checks computer location settings
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnojmd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnojmd.exe"110⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxyhcj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxyhcj.exe"111⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuhskx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuhskx.exe"112⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcpfcr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpfcr.exe"113⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\Sysqempnjsl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnjsl.exe"114⤵
- Checks computer location settings
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcmnaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcmnaf.exe"115⤵
- Checks computer location settings
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwzqda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwzqda.exe"116⤵
- Checks computer location settings
- Modifies registry class
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhouvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhouvc.exe"117⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemutmek.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutmek.exe"118⤵
- Checks computer location settings
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoorlc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoorlc.exe"119⤵
- Checks computer location settings
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Sysqempotzw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempotzw.exe"120⤵
- Checks computer location settings
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfdzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfdzj.exe"121⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\Sysqemumyzv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemumyzv.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:1532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-