Analysis
-
max time kernel
71s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 19:25
Behavioral task
behavioral1
Sample
22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe
Resource
win10v2004-20240319-en
General
-
Target
22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe
-
Size
185KB
-
MD5
a261cf8663fab2ffe25635b4c4fbc08e
-
SHA1
631754cd8e0b45dcb187ce6be9f5c5a2c2a13861
-
SHA256
22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb
-
SHA512
b0a4687d83239ef7198ad9a82b6ddb450b044ddbca8a83c1e30132094933558561d98750b8087c785ede18890750e402093ddb393d45048f57774297bb9eb369
-
SSDEEP
3072:ddEUfKj8BYbDiC1ZTK7sxtLUIGT9kXH0hga4PjBy2e:dUSiZTK40V2a4PdyF
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 58 IoCs
resource yara_rule behavioral2/files/0x0008000000023334-6.dat UPX behavioral2/files/0x000800000002332f-42.dat UPX behavioral2/files/0x0007000000023335-72.dat UPX behavioral2/files/0x000700000002333d-108.dat UPX behavioral2/files/0x0007000000023340-144.dat UPX behavioral2/memory/1060-152-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0007000000023342-182.dat UPX behavioral2/memory/1908-214-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00020000000226c0-220.dat UPX behavioral2/memory/4836-252-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00020000000226bd-258.dat UPX behavioral2/memory/1988-267-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000b0000000230e4-297.dat UPX behavioral2/memory/3116-305-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/5032-307-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1936-309-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2296-311-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0009000000023346-341.dat UPX behavioral2/files/0x000b000000023349-377.dat UPX behavioral2/files/0x000800000002334d-413.dat UPX behavioral2/files/0x00090000000230e2-449.dat UPX behavioral2/memory/512-457-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1436-483-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x00090000000230df-489.dat UPX behavioral2/memory/3732-521-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x000700000002334e-527.dat UPX behavioral2/memory/1924-529-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/536-536-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0007000000023350-565.dat UPX behavioral2/memory/3804-574-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0007000000023351-603.dat UPX behavioral2/memory/2000-611-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0007000000023352-642.dat UPX behavioral2/memory/1924-667-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/files/0x0007000000023356-679.dat UPX behavioral2/memory/4736-689-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3816-718-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/1840-752-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/888-753-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4528-782-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/5028-788-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4448-828-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/888-884-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/5028-919-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2412-930-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3588-965-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2584-991-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/900-997-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/3812-1026-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/556-1032-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/5072-1061-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2324-1067-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/900-1072-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4380-1102-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/556-1135-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2324-1198-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/4380-1215-0x0000000000400000-0x000000000049E000-memory.dmp UPX behavioral2/memory/2548-1240-0x0000000000400000-0x000000000049E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation 22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemdcwtd.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqempnmgg.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemchuwv.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemotvpl.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqembitnq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemnrolj.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemfccfi.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemcvmym.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemxepwu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemmtvgp.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemoswrb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemwywlz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqembxdrs.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemsrevp.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemhkhgt.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemzlajy.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemhmkpj.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemguitu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemjswyj.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemybjco.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemjvuxq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemlvukb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemkcadt.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemrgftq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemtvaov.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemwfarz.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqembhnxq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemritbi.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemygcug.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqembdlff.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemvqlci.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemsrgtd.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemcrkmu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemzlqoo.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemclrmp.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemqxxjt.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemrssqq.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemzjthi.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemehaub.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemmitzr.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemlcptn.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemwmpwg.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemnckwt.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemxgqcl.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemirsvj.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemhouvc.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemmemau.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemgtdam.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemlbahm.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemikneo.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemmmauk.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemcirkl.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemjffqo.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemeputi.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemojyai.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemlfhrk.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemapyls.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemkowxr.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemjockw.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemfxkeu.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemhibyt.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemsuxvb.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation Sysqemafdev.exe -
Executes dropped EXE 64 IoCs
pid Process 1908 Sysqemwxrwk.exe 4836 Sysqemlvukb.exe 1988 Sysqemojyai.exe 3116 Sysqemdcwtd.exe 5032 Sysqemwywlz.exe 1936 Sysqemnckwt.exe 2296 Sysqembxdrs.exe 512 Sysqemqxxjt.exe 1436 Sysqemybjco.exe 3732 Sysqemlbahm.exe 536 Sysqemjghcf.exe 3804 Sysqemygcug.exe 2000 Sysqemvqlci.exe 1924 Sysqemsrevp.exe 4736 Sysqemsrgtd.exe 3816 Sysqemlfhrk.exe 1840 Sysqemfxkeu.exe 4528 Sysqemfmipe.exe 4448 Sysqembdlff.exe 888 Sysqemnytke.exe 5028 Sysqemapyls.exe 2412 Sysqemnrolj.exe 3588 Sysqemshmmr.exe 2584 Sysqemxgqcl.exe 3812 Sysqemfccfi.exe 5072 Sysqemirsvj.exe 900 Sysqempnmgg.exe 556 Sysqemikneo.exe 2324 Sysqemafdev.exe 4380 Sysqemaraij.exe 2548 Sysqemkcadt.exe 3212 Sysqemiziqg.exe 4892 Sysqemcvmym.exe 3228 Sysqemmmauk.exe 836 Sysqemcrkmu.exe 1144 Sysqemkowxr.exe 2784 Sysqemhibyt.exe 4288 Sysqemzlqoo.exe 3968 Sysqemchuwv.exe 3132 Sysqemclrmp.exe 4124 Sysqemcirkl.exe 3720 Sysqemsuxvb.exe 3584 Sysqemhouvc.exe 3808 Sysqemhkhgt.exe 1908 Sysqemhzgrw.exe 3132 Sysqemxepwu.exe 1760 Sysqemmmjxu.exe 4200 Sysqemjvuxq.exe 4424 Sysqemmemau.exe 2948 Sysqemrgftq.exe 3988 Sysqemrssqq.exe 3584 Sysqemzlajy.exe 2364 Sysqemotvpl.exe 1852 Sysqemjockw.exe 4060 Sysqemhmkpj.exe 2840 Sysqembhnxq.exe 2464 Sysqemguitu.exe 3212 Sysqemritbi.exe 2516 Sysqemzjthi.exe 1144 Sysqemehaub.exe 556 Sysqembitnq.exe 3276 Sysqemjffqo.exe 4400 Sysqemmtvgp.exe 3780 Sysqemmitzr.exe -
resource yara_rule behavioral2/memory/1060-0-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0008000000023334-6.dat upx behavioral2/memory/1908-37-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000800000002332f-42.dat upx behavioral2/files/0x0007000000023335-72.dat upx behavioral2/memory/4836-74-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000700000002333d-108.dat upx behavioral2/memory/1988-110-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023340-144.dat upx behavioral2/memory/3116-146-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1060-152-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023342-182.dat upx behavioral2/memory/5032-183-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1908-214-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00020000000226c0-220.dat upx behavioral2/memory/1936-222-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4836-252-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00020000000226bd-258.dat upx behavioral2/memory/2296-260-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1988-267-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000b0000000230e4-297.dat upx behavioral2/memory/512-299-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3116-305-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5032-307-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1936-309-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2296-311-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0009000000023346-341.dat upx behavioral2/memory/1436-342-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000b000000023349-377.dat upx behavioral2/memory/3732-378-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000800000002334d-413.dat upx behavioral2/memory/536-415-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00090000000230e2-449.dat upx behavioral2/memory/3804-451-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/512-457-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1436-483-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00090000000230df-489.dat upx behavioral2/memory/2000-491-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3732-521-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x000700000002334e-527.dat upx behavioral2/memory/1924-529-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/536-536-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023350-565.dat upx behavioral2/memory/4736-566-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3804-574-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023351-603.dat upx behavioral2/memory/3816-604-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2000-611-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023352-642.dat upx behavioral2/memory/1840-643-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1924-667-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x0007000000023356-679.dat upx behavioral2/memory/4528-681-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4736-689-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4448-716-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3816-718-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1840-752-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/888-753-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4528-782-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5028-788-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4448-828-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3588-855-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/888-884-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2584-890-0x0000000000400000-0x000000000049E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmipe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnrolj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemikneo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhibyt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotvpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemritbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembitnq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjswyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwfarz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjffqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvukb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemojyai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvqlci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcrkmu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmemau.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhmkpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembxdrs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemehaub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmtvgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfccfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgtdam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwywlz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemygcug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemapyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzlqoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhkhgt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembhnxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwxrwk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlfhrk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiziqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqxxjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsrgtd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjockw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzjthi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtvaov.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjghcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemshmmr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemirsvj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkowxr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchuwv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcirkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzlajy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnckwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybjco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmauk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsuxvb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemguitu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemafdev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlcptn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlbahm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhouvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmjxu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrgftq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrssqq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsrevp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfxkeu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembdlff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxepwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemeputi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjvuxq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmitzr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxgqcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempnmgg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1908 1060 22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe 94 PID 1060 wrote to memory of 1908 1060 22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe 94 PID 1060 wrote to memory of 1908 1060 22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe 94 PID 1908 wrote to memory of 4836 1908 Sysqemwxrwk.exe 97 PID 1908 wrote to memory of 4836 1908 Sysqemwxrwk.exe 97 PID 1908 wrote to memory of 4836 1908 Sysqemwxrwk.exe 97 PID 4836 wrote to memory of 1988 4836 Sysqemlvukb.exe 98 PID 4836 wrote to memory of 1988 4836 Sysqemlvukb.exe 98 PID 4836 wrote to memory of 1988 4836 Sysqemlvukb.exe 98 PID 1988 wrote to memory of 3116 1988 Sysqemojyai.exe 99 PID 1988 wrote to memory of 3116 1988 Sysqemojyai.exe 99 PID 1988 wrote to memory of 3116 1988 Sysqemojyai.exe 99 PID 3116 wrote to memory of 5032 3116 Sysqemdcwtd.exe 101 PID 3116 wrote to memory of 5032 3116 Sysqemdcwtd.exe 101 PID 3116 wrote to memory of 5032 3116 Sysqemdcwtd.exe 101 PID 5032 wrote to memory of 1936 5032 Sysqemwywlz.exe 103 PID 5032 wrote to memory of 1936 5032 Sysqemwywlz.exe 103 PID 5032 wrote to memory of 1936 5032 Sysqemwywlz.exe 103 PID 1936 wrote to memory of 2296 1936 Sysqemnckwt.exe 106 PID 1936 wrote to memory of 2296 1936 Sysqemnckwt.exe 106 PID 1936 wrote to memory of 2296 1936 Sysqemnckwt.exe 106 PID 2296 wrote to memory of 512 2296 Sysqembxdrs.exe 107 PID 2296 wrote to memory of 512 2296 Sysqembxdrs.exe 107 PID 2296 wrote to memory of 512 2296 Sysqembxdrs.exe 107 PID 512 wrote to memory of 1436 512 Sysqemqxxjt.exe 109 PID 512 wrote to memory of 1436 512 Sysqemqxxjt.exe 109 PID 512 wrote to memory of 1436 512 Sysqemqxxjt.exe 109 PID 1436 wrote to memory of 3732 1436 Sysqemybjco.exe 111 PID 1436 wrote to memory of 3732 1436 Sysqemybjco.exe 111 PID 1436 wrote to memory of 3732 1436 Sysqemybjco.exe 111 PID 3732 wrote to memory of 536 3732 Sysqemlbahm.exe 112 PID 3732 wrote to memory of 536 3732 Sysqemlbahm.exe 112 PID 3732 wrote to memory of 536 3732 Sysqemlbahm.exe 112 PID 536 wrote to memory of 3804 536 Sysqemjghcf.exe 113 PID 536 wrote to memory of 3804 536 Sysqemjghcf.exe 113 PID 536 wrote to memory of 3804 536 Sysqemjghcf.exe 113 PID 3804 wrote to memory of 2000 3804 Sysqemygcug.exe 114 PID 3804 wrote to memory of 2000 3804 Sysqemygcug.exe 114 PID 3804 wrote to memory of 2000 3804 Sysqemygcug.exe 114 PID 2000 wrote to memory of 1924 2000 Sysqemvqlci.exe 116 PID 2000 wrote to memory of 1924 2000 Sysqemvqlci.exe 116 PID 2000 wrote to memory of 1924 2000 Sysqemvqlci.exe 116 PID 1924 wrote to memory of 4736 1924 Sysqemsrevp.exe 117 PID 1924 wrote to memory of 4736 1924 Sysqemsrevp.exe 117 PID 1924 wrote to memory of 4736 1924 Sysqemsrevp.exe 117 PID 4736 wrote to memory of 3816 4736 Sysqemsrgtd.exe 118 PID 4736 wrote to memory of 3816 4736 Sysqemsrgtd.exe 118 PID 4736 wrote to memory of 3816 4736 Sysqemsrgtd.exe 118 PID 3816 wrote to memory of 1840 3816 Sysqemlfhrk.exe 121 PID 3816 wrote to memory of 1840 3816 Sysqemlfhrk.exe 121 PID 3816 wrote to memory of 1840 3816 Sysqemlfhrk.exe 121 PID 1840 wrote to memory of 4528 1840 Sysqemfxkeu.exe 122 PID 1840 wrote to memory of 4528 1840 Sysqemfxkeu.exe 122 PID 1840 wrote to memory of 4528 1840 Sysqemfxkeu.exe 122 PID 4528 wrote to memory of 4448 4528 Sysqemfmipe.exe 123 PID 4528 wrote to memory of 4448 4528 Sysqemfmipe.exe 123 PID 4528 wrote to memory of 4448 4528 Sysqemfmipe.exe 123 PID 4448 wrote to memory of 888 4448 Sysqembdlff.exe 124 PID 4448 wrote to memory of 888 4448 Sysqembdlff.exe 124 PID 4448 wrote to memory of 888 4448 Sysqembdlff.exe 124 PID 888 wrote to memory of 5028 888 Sysqemnytke.exe 125 PID 888 wrote to memory of 5028 888 Sysqemnytke.exe 125 PID 888 wrote to memory of 5028 888 Sysqemnytke.exe 125 PID 5028 wrote to memory of 2412 5028 Sysqemapyls.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe"C:\Users\Admin\AppData\Local\Temp\22f7af55ed7e0c415d975dc08e3c14dfd50c1ee9ea50ce5fd384e59037b256eb.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwxrwk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwxrwk.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlvukb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlvukb.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojyai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojyai.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdcwtd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdcwtd.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwywlz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwywlz.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnckwt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnckwt.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\Sysqembxdrs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembxdrs.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqxxjt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqxxjt.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybjco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybjco.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbahm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbahm.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygcug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygcug.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvqlci.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvqlci.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrevp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrevp.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsrgtd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrgtd.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlfhrk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlfhrk.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxkeu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxkeu.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmipe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmipe.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Sysqembdlff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembdlff.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnytke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnytke.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\Sysqemapyls.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemapyls.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnrolj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnrolj.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Sysqemshmmr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemshmmr.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxgqcl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxgqcl.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfccfi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfccfi.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemirsvj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemirsvj.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnmgg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnmgg.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemikneo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikneo.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafdev.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafdev.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaraij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaraij.exe"31⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkcadt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkcadt.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiziqg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiziqg.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvmym.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvmym.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmauk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmauk.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcrkmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcrkmu.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkowxr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkowxr.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhibyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhibyt.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlqoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlqoo.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchuwv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchuwv.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\Sysqemclrmp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemclrmp.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcirkl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcirkl.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsuxvb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsuxvb.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhouvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhouvc.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkhgt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkhgt.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhzgrw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzgrw.exe"46⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxepwu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxepwu.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmjxu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmjxu.exe"48⤵
- Executes dropped EXE
- Modifies registry class
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjvuxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjvuxq.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmemau.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmemau.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrgftq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgftq.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrssqq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrssqq.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzlajy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlajy.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\Sysqemotvpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemotvpl.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjockw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjockw.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhmkpj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhmkpj.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\Sysqembhnxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhnxq.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Sysqemritbi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemritbi.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzjthi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzjthi.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemehaub.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemehaub.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Sysqembitnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembitnq.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjffqo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjffqo.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmtvgp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmtvgp.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmitzr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmitzr.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeputi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeputi.exe"66⤵
- Checks computer location settings
- Modifies registry class
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoswrb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoswrb.exe"67⤵
- Checks computer location settings
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglypo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglypo.exe"68⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjswyj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjswyj.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlcptn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlcptn.exe"70⤵
- Checks computer location settings
- Modifies registry class
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmpwg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmpwg.exe"71⤵
- Checks computer location settings
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvaov.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvaov.exe"72⤵
- Checks computer location settings
- Modifies registry class
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwfarz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwfarz.exe"73⤵
- Checks computer location settings
- Modifies registry class
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtdam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtdam.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyfbyz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyfbyz.exe"75⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqefbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqefbk.exe"76⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlohob.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlohob.exe"77⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqbcjg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbcjg.exe"78⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgrwxn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrwxn.exe"79⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\Sysqemllfcy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemllfcy.exe"80⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemauaik.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemauaik.exe"81⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\Sysqeminjge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqeminjge.exe"82⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyoill.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyoill.exe"83⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsylzc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsylzc.exe"84⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtnjrf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnjrf.exe"85⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsflpl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsflpl.exe"86⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoxoxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoxoxt.exe"87⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\Sysqemvfmnt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvfmnt.exe"88⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\Sysqemylbdu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemylbdu.exe"89⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdzuro.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdzuro.exe"90⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiankk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiankk.exe"91⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\Sysqemityvb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemityvb.exe"92⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\Sysqemybttn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybttn.exe"93⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\Sysqempquve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempquve.exe"94⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnkrwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnkrwn.exe"95⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiqiwc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiqiwc.exe"96⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcpzfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpzfq.exe"97⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcpjcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcpjcw.exe"98⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxkpyh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxkpyh.exe"99⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfsldu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfsldu.exe"100⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsrrjc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsrrjc.exe"101⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\Sysqempdnke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdnke.exe"102⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxltad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxltad.exe"103⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhwkdw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhwkdw.exe"104⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkcatx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkcatx.exe"105⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\Sysqemslyoi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemslyoi.exe"106⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhtuuv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtuuv.exe"107⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxqnxg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxqnxg.exe"108⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmkkyi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmkkyi.exe"109⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\Sysqemusgdo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemusgdo.exe"110⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmvwtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvwtb.exe"111⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsffud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsffud.exe"112⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcetxt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcetxt.exe"113⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkfbcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkfbcu.exe"114⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsnqiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnqiz.exe"115⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Sysqemozunk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemozunk.exe"116⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzkmjc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzkmjc.exe"117⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwlgod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwlgod.exe"118⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjqzpd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjqzpd.exe"119⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzhrxq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzhrxq.exe"120⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrzuup.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzuup.exe"121⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\Sysqemexycr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemexycr.exe"122⤵PID:4988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-