Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 02:32
Behavioral task
behavioral1
Sample
bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe
Resource
win10v2004-20240426-en
General
-
Target
bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe
-
Size
95KB
-
MD5
0e66261ff2d8c4a07be70c03afb8ec6d
-
SHA1
b0e16c13061ca757c8bd01394e2f582ddd85c87f
-
SHA256
bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc
-
SHA512
5964d84f6ebdcd4d008ef5d34715479f55c33294eb3be5ec227fda8afae9d3b6a5c761f4360e47252492e90cf112bfc36598f5c8c309075a1ea5ccd6e4514fff
-
SSDEEP
1536:+OYjIyeC1eUfKjkhBYJ7mTCbqODiC1ZsyHZK0FjlqsS5eHyG9LU3YG8n/:adEUfKj8BYbDiC1ZTK7sxtLUIGs
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/5072-0-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000700000002344b-6.dat UPX behavioral2/files/0x000800000002344a-41.dat UPX behavioral2/files/0x000700000002344d-71.dat UPX behavioral2/files/0x000700000002344e-106.dat UPX behavioral2/files/0x0008000000023448-141.dat UPX behavioral2/files/0x0007000000023450-176.dat UPX behavioral2/files/0x0007000000023451-211.dat UPX behavioral2/files/0x0007000000023452-246.dat UPX behavioral2/memory/5072-276-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0007000000023453-282.dat UPX behavioral2/memory/4696-284-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0002000000022fc9-318.dat UPX behavioral2/memory/4012-325-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4792-352-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0002000000022fcb-357.dat UPX behavioral2/files/0x0007000000023454-392.dat UPX behavioral2/memory/4344-394-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2140-399-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000a0000000006cf-429.dat UPX behavioral2/memory/1132-460-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4812-464-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4620-462-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000400000001d9f0-470.dat UPX behavioral2/memory/1624-476-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0004000000022e35-506.dat UPX behavioral2/memory/2752-512-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4696-538-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0009000000023384-544.dat UPX behavioral2/memory/4796-546-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3740-575-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000c000000023386-581.dat UPX behavioral2/memory/2128-588-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x0009000000023387-618.dat UPX behavioral2/memory/4344-628-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/files/0x000b000000023388-655.dat UPX behavioral2/memory/1892-690-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2868-750-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2204-785-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4796-851-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3224-864-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4788-895-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4564-929-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1892-963-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/388-1021-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3708-1027-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4024-1057-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3200-1064-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4628-1093-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/5044-1099-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1552-1101-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2356-1130-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3508-1132-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4028-1138-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3224-1171-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/2908-1205-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3752-1238-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/1552-1268-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4028-1301-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3764-1339-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/4524-1376-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3704-1407-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3076-1436-0x0000000000400000-0x0000000000493000-memory.dmp UPX behavioral2/memory/3696-1446-0x0000000000400000-0x0000000000493000-memory.dmp UPX -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemsmkuv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemdgdzw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemrokos.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemvfvue.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemffzeq.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemsdtpn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlbtai.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempnogk.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlhmnn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemacmdc.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemyrinp.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqikvb.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemawhdc.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemfunkh.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemhpgeb.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemkasvr.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqeminvoh.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemwhdsa.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqfyxf.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemxtdhb.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemxulmh.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemxtegz.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjpvgn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemilacl.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemceyca.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqembosfw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqizzi.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqembgsib.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemntcff.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemfrrze.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemijtht.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemojlir.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemqkmqr.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemuydbk.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjtjeh.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemwrcbk.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqembkkyi.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemxrjap.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemhzgrw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemuoqln.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemaqspj.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemfvzsx.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqempqqvz.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemgkmly.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemttshl.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemeboae.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemywqad.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemlibxv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemajqbn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemnhzib.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemomlnw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjansv.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemhcipw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemgrxhu.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemcqofn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemslyoi.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemtamgw.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemryfnx.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemglinu.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemjledq.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemijzyn.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemeabhr.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Sysqemwfgcl.exe -
Executes dropped EXE 64 IoCs
pid Process 4012 Sysqemgtdrr.exe 4792 Sysqemeboae.exe 2140 Sysqemlgyfv.exe 1132 Sysqemtkisf.exe 4812 Sysqembosfw.exe 4620 Sysqemtsfyl.exe 2752 Sysqemawhdc.exe 4696 Sysqemojyai.exe 3740 Sysqemvnjgr.exe 2128 Sysqemlogos.exe 4344 Sysqemojiyn.exe 2868 Sysqemdojlr.exe 1624 Sysqemgyajk.exe 2204 Sysqemqizzi.exe 4796 Sysqemaezry.exe 3224 Sysqemlwpod.exe 4788 Sysqemlwqco.exe 4564 Sysqemqfyxf.exe 1892 Sysqemdzeeq.exe 388 Sysqemqmwcw.exe 3708 Sysqemdlrxf.exe 4024 Sysqemgrxhu.exe 3200 Sysqemlsnck.exe 4628 Sysqemvogvs.exe 5044 Sysqembmldg.exe 2356 Sysqemlhmnn.exe 3508 Sysqemycwlt.exe 3224 Sysqemltqoc.exe 2908 Sysqemtamgw.exe 3752 Sysqemolrjn.exe 1552 Sysqemgofth.exe 4028 Sysqemafhwe.exe 3764 Sysqemtqwuy.exe 4524 Sysqemvanrq.exe 3704 Sysqemnwncm.exe 3076 Sysqemywqad.exe 3696 Sysqemomlnw.exe 2664 Sysqembgsib.exe 5096 Sysqemlbtai.exe 3568 Sysqemiwooz.exe 1552 Sysqemsgfdf.exe 2872 Sysqemvbjtm.exe 2608 Sysqembzphl.exe 2124 Sysqemsddrn.exe 4792 Sysqemxpyfs.exe 4544 Sysqemilacl.exe 900 Sysqemallak.exe 3004 Sysqemkvbyr.exe 4900 Sysqemsanqm.exe 5088 Sysqemfffru.exe 3804 Sysqemvgdrp.exe 8 Sysqemstxem.exe 3084 Sysqemfzqmu.exe 2008 Sysqemaqspj.exe 4012 Sysqemseraf.exe 2380 Sysqemsftyt.exe 4764 Sysqemnsknf.exe 3508 Sysqemajgez.exe 4284 Sysqemajqbn.exe 868 Sysqemfawcu.exe 4620 Sysqemnhszs.exe 3068 Sysqemkbouq.exe 3080 Sysqemcqofn.exe 4048 Sysqemfigiq.exe -
resource yara_rule behavioral2/memory/5072-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000700000002344b-6.dat upx behavioral2/files/0x000800000002344a-41.dat upx behavioral2/files/0x000700000002344d-71.dat upx behavioral2/files/0x000700000002344e-106.dat upx behavioral2/files/0x0008000000023448-141.dat upx behavioral2/files/0x0007000000023450-176.dat upx behavioral2/files/0x0007000000023451-211.dat upx behavioral2/files/0x0007000000023452-246.dat upx behavioral2/memory/5072-276-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0007000000023453-282.dat upx behavioral2/memory/4696-284-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0002000000022fc9-318.dat upx behavioral2/memory/4012-325-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4792-352-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0002000000022fcb-357.dat upx behavioral2/files/0x0007000000023454-392.dat upx behavioral2/memory/4344-394-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2140-399-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000a0000000006cf-429.dat upx behavioral2/memory/1132-460-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4812-464-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4620-462-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000400000001d9f0-470.dat upx behavioral2/memory/1624-476-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0004000000022e35-506.dat upx behavioral2/memory/2752-512-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4696-538-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000023384-544.dat upx behavioral2/memory/4796-546-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3740-575-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000c000000023386-581.dat upx behavioral2/memory/2128-588-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x0009000000023387-618.dat upx behavioral2/memory/4344-628-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/files/0x000b000000023388-655.dat upx behavioral2/memory/1892-690-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2868-750-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2204-785-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4796-851-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3224-864-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4788-895-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4564-929-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1892-963-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/388-1021-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3708-1027-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4024-1057-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3200-1064-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4628-1093-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/5044-1099-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1552-1101-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2356-1130-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3508-1132-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4028-1138-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3224-1171-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/2908-1205-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3752-1238-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/1552-1268-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4028-1301-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3764-1339-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/4524-1376-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3704-1407-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3076-1436-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral2/memory/3696-1446-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkvbyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsmkuv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemltqoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvogvs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtqwuy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvgdrp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdzeeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjaocl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemczapo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemglinu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdjert.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxrjap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnpebr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsgzvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemutoyr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcgyug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqyooa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqikvb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemcvgdw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdnnvb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqfyxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgrxhu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemawhdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembzphl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsahxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemffvgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqembkkyi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhirzm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaezry.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemryfnx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkzhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfmedw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzsrre.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemieknp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempnogk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqizzi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsnnzw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvfrgz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemojyai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxrulo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemlvccs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnhzib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuuolq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemycwlt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemomlnw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempqqvz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhzgrw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzwnhy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdsfrp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemyrinp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaehmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtkisf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemacmdc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemejxrm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemceyca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemttshl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvgriu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemallak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuxyjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemonzyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzohum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemguitu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfvzsx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4012 5072 bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe 87 PID 5072 wrote to memory of 4012 5072 bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe 87 PID 5072 wrote to memory of 4012 5072 bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe 87 PID 4012 wrote to memory of 4792 4012 Sysqemgtdrr.exe 88 PID 4012 wrote to memory of 4792 4012 Sysqemgtdrr.exe 88 PID 4012 wrote to memory of 4792 4012 Sysqemgtdrr.exe 88 PID 4792 wrote to memory of 2140 4792 Sysqemeboae.exe 89 PID 4792 wrote to memory of 2140 4792 Sysqemeboae.exe 89 PID 4792 wrote to memory of 2140 4792 Sysqemeboae.exe 89 PID 2140 wrote to memory of 1132 2140 Sysqemlgyfv.exe 91 PID 2140 wrote to memory of 1132 2140 Sysqemlgyfv.exe 91 PID 2140 wrote to memory of 1132 2140 Sysqemlgyfv.exe 91 PID 1132 wrote to memory of 4812 1132 Sysqemtkisf.exe 92 PID 1132 wrote to memory of 4812 1132 Sysqemtkisf.exe 92 PID 1132 wrote to memory of 4812 1132 Sysqemtkisf.exe 92 PID 4812 wrote to memory of 4620 4812 Sysqembosfw.exe 95 PID 4812 wrote to memory of 4620 4812 Sysqembosfw.exe 95 PID 4812 wrote to memory of 4620 4812 Sysqembosfw.exe 95 PID 4620 wrote to memory of 2752 4620 Sysqemtsfyl.exe 96 PID 4620 wrote to memory of 2752 4620 Sysqemtsfyl.exe 96 PID 4620 wrote to memory of 2752 4620 Sysqemtsfyl.exe 96 PID 2752 wrote to memory of 4696 2752 Sysqemawhdc.exe 97 PID 2752 wrote to memory of 4696 2752 Sysqemawhdc.exe 97 PID 2752 wrote to memory of 4696 2752 Sysqemawhdc.exe 97 PID 4696 wrote to memory of 3740 4696 Sysqemojyai.exe 98 PID 4696 wrote to memory of 3740 4696 Sysqemojyai.exe 98 PID 4696 wrote to memory of 3740 4696 Sysqemojyai.exe 98 PID 3740 wrote to memory of 2128 3740 Sysqemvnjgr.exe 100 PID 3740 wrote to memory of 2128 3740 Sysqemvnjgr.exe 100 PID 3740 wrote to memory of 2128 3740 Sysqemvnjgr.exe 100 PID 2128 wrote to memory of 4344 2128 Sysqemlogos.exe 102 PID 2128 wrote to memory of 4344 2128 Sysqemlogos.exe 102 PID 2128 wrote to memory of 4344 2128 Sysqemlogos.exe 102 PID 4344 wrote to memory of 2868 4344 Sysqemojiyn.exe 104 PID 4344 wrote to memory of 2868 4344 Sysqemojiyn.exe 104 PID 4344 wrote to memory of 2868 4344 Sysqemojiyn.exe 104 PID 2868 wrote to memory of 1624 2868 Sysqemdojlr.exe 105 PID 2868 wrote to memory of 1624 2868 Sysqemdojlr.exe 105 PID 2868 wrote to memory of 1624 2868 Sysqemdojlr.exe 105 PID 1624 wrote to memory of 2204 1624 Sysqemgyajk.exe 108 PID 1624 wrote to memory of 2204 1624 Sysqemgyajk.exe 108 PID 1624 wrote to memory of 2204 1624 Sysqemgyajk.exe 108 PID 2204 wrote to memory of 4796 2204 Sysqemqizzi.exe 109 PID 2204 wrote to memory of 4796 2204 Sysqemqizzi.exe 109 PID 2204 wrote to memory of 4796 2204 Sysqemqizzi.exe 109 PID 4796 wrote to memory of 3224 4796 Sysqemaezry.exe 125 PID 4796 wrote to memory of 3224 4796 Sysqemaezry.exe 125 PID 4796 wrote to memory of 3224 4796 Sysqemaezry.exe 125 PID 3224 wrote to memory of 4788 3224 Sysqemlwpod.exe 111 PID 3224 wrote to memory of 4788 3224 Sysqemlwpod.exe 111 PID 3224 wrote to memory of 4788 3224 Sysqemlwpod.exe 111 PID 4788 wrote to memory of 4564 4788 Sysqemlwqco.exe 112 PID 4788 wrote to memory of 4564 4788 Sysqemlwqco.exe 112 PID 4788 wrote to memory of 4564 4788 Sysqemlwqco.exe 112 PID 4564 wrote to memory of 1892 4564 Sysqemqfyxf.exe 113 PID 4564 wrote to memory of 1892 4564 Sysqemqfyxf.exe 113 PID 4564 wrote to memory of 1892 4564 Sysqemqfyxf.exe 113 PID 1892 wrote to memory of 388 1892 Sysqemdzeeq.exe 114 PID 1892 wrote to memory of 388 1892 Sysqemdzeeq.exe 114 PID 1892 wrote to memory of 388 1892 Sysqemdzeeq.exe 114 PID 388 wrote to memory of 3708 388 Sysqemqmwcw.exe 115 PID 388 wrote to memory of 3708 388 Sysqemqmwcw.exe 115 PID 388 wrote to memory of 3708 388 Sysqemqmwcw.exe 115 PID 3708 wrote to memory of 4024 3708 Sysqemdlrxf.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe"C:\Users\Admin\AppData\Local\Temp\bea0ffd61c693a327a17969f8fa9f6359b0e5cb0715ee249993ca11ad10a3dfc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtdrr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtdrr.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeboae.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeboae.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgyfv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgyfv.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtkisf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtkisf.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\Sysqembosfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembosfw.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtsfyl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtsfyl.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawhdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawhdc.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojyai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojyai.exe"9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvnjgr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvnjgr.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlogos.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlogos.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Sysqemojiyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemojiyn.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdojlr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdojlr.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgyajk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgyajk.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqizzi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqizzi.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaezry.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaezry.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwpod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwpod.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwqco.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwqco.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqfyxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqfyxf.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdzeeq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdzeeq.exe"20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqmwcw.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdlrxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdlrxf.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgrxhu.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlsnck.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlsnck.exe"24⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvogvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvogvs.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\Sysqembmldg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembmldg.exe"26⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhmnn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhmnn.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycwlt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycwlt.exe"28⤵
- Executes dropped EXE
- Modifies registry class
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemltqoc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemltqoc.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtamgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtamgw.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Sysqemolrjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemolrjn.exe"31⤵
- Executes dropped EXE
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgofth.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgofth.exe"32⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemafhwe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemafhwe.exe"33⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqwuy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqwuy.exe"34⤵
- Executes dropped EXE
- Modifies registry class
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvanrq.exe"35⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnwncm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnwncm.exe"36⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemywqad.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemywqad.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemomlnw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemomlnw.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\Sysqembgsib.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembgsib.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlbtai.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlbtai.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiwooz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiwooz.exe"41⤵
- Executes dropped EXE
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsgfdf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsgfdf.exe"42⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvbjtm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvbjtm.exe"43⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Sysqembzphl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembzphl.exe"44⤵
- Executes dropped EXE
- Modifies registry class
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsddrn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsddrn.exe"45⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxpyfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxpyfs.exe"46⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Sysqemilacl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemilacl.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemallak.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemallak.exe"48⤵
- Executes dropped EXE
- Modifies registry class
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkvbyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkvbyr.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsanqm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsanqm.exe"50⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfffru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfffru.exe"51⤵
- Executes dropped EXE
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgdrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgdrp.exe"52⤵
- Executes dropped EXE
- Modifies registry class
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemstxem.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemstxem.exe"53⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfzqmu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfzqmu.exe"54⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqspj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqspj.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemseraf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemseraf.exe"56⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsftyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsftyt.exe"57⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnsknf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnsknf.exe"58⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajgez.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajgez.exe"59⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemajqbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemajqbn.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfawcu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfawcu.exe"61⤵
- Executes dropped EXE
PID:868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnhszs.exe"62⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkbouq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbouq.exe"63⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqofn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqofn.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfigiq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfigiq.exe"65⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdnnvb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdnnvb.exe"66⤵
- Modifies registry class
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\Sysqemacmdc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemacmdc.exe"67⤵
- Checks computer location settings
- Modifies registry class
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\Sysqemutoyr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemutoyr.exe"68⤵
- Modifies registry class
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfmedw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfmedw.exe"69⤵
- Modifies registry class
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxeewy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxeewy.exe"70⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\Sysqemitjoa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitjoa.exe"71⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmjobw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmjobw.exe"72⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxtdhb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxtdhb.exe"73⤵
- Checks computer location settings
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\Sysqemczapo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemczapo.exe"74⤵
- Modifies registry class
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcgyug.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcgyug.exe"75⤵
- Modifies registry class
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfunkh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfunkh.exe"76⤵
- Checks computer location settings
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcvgdw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcvgdw.exe"77⤵
- Modifies registry class
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkasvr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkasvr.exe"78⤵
- Checks computer location settings
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Sysqempqqvz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqqvz.exe"79⤵
- Checks computer location settings
- Modifies registry class
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Sysqempnogk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempnogk.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxulmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxulmh.exe"81⤵
- Checks computer location settings
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Sysqemchfzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemchfzm.exe"82⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjansv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjansv.exe"83⤵
- Checks computer location settings
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxrjap.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxrjap.exe"84⤵
- Checks computer location settings
- Modifies registry class
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhcipw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhcipw.exe"85⤵
- Checks computer location settings
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxrulo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxrulo.exe"86⤵
- Modifies registry class
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhouvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhouvc.exe"87⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuxyjn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuxyjn.exe"88⤵
- Modifies registry class
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmimog.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmimog.exe"89⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhzgrw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhzgrw.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhksjk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhksjk.exe"91⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzohum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzohum.exe"92⤵
- Modifies registry class
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeabhr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeabhr.exe"93⤵
- Checks computer location settings
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjktit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjktit.exe"94⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjggsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjggsb.exe"95⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\Sysqempppbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempppbd.exe"96⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzsrre.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzsrre.exe"97⤵
- Modifies registry class
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejxrm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejxrm.exe"98⤵
- Modifies registry class
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzwnhy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzwnhy.exe"99⤵
- Modifies registry class
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Sysqemejicd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejicd.exe"100⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjaocl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjaocl.exe"101⤵
- Modifies registry class
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwfgcl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwfgcl.exe"102⤵
- Checks computer location settings
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuoqln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuoqln.exe"103⤵
- Checks computer location settings
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemguitu.exe"104⤵
- Modifies registry class
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkdgn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkdgn.exe"105⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjpvgn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpvgn.exe"106⤵
- Checks computer location settings
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwrcbk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwrcbk.exe"107⤵
- Checks computer location settings
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjtjeh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjtjeh.exe"108⤵
- Checks computer location settings
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Sysqemceyca.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemceyca.exe"109⤵
- Checks computer location settings
- Modifies registry class
PID:868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwhdsa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwhdsa.exe"110⤵
- Checks computer location settings
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemryfnx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryfnx.exe"111⤵
- Checks computer location settings
- Modifies registry class
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemeobdr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeobdr.exe"112⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgkmly.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgkmly.exe"113⤵
- Checks computer location settings
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqyooa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyooa.exe"114⤵
- Modifies registry class
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmxeu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmxeu.exe"115⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\Sysqemelibt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemelibt.exe"116⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgsxru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgsxru.exe"117⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrcopt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrcopt.exe"118⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtnefa.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtnefa.exe"119⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\Sysqemglinu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglinu.exe"120⤵
- Checks computer location settings
- Modifies registry class
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlconc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlconc.exe"121⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\Sysqembvmox.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembvmox.exe"122⤵PID:2128
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-