Analysis
-
max time kernel
30s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 20:07
Behavioral task
behavioral1
Sample
65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe
Resource
win10v2004-20240226-en
General
-
Target
65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe
-
Size
109KB
-
MD5
731498aa51421911fb3749198bbd6c5e
-
SHA1
395ac4276754f69b010f9a2341a429df25cdb9ea
-
SHA256
65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72
-
SHA512
6876ddb36b9c10fa7d3c025fb7bedab628846c661d1e0d0faf71e12c71ee67f3dc8e43bccafb953958dca5e546be4a34f84973db72ac4b77c4897370fcdf5c06
-
SSDEEP
1536:t3YjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8nkyjQrY:SdEUfKj8BYbDiC1ZTK7sxtLUIG5yyY
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral1/memory/2164-0-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x0035000000015e07-6.dat UPX behavioral1/memory/2164-9-0x0000000002F40000-0x0000000002FDA000-memory.dmp UPX behavioral1/files/0x000a000000012248-21.dat UPX behavioral1/files/0x0035000000015e46-23.dat UPX behavioral1/files/0x0007000000016040-36.dat UPX behavioral1/memory/2468-48-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x0007000000016197-52.dat UPX behavioral1/memory/2164-62-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2564-63-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x0007000000016267-65.dat UPX behavioral1/memory/324-72-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x000700000001634e-80.dat UPX behavioral1/memory/1092-93-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2996-94-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x00090000000165ae-96.dat UPX behavioral1/memory/2468-104-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x0007000000018ba8-111.dat UPX behavioral1/memory/968-122-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2984-125-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x0006000000018d07-134.dat UPX behavioral1/memory/1520-135-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/324-141-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x00050000000192f8-143.dat UPX behavioral1/memory/2860-156-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1956-158-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x0005000000019302-161.dat UPX behavioral1/memory/2192-173-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/files/0x0005000000019338-175.dat UPX behavioral1/memory/1736-187-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/968-188-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1520-189-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1652-196-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2192-199-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2844-208-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1652-212-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2968-218-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2824-219-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2700-229-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2844-241-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2744-242-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1748-253-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2968-254-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2556-265-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2824-272-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/860-280-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2700-279-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2556-278-0x0000000002F60000-0x0000000002FFA000-memory.dmp UPX behavioral1/memory/1072-301-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/860-304-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2316-318-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2008-327-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2268-331-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1072-341-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2988-350-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2056-357-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2316-361-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1608-362-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1656-374-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1632-383-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2152-388-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2528-417-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/1632-425-0x0000000000400000-0x000000000049A000-memory.dmp UPX behavioral1/memory/2532-430-0x0000000000400000-0x000000000049A000-memory.dmp UPX -
Executes dropped EXE 34 IoCs
pid Process 2564 Sysqemxjgah.exe 2996 Sysqemyegdp.exe 2468 Sysqemarigk.exe 2984 Sysqemzrqoy.exe 324 Sysqemdejwj.exe 1092 Sysqemqoobn.exe 1956 Sysqemxsygf.exe 968 Sysqembehyy.exe 1520 Sysqemgjagj.exe 2860 Sysqemxnyjn.exe 2192 Sysqemfyxun.exe 1736 Sysqemrwqhe.exe 1652 Sysqemtgpew.exe 2844 Sysqemkrase.exe 2968 Sysqemngxyx.exe 2700 Sysqemehwjj.exe 2744 Sysqemwaizc.exe 1748 Sysqemdther.exe 2556 Sysqemafdzq.exe 860 Sysqemsydjk.exe 2008 Sysqemibywn.exe 1072 Sysqemuddme.exe 2056 Sysqemyieck.exe 2316 Sysqemppfkj.exe 2268 Sysqemrvify.exe 2152 Sysqemdxovj.exe 2988 Sysqemlpnvy.exe 1608 Sysqemqgsiu.exe 1656 Sysqemctlqu.exe 1632 Sysqemctiau.exe 2252 Sysqembxvlk.exe 812 Sysqemvkigs.exe 2528 Sysqemurgve.exe 2532 Sysqemhibym.exe -
Loads dropped DLL 64 IoCs
pid Process 2164 65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe 2164 65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe 2564 Sysqemxjgah.exe 2564 Sysqemxjgah.exe 2996 Sysqemyegdp.exe 2996 Sysqemyegdp.exe 2468 Sysqemarigk.exe 2468 Sysqemarigk.exe 2984 Sysqemzrqoy.exe 2984 Sysqemzrqoy.exe 324 Sysqemdejwj.exe 324 Sysqemdejwj.exe 1092 Sysqemqoobn.exe 1092 Sysqemqoobn.exe 1956 Sysqemxsygf.exe 1956 Sysqemxsygf.exe 968 Sysqembehyy.exe 968 Sysqembehyy.exe 1520 Sysqemgjagj.exe 1520 Sysqemgjagj.exe 2860 Sysqemxnyjn.exe 2860 Sysqemxnyjn.exe 2192 Sysqemfyxun.exe 2192 Sysqemfyxun.exe 1736 Sysqemrwqhe.exe 1736 Sysqemrwqhe.exe 1652 Sysqemtgpew.exe 1652 Sysqemtgpew.exe 2844 Sysqemkrase.exe 2844 Sysqemkrase.exe 2824 Sysqemhoedg.exe 2824 Sysqemhoedg.exe 2700 Sysqemehwjj.exe 2700 Sysqemehwjj.exe 2744 Sysqemwaizc.exe 2744 Sysqemwaizc.exe 1748 Sysqemdther.exe 1748 Sysqemdther.exe 2556 Sysqemafdzq.exe 2556 Sysqemafdzq.exe 860 Sysqemsydjk.exe 860 Sysqemsydjk.exe 2008 Sysqemibywn.exe 2008 Sysqemibywn.exe 1072 Sysqemuddme.exe 1072 Sysqemuddme.exe 2056 Sysqemyieck.exe 2056 Sysqemyieck.exe 2316 Sysqemppfkj.exe 2316 Sysqemppfkj.exe 2268 Sysqemrvify.exe 2268 Sysqemrvify.exe 2152 Sysqemdxovj.exe 2152 Sysqemdxovj.exe 2988 Sysqemlpnvy.exe 2988 Sysqemlpnvy.exe 1608 Sysqemqgsiu.exe 1608 Sysqemqgsiu.exe 1656 Sysqemctlqu.exe 1656 Sysqemctlqu.exe 1632 Sysqemctiau.exe 1632 Sysqemctiau.exe 2252 Sysqembxvlk.exe 2252 Sysqembxvlk.exe -
resource yara_rule behavioral1/memory/2164-0-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x0035000000015e07-6.dat upx behavioral1/memory/2164-9-0x0000000002F40000-0x0000000002FDA000-memory.dmp upx behavioral1/files/0x000a000000012248-21.dat upx behavioral1/files/0x0035000000015e46-23.dat upx behavioral1/files/0x0007000000016040-36.dat upx behavioral1/memory/2468-48-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x0007000000016197-52.dat upx behavioral1/memory/2164-62-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2564-63-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x0007000000016267-65.dat upx behavioral1/memory/324-72-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x000700000001634e-80.dat upx behavioral1/memory/1092-93-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2996-94-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x00090000000165ae-96.dat upx behavioral1/memory/2468-104-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x0007000000018ba8-111.dat upx behavioral1/memory/968-122-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2984-125-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x0006000000018d07-134.dat upx behavioral1/memory/1520-135-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/324-141-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x00050000000192f8-143.dat upx behavioral1/memory/2860-156-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1956-158-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x0005000000019302-161.dat upx behavioral1/memory/2192-173-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x0005000000019338-175.dat upx behavioral1/memory/1736-187-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/968-188-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1520-189-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1652-196-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2192-199-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2844-208-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1652-212-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2968-218-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2824-219-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2700-229-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2844-241-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2744-242-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1748-253-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2968-254-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2556-265-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2824-272-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/860-280-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2700-279-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2556-278-0x0000000002F60000-0x0000000002FFA000-memory.dmp upx behavioral1/memory/1072-301-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/860-304-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2316-318-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2008-327-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2268-331-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1072-341-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2988-350-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2056-357-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2316-361-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1608-362-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1656-374-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1632-383-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2152-388-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2528-417-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1632-425-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2532-430-0x0000000000400000-0x000000000049A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2564 2164 65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe 28 PID 2164 wrote to memory of 2564 2164 65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe 28 PID 2164 wrote to memory of 2564 2164 65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe 28 PID 2164 wrote to memory of 2564 2164 65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe 28 PID 2564 wrote to memory of 2996 2564 Sysqemxjgah.exe 29 PID 2564 wrote to memory of 2996 2564 Sysqemxjgah.exe 29 PID 2564 wrote to memory of 2996 2564 Sysqemxjgah.exe 29 PID 2564 wrote to memory of 2996 2564 Sysqemxjgah.exe 29 PID 2996 wrote to memory of 2468 2996 Sysqemyegdp.exe 30 PID 2996 wrote to memory of 2468 2996 Sysqemyegdp.exe 30 PID 2996 wrote to memory of 2468 2996 Sysqemyegdp.exe 30 PID 2996 wrote to memory of 2468 2996 Sysqemyegdp.exe 30 PID 2468 wrote to memory of 2984 2468 Sysqemarigk.exe 31 PID 2468 wrote to memory of 2984 2468 Sysqemarigk.exe 31 PID 2468 wrote to memory of 2984 2468 Sysqemarigk.exe 31 PID 2468 wrote to memory of 2984 2468 Sysqemarigk.exe 31 PID 2984 wrote to memory of 324 2984 Sysqemzrqoy.exe 32 PID 2984 wrote to memory of 324 2984 Sysqemzrqoy.exe 32 PID 2984 wrote to memory of 324 2984 Sysqemzrqoy.exe 32 PID 2984 wrote to memory of 324 2984 Sysqemzrqoy.exe 32 PID 324 wrote to memory of 1092 324 Sysqemdejwj.exe 33 PID 324 wrote to memory of 1092 324 Sysqemdejwj.exe 33 PID 324 wrote to memory of 1092 324 Sysqemdejwj.exe 33 PID 324 wrote to memory of 1092 324 Sysqemdejwj.exe 33 PID 1092 wrote to memory of 1956 1092 Sysqemqoobn.exe 34 PID 1092 wrote to memory of 1956 1092 Sysqemqoobn.exe 34 PID 1092 wrote to memory of 1956 1092 Sysqemqoobn.exe 34 PID 1092 wrote to memory of 1956 1092 Sysqemqoobn.exe 34 PID 1956 wrote to memory of 968 1956 Sysqemxsygf.exe 35 PID 1956 wrote to memory of 968 1956 Sysqemxsygf.exe 35 PID 1956 wrote to memory of 968 1956 Sysqemxsygf.exe 35 PID 1956 wrote to memory of 968 1956 Sysqemxsygf.exe 35 PID 968 wrote to memory of 1520 968 Sysqembehyy.exe 36 PID 968 wrote to memory of 1520 968 Sysqembehyy.exe 36 PID 968 wrote to memory of 1520 968 Sysqembehyy.exe 36 PID 968 wrote to memory of 1520 968 Sysqembehyy.exe 36 PID 1520 wrote to memory of 2860 1520 Sysqemgjagj.exe 37 PID 1520 wrote to memory of 2860 1520 Sysqemgjagj.exe 37 PID 1520 wrote to memory of 2860 1520 Sysqemgjagj.exe 37 PID 1520 wrote to memory of 2860 1520 Sysqemgjagj.exe 37 PID 2860 wrote to memory of 2192 2860 Sysqemxnyjn.exe 38 PID 2860 wrote to memory of 2192 2860 Sysqemxnyjn.exe 38 PID 2860 wrote to memory of 2192 2860 Sysqemxnyjn.exe 38 PID 2860 wrote to memory of 2192 2860 Sysqemxnyjn.exe 38 PID 2192 wrote to memory of 1736 2192 Sysqemfyxun.exe 39 PID 2192 wrote to memory of 1736 2192 Sysqemfyxun.exe 39 PID 2192 wrote to memory of 1736 2192 Sysqemfyxun.exe 39 PID 2192 wrote to memory of 1736 2192 Sysqemfyxun.exe 39 PID 1736 wrote to memory of 1652 1736 Sysqemrwqhe.exe 40 PID 1736 wrote to memory of 1652 1736 Sysqemrwqhe.exe 40 PID 1736 wrote to memory of 1652 1736 Sysqemrwqhe.exe 40 PID 1736 wrote to memory of 1652 1736 Sysqemrwqhe.exe 40 PID 1652 wrote to memory of 2844 1652 Sysqemtgpew.exe 41 PID 1652 wrote to memory of 2844 1652 Sysqemtgpew.exe 41 PID 1652 wrote to memory of 2844 1652 Sysqemtgpew.exe 41 PID 1652 wrote to memory of 2844 1652 Sysqemtgpew.exe 41 PID 2844 wrote to memory of 2968 2844 Sysqemkrase.exe 42 PID 2844 wrote to memory of 2968 2844 Sysqemkrase.exe 42 PID 2844 wrote to memory of 2968 2844 Sysqemkrase.exe 42 PID 2844 wrote to memory of 2968 2844 Sysqemkrase.exe 42 PID 2824 wrote to memory of 2700 2824 Sysqemhoedg.exe 44 PID 2824 wrote to memory of 2700 2824 Sysqemhoedg.exe 44 PID 2824 wrote to memory of 2700 2824 Sysqemhoedg.exe 44 PID 2824 wrote to memory of 2700 2824 Sysqemhoedg.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe"C:\Users\Admin\AppData\Local\Temp\65ad209e773e843623fccee0d37dd36e582cf71b48de61a9e1e4de7fa69a6a72.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxjgah.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjgah.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyegdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyegdp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemarigk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemarigk.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzrqoy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzrqoy.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdejwj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdejwj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqoobn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqoobn.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxsygf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxsygf.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Sysqembehyy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembehyy.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgjagj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjagj.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxnyjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxnyjn.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfyxun.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyxun.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrwqhe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrwqhe.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtgpew.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtgpew.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkrase.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrase.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngxyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngxyx.exe"16⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhoedg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhoedg.exe"17⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehwjj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehwjj.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwaizc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwaizc.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdther.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdther.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafdzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafdzq.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsydjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsydjk.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:860 -
C:\Users\Admin\AppData\Local\Temp\Sysqemibywn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemibywn.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuddme.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuddme.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyieck.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyieck.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemppfkj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemppfkj.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvify.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvify.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxovj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxovj.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlpnvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlpnvy.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqgsiu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqgsiu.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemctlqu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctlqu.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Sysqemctiau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctiau.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxvlk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxvlk.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvkigs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvkigs.exe"34⤵
- Executes dropped EXE
PID:812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemurgve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemurgve.exe"35⤵
- Executes dropped EXE
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhibym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhibym.exe"36⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlciys.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlciys.exe"37⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqhcgl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqhcgl.exe"38⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkrdor.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkrdor.exe"39⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfixro.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfixro.exe"40⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjjloy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjjloy.exe"41⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlfort.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlfort.exe"42⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyvjub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyvjub.exe"43⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Sysqemolubi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolubi.exe"44⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsbzoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsbzoe.exe"45⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemijlwl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijlwl.exe"46⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvlrmx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvlrmx.exe"47⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhrihl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhrihl.exe"48⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwkfcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkfcu.exe"49⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkxora.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkxora.exe"50⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtamcn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtamcn.exe"51⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjtjpx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtjpx.exe"52⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzjuxe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjuxe.exe"53⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvoppc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvoppc.exe"54⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Sysqemggfup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemggfup.exe"55⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfcrrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfcrrm.exe"56⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmjpe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmjpe.exe"57⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxffco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxffco.exe"58⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkvifw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvifw.exe"59⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrphku.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrphku.exe"60⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Sysqemivhhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemivhhy.exe"61⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqarvi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqarvi.exe"62⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgtnhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtnhr.exe"63⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnmmig.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmmig.exe"64⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsfuix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsfuix.exe"65⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcbvam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbvam.exe"66⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsrhat.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrhat.exe"67⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzzcaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzzcaf.exe"68⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeloiy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeloiy.exe"69⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrcrlh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrcrlh.exe"70⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtngnu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtngnu.exe"71⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Sysqemautnp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemautnp.exe"72⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnlwqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnlwqx.exe"73⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Sysqemajrtg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajrtg.exe"74⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhrmla.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhrmla.exe"75⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Sysqemulsal.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemulsal.exe"76⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkbeas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbeas.exe"77⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzubvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzubvc.exe"78⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmlvyk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlvyk.exe"79⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrypge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrypge.exe"80⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyfkyq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfkyq.exe"81⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlwfby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwfby.exe"82⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyuadh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyuadh.exe"83⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlaryv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlaryv.exe"84⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Sysqemshnyp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshnyp.exe"85⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfuwov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfuwov.exe"86⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnzhbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzhbn.exe"87⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxylyx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxylyx.exe"88⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmrhlh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrhlh.exe"89⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwxijx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwxijx.exe"90⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgtjtm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtjtm.exe"91⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Sysqemranrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemranrx.exe"92⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtknop.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtknop.exe"93⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsgzmm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgzmm.exe"94⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxphgc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxphgc.exe"95⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkjnwo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjnwo.exe"96⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmbfmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmbfmg.exe"97⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcynus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcynus.exe"98⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzntut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzntut.exe"99⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\Sysqemodfus.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodfus.exe"100⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Sysqemycjrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycjrk.exe"101⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\Sysqemowgmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowgmu.exe"102⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Sysqemykgjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemykgjk.exe"103⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemijthv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijthv.exe"104⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhbtrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbtrx.exe"105⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsujxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsujxb.exe"106⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfopmn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfopmn.exe"107⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmvleh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvleh.exe"108⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjwvsd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwvsd.exe"109⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqeqkx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqeqkx.exe"110⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemddlmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddlmg.exe"111⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemapfuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapfuz.exe"112⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhmphi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmphi.exe"113⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkhskd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkhskd.exe"114⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjwhpv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjwhpv.exe"115⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrhovs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrhovs.exe"116⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwflcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwflcf.exe"117⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Sysqemaztke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaztke.exe"118⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\Sysqemizsll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemizsll.exe"119⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemplyqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemplyqi.exe"120⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxsyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxsyt.exe"121⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkcstx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkcstx.exe"122⤵PID:1568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-