Analysis
-
max time kernel
31s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe
-
Size
42KB
-
MD5
27bed2b769dc018f0f0f329d7bd7f37b
-
SHA1
4f5f8985fe54ebae375bee381d95173166d5ac19
-
SHA256
8f2b1df6121a1aad9eecd3ce05146d2777ebeb439768add2d303657c6a4e0f60
-
SHA512
fedd890bbcf40eb1f2cbfe34f5cc2fd244659bd3ae53f8754dbcdcc31f4d15f9cd45ab27d2598c3d7ff61bc4695d83218cdd34662299cb9d3482f0f437ef8103
-
SSDEEP
768:Iehi6i18f3rIrRC6zjZj0YzI64MdOpkZ8Dew70T670Sg32L:rYq6CijU/j+kS+xL
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe -
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 1408 nvsys86.exe 2600 nvsys86.exe 2736 nvsys86.exe 2752 nvsys86.exe 1688 nvsys86.exe 492 nvsys86.exe 2224 nvsys86.exe 2040 nvsys86.exe 1492 nvsys86.exe 2180 nvsys86.exe 1572 nvsys86.exe 2444 nvsys86.exe 2648 nvsys86.exe 2744 nvsys86.exe 1856 nvsys86.exe 580 nvsys86.exe 2096 nvsys86.exe 940 nvsys86.exe 1584 nvsys86.exe 2984 nvsys86.exe 2604 nvsys86.exe 1564 nvsys86.exe 2608 nvsys86.exe 2456 nvsys86.exe 1912 nvsys86.exe 1364 nvsys86.exe 760 nvsys86.exe 1284 nvsys86.exe 1736 nvsys86.exe 1520 nvsys86.exe 592 nvsys86.exe 3036 nvsys86.exe 2432 nvsys86.exe 2528 nvsys86.exe 2512 nvsys86.exe 2756 nvsys86.exe 1752 nvsys86.exe 1860 nvsys86.exe 2936 nvsys86.exe 1140 nvsys86.exe 2616 nvsys86.exe 2904 nvsys86.exe 1576 nvsys86.exe 2624 nvsys86.exe 2440 nvsys86.exe 2652 nvsys86.exe 2220 nvsys86.exe 948 nvsys86.exe 2876 nvsys86.exe 2396 nvsys86.exe 2016 nvsys86.exe 2164 nvsys86.exe 1732 nvsys86.exe 548 nvsys86.exe 2432 nvsys86.exe 2948 nvsys86.exe 2552 nvsys86.exe 2720 nvsys86.exe 856 nvsys86.exe 1804 nvsys86.exe 1808 nvsys86.exe 1584 nvsys86.exe 2516 nvsys86.exe 1556 nvsys86.exe -
Loads dropped DLL 64 IoCs
pid Process 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 1408 nvsys86.exe 2600 nvsys86.exe 2600 nvsys86.exe 2736 nvsys86.exe 2752 nvsys86.exe 2752 nvsys86.exe 492 nvsys86.exe 492 nvsys86.exe 2040 nvsys86.exe 2040 nvsys86.exe 2180 nvsys86.exe 2180 nvsys86.exe 2444 nvsys86.exe 2444 nvsys86.exe 2744 nvsys86.exe 2744 nvsys86.exe 580 nvsys86.exe 580 nvsys86.exe 940 nvsys86.exe 940 nvsys86.exe 2984 nvsys86.exe 2984 nvsys86.exe 1564 nvsys86.exe 1564 nvsys86.exe 2456 nvsys86.exe 2456 nvsys86.exe 1364 nvsys86.exe 1364 nvsys86.exe 1284 nvsys86.exe 1284 nvsys86.exe 1520 nvsys86.exe 1520 nvsys86.exe 3036 nvsys86.exe 3036 nvsys86.exe 2528 nvsys86.exe 2528 nvsys86.exe 2756 nvsys86.exe 2756 nvsys86.exe 1860 nvsys86.exe 1860 nvsys86.exe 1140 nvsys86.exe 1140 nvsys86.exe 2904 nvsys86.exe 2904 nvsys86.exe 2624 nvsys86.exe 2624 nvsys86.exe 2652 nvsys86.exe 2652 nvsys86.exe 948 nvsys86.exe 948 nvsys86.exe 2396 nvsys86.exe 2396 nvsys86.exe 2164 nvsys86.exe 2164 nvsys86.exe 548 nvsys86.exe 548 nvsys86.exe 2948 nvsys86.exe 2948 nvsys86.exe 2720 nvsys86.exe 2720 nvsys86.exe 1804 nvsys86.exe 1804 nvsys86.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe Process not Found File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe Process not Found File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe Process not Found File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe Process not Found File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe Process not Found File opened for modification C:\Windows\SysWOW64\nvsys86.exe Process not Found File opened for modification C:\Windows\SysWOW64\nvsys86.exe Process not Found File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 656 set thread context of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 1408 set thread context of 2600 1408 nvsys86.exe 32 PID 2736 set thread context of 2752 2736 nvsys86.exe 43 PID 1688 set thread context of 492 1688 nvsys86.exe 62 PID 2224 set thread context of 2040 2224 nvsys86.exe 73 PID 1492 set thread context of 2180 1492 nvsys86.exe 84 PID 1572 set thread context of 2444 1572 nvsys86.exe 95 PID 2648 set thread context of 2744 2648 nvsys86.exe 110 PID 1856 set thread context of 580 1856 nvsys86.exe 115 PID 2096 set thread context of 940 2096 nvsys86.exe 127 PID 1584 set thread context of 2984 1584 nvsys86.exe 145 PID 2604 set thread context of 1564 2604 nvsys86.exe 151 PID 2608 set thread context of 2456 2608 nvsys86.exe 490 PID 1912 set thread context of 1364 1912 nvsys86.exe 182 PID 760 set thread context of 1284 760 nvsys86.exe 193 PID 1736 set thread context of 1520 1736 nvsys86.exe 404 PID 592 set thread context of 3036 592 nvsys86.exe 211 PID 2432 set thread context of 2528 2432 nvsys86.exe 230 PID 2512 set thread context of 2756 2512 nvsys86.exe 1119 PID 1752 set thread context of 1860 1752 nvsys86.exe 902 PID 2936 set thread context of 1140 2936 nvsys86.exe 1001 PID 2616 set thread context of 2904 2616 nvsys86.exe 1079 PID 1576 set thread context of 2624 1576 nvsys86.exe 283 PID 2440 set thread context of 2652 2440 nvsys86.exe 1046 PID 2220 set thread context of 948 2220 nvsys86.exe 312 PID 2876 set thread context of 2396 2876 nvsys86.exe 1427 PID 2016 set thread context of 2164 2016 nvsys86.exe 336 PID 1732 set thread context of 548 1732 nvsys86.exe 1491 PID 2432 set thread context of 2948 2432 nvsys86.exe 360 PID 2552 set thread context of 2720 2552 nvsys86.exe 375 PID 856 set thread context of 1804 856 nvsys86.exe 387 PID 1808 set thread context of 1584 1808 nvsys86.exe 1724 PID 2516 set thread context of 1556 2516 nvsys86.exe 1919 PID 2124 set thread context of 1964 2124 nvsys86.exe 419 PID 280 set thread context of 2544 280 nvsys86.exe 1908 PID 2728 set thread context of 2724 2728 nvsys86.exe 442 PID 2384 set thread context of 1912 2384 nvsys86.exe 1352 PID 2288 set thread context of 2832 2288 nvsys86.exe 2314 PID 2428 set thread context of 2648 2428 nvsys86.exe 1461 PID 2236 set thread context of 2668 2236 nvsys86.exe 2359 PID 2336 set thread context of 2936 2336 nvsys86.exe 518 PID 2820 set thread context of 2792 2820 nvsys86.exe 523 PID 1236 set thread context of 2312 1236 nvsys86.exe 2156 PID 2748 set thread context of 2816 2748 nvsys86.exe 553 PID 2564 set thread context of 2736 2564 nvsys86.exe 2653 PID 1600 set thread context of 2668 1600 nvsys86.exe 2835 PID 1480 set thread context of 2692 1480 nvsys86.exe 2274 PID 3060 set thread context of 2520 3060 nvsys86.exe 2662 PID 1220 set thread context of 1936 1220 nvsys86.exe 612 PID 2468 set thread context of 2328 2468 nvsys86.exe 3016 PID 2140 set thread context of 1788 2140 nvsys86.exe 636 PID 1860 set thread context of 2668 1860 nvsys86.exe 2835 PID 1652 set thread context of 1592 1652 nvsys86.exe 655 PID 2640 set thread context of 1700 2640 nvsys86.exe 3268 PID 1472 set thread context of 2972 1472 nvsys86.exe 3154 PID 2532 set thread context of 1616 2532 nvsys86.exe 3376 PID 3048 set thread context of 1860 3048 nvsys86.exe 3441 PID 988 set thread context of 2116 988 nvsys86.exe 3508 PID 760 set thread context of 2420 760 nvsys86.exe 1620 PID 2408 set thread context of 1232 2408 nvsys86.exe 745 PID 2796 set thread context of 608 2796 nvsys86.exe 1147 PID 1772 set thread context of 2152 1772 nvsys86.exe 3733 PID 896 set thread context of 2616 896 nvsys86.exe 1096 PID 2540 set thread context of 2200 2540 nvsys86.exe 792 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2600 nvsys86.exe Token: SeIncBasePriorityPrivilege 2752 nvsys86.exe Token: SeIncBasePriorityPrivilege 492 nvsys86.exe Token: SeIncBasePriorityPrivilege 2040 nvsys86.exe Token: SeIncBasePriorityPrivilege 2180 nvsys86.exe Token: SeIncBasePriorityPrivilege 2444 nvsys86.exe Token: SeIncBasePriorityPrivilege 2744 nvsys86.exe Token: SeIncBasePriorityPrivilege 580 nvsys86.exe Token: SeIncBasePriorityPrivilege 940 nvsys86.exe Token: SeIncBasePriorityPrivilege 2984 nvsys86.exe Token: SeIncBasePriorityPrivilege 1564 nvsys86.exe Token: SeIncBasePriorityPrivilege 2456 nvsys86.exe Token: SeIncBasePriorityPrivilege 1364 nvsys86.exe Token: SeIncBasePriorityPrivilege 1284 nvsys86.exe Token: SeIncBasePriorityPrivilege 1520 nvsys86.exe Token: SeIncBasePriorityPrivilege 3036 nvsys86.exe Token: SeIncBasePriorityPrivilege 2528 nvsys86.exe Token: SeIncBasePriorityPrivilege 2756 nvsys86.exe Token: SeIncBasePriorityPrivilege 1860 nvsys86.exe Token: SeIncBasePriorityPrivilege 1140 nvsys86.exe Token: SeIncBasePriorityPrivilege 2904 nvsys86.exe Token: SeIncBasePriorityPrivilege 2624 nvsys86.exe Token: SeIncBasePriorityPrivilege 2652 nvsys86.exe Token: SeIncBasePriorityPrivilege 948 nvsys86.exe Token: SeIncBasePriorityPrivilege 2396 nvsys86.exe Token: SeIncBasePriorityPrivilege 2164 nvsys86.exe Token: SeIncBasePriorityPrivilege 548 nvsys86.exe Token: SeIncBasePriorityPrivilege 2948 nvsys86.exe Token: SeIncBasePriorityPrivilege 2720 nvsys86.exe Token: SeIncBasePriorityPrivilege 1804 nvsys86.exe Token: SeIncBasePriorityPrivilege 1584 nvsys86.exe Token: SeIncBasePriorityPrivilege 1556 nvsys86.exe Token: SeIncBasePriorityPrivilege 1964 nvsys86.exe Token: SeIncBasePriorityPrivilege 2544 nvsys86.exe Token: SeIncBasePriorityPrivilege 2724 nvsys86.exe Token: SeIncBasePriorityPrivilege 1912 nvsys86.exe Token: SeIncBasePriorityPrivilege 2832 nvsys86.exe Token: SeIncBasePriorityPrivilege 2328 nvsys86.exe Token: SeIncBasePriorityPrivilege 2648 nvsys86.exe Token: SeIncBasePriorityPrivilege 2668 nvsys86.exe Token: SeIncBasePriorityPrivilege 2936 nvsys86.exe Token: SeIncBasePriorityPrivilege 2792 nvsys86.exe Token: SeIncBasePriorityPrivilege 2312 nvsys86.exe Token: SeIncBasePriorityPrivilege 2816 nvsys86.exe Token: SeIncBasePriorityPrivilege 2736 nvsys86.exe Token: SeIncBasePriorityPrivilege 2668 nvsys86.exe Token: SeIncBasePriorityPrivilege 2692 nvsys86.exe Token: SeIncBasePriorityPrivilege 2520 nvsys86.exe Token: SeIncBasePriorityPrivilege 1936 nvsys86.exe Token: SeIncBasePriorityPrivilege 2328 nvsys86.exe Token: SeIncBasePriorityPrivilege 1788 nvsys86.exe Token: SeIncBasePriorityPrivilege 2668 nvsys86.exe Token: SeIncBasePriorityPrivilege 1592 nvsys86.exe Token: SeIncBasePriorityPrivilege 2972 nvsys86.exe Token: SeIncBasePriorityPrivilege 1616 nvsys86.exe Token: SeIncBasePriorityPrivilege 1860 nvsys86.exe Token: SeIncBasePriorityPrivilege 2116 nvsys86.exe Token: SeIncBasePriorityPrivilege 2420 nvsys86.exe Token: SeIncBasePriorityPrivilege 1232 nvsys86.exe Token: SeIncBasePriorityPrivilege 608 nvsys86.exe Token: SeIncBasePriorityPrivilege 2152 nvsys86.exe Token: SeIncBasePriorityPrivilege 2616 nvsys86.exe Token: SeIncBasePriorityPrivilege 2200 nvsys86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 656 wrote to memory of 2368 656 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1408 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1408 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1408 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1408 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2448 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2448 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2448 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 31 PID 2368 wrote to memory of 2448 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 31 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 2368 wrote to memory of 2436 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2436 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2436 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 33 PID 2368 wrote to memory of 2436 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 33 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 1408 wrote to memory of 2600 1408 nvsys86.exe 32 PID 2368 wrote to memory of 2412 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 34 PID 2368 wrote to memory of 2412 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 34 PID 2368 wrote to memory of 2412 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 34 PID 2368 wrote to memory of 2412 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 34 PID 2368 wrote to memory of 2176 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 35 PID 2368 wrote to memory of 2176 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 35 PID 2368 wrote to memory of 2176 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 35 PID 2368 wrote to memory of 2176 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 35 PID 2368 wrote to memory of 2892 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 36 PID 2368 wrote to memory of 2892 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 36 PID 2368 wrote to memory of 2892 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 36 PID 2368 wrote to memory of 2892 2368 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 36 PID 2600 wrote to memory of 2736 2600 nvsys86.exe 106 PID 2600 wrote to memory of 2736 2600 nvsys86.exe 106 PID 2600 wrote to memory of 2736 2600 nvsys86.exe 106 PID 2600 wrote to memory of 2736 2600 nvsys86.exe 106 PID 2736 wrote to memory of 2752 2736 nvsys86.exe 43 PID 2736 wrote to memory of 2752 2736 nvsys86.exe 43 PID 2736 wrote to memory of 2752 2736 nvsys86.exe 43 PID 2736 wrote to memory of 2752 2736 nvsys86.exe 43 PID 2600 wrote to memory of 680 2600 nvsys86.exe 44 PID 2600 wrote to memory of 680 2600 nvsys86.exe 44 PID 2600 wrote to memory of 680 2600 nvsys86.exe 44 PID 2600 wrote to memory of 680 2600 nvsys86.exe 44 PID 2600 wrote to memory of 580 2600 nvsys86.exe 115 PID 2600 wrote to memory of 580 2600 nvsys86.exe 115 PID 2600 wrote to memory of 580 2600 nvsys86.exe 115 PID 2600 wrote to memory of 580 2600 nvsys86.exe 115 PID 2600 wrote to memory of 1448 2600 nvsys86.exe 46 PID 2600 wrote to memory of 1448 2600 nvsys86.exe 46 PID 2600 wrote to memory of 1448 2600 nvsys86.exe 46 PID 2600 wrote to memory of 1448 2600 nvsys86.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1688 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"8⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:492 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2224 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"10⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1572 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"14⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2444 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2648 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1856 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:580 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2096 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1584 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"22⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2604 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2608 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"26⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1912 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1364 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:760 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"30⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1736 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"32⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:592 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3036 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2432 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"36⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2512 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1752 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"40⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2936 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"42⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1140 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2616 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"44⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2904 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1576 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"46⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2624 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2440 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"48⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2652 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2220 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"50⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2876 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"52⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2016 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"54⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2164 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1732 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"56⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2432 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"58⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2948 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2552 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"60⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:856 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"62⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1808 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1584 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2516 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"66⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"67⤵
- Suspicious use of SetThreadContext
PID:2124 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"68⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"69⤵
- Suspicious use of SetThreadContext
PID:280 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"70⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"71⤵
- Suspicious use of SetThreadContext
PID:2728 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"72⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2724 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"73⤵
- Suspicious use of SetThreadContext
PID:2384 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"74⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"75⤵
- Suspicious use of SetThreadContext
PID:2288 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"76⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"77⤵PID:1700
-
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"78⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"79⤵
- Suspicious use of SetThreadContext
PID:2428 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"80⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"81⤵
- Suspicious use of SetThreadContext
PID:2236 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"82⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"83⤵
- Suspicious use of SetThreadContext
PID:2336 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"84⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"85⤵
- Suspicious use of SetThreadContext
PID:2820 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"86⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"87⤵
- Suspicious use of SetThreadContext
PID:1236 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"88⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"89⤵
- Suspicious use of SetThreadContext
PID:2748 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"90⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"91⤵
- Suspicious use of SetThreadContext
PID:2564 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"92⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"93⤵
- Suspicious use of SetThreadContext
PID:1600 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"94⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"95⤵
- Suspicious use of SetThreadContext
PID:1480 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"96⤵
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"97⤵
- Suspicious use of SetThreadContext
PID:3060 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"98⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"99⤵
- Suspicious use of SetThreadContext
PID:1220 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"100⤵
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"101⤵
- Suspicious use of SetThreadContext
PID:2468 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"102⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"103⤵
- Suspicious use of SetThreadContext
PID:2140 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"104⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"105⤵
- Suspicious use of SetThreadContext
PID:1860 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"106⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"107⤵
- Suspicious use of SetThreadContext
PID:1652 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"108⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"109⤵
- Suspicious use of SetThreadContext
PID:2640 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"110⤵
- Adds Run key to start application
PID:1700 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"111⤵
- Suspicious use of SetThreadContext
PID:1472 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"112⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"113⤵
- Suspicious use of SetThreadContext
PID:2532 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"114⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"115⤵
- Suspicious use of SetThreadContext
PID:3048 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"116⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"117⤵
- Suspicious use of SetThreadContext
PID:988 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"118⤵
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"119⤵
- Suspicious use of SetThreadContext
PID:760 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"120⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2420 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"121⤵
- Suspicious use of SetThreadContext
PID:2408 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"122⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-