Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 23:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
8 signatures
150 seconds
General
-
Target
5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe
-
Size
108KB
-
MD5
5e24f784ead0aacf1a086123d366de4c
-
SHA1
a92fb961ce46c15870177a3b175fa849be0bf11c
-
SHA256
d65d4e139df9c545dffc30e140a60cdce59af0e05a68deba1887abcd5fb8e8ce
-
SHA512
34186500b29d06dad5465d633d201b6e540c4a1b0fd9a7ea163329f219be4c892b64c3a65d6e77fba5b64d9050ba29c57bd72f07a081c456b2b830aa644e2014
-
SSDEEP
768:w7rgnvQjX4KPcAmigvO2B/fJPSysbX2uraeVE65ITnOdqv/q7rgnvQjXMf1DYM8k:w7rA6XbBy8hVrISkv/q7rA6XM1OVf
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4604 net.net 4060 net.net 2220 net.net 3520 net.net 1680 net.net 3696 net.net 460 net.net 620 net.net 3988 net.net 184 net.net 3260 net.net 1828 net.net 1800 net.net 4928 net.net 1440 net.net 1512 net.net 3180 net.net 2240 net.net 4416 net.net 4008 net.net 4804 net.net 3612 net.net 212 net.net 1132 net.net 384 net.net 1856 net.net 1852 net.net 2372 net.net 2456 net.net 4000 net.net 1724 net.net 3512 net.net 4828 net.net 3848 net.net 1752 net.net 4288 net.net 2816 net.net 3328 net.net 3400 net.net 4528 net.net 4816 net.net 1328 net.net 4448 net.net 2964 net.net 4936 net.net 3336 net.net 2152 net.net 1876 net.net 3016 net.net 2288 net.net 3932 net.net 2720 net.net 2404 net.net 692 net.net 636 net.net 4976 net.net 2580 net.net 2900 net.net 3068 net.net 4008 net.net 2456 net.net 2760 net.net 3372 net.net 744 net.net -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA net.net -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\net.net 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\net.net 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 4816 PING.EXE 3032 PING.EXE 464 PING.EXE 224 PING.EXE 1756 PING.EXE 4812 PING.EXE 1496 PING.EXE 3608 PING.EXE 428 PING.EXE 1892 PING.EXE 3588 PING.EXE 392 PING.EXE 2096 PING.EXE 4792 PING.EXE 5092 PING.EXE 2692 PING.EXE 4804 PING.EXE 1136 PING.EXE 4528 PING.EXE 3740 PING.EXE 736 PING.EXE 804 PING.EXE 3360 PING.EXE 4888 PING.EXE 2196 PING.EXE 2948 PING.EXE 2624 PING.EXE 4132 PING.EXE 4008 PING.EXE 1356 PING.EXE 4436 PING.EXE 2080 PING.EXE 4596 PING.EXE 2712 PING.EXE 4576 PING.EXE 3636 PING.EXE 4328 PING.EXE 3744 PING.EXE 4936 PING.EXE 1524 PING.EXE 3392 PING.EXE 1564 PING.EXE 4988 PING.EXE 3080 PING.EXE 4692 PING.EXE 2140 PING.EXE 3360 PING.EXE 1652 PING.EXE 900 PING.EXE 1888 PING.EXE 3940 PING.EXE 3136 PING.EXE 1828 PING.EXE 756 PING.EXE 4604 PING.EXE 392 PING.EXE 4456 PING.EXE 4416 PING.EXE 2872 PING.EXE 2664 PING.EXE 5052 PING.EXE 4976 PING.EXE 2456 PING.EXE 2904 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5100 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 5100 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 4604 net.net 4604 net.net 4060 net.net 4060 net.net 2220 net.net 2220 net.net 3520 net.net 3520 net.net 1680 net.net 1680 net.net 3696 net.net 3696 net.net 460 net.net 460 net.net 620 net.net 620 net.net 3988 net.net 3988 net.net 184 net.net 184 net.net 3260 net.net 3260 net.net 1828 net.net 1828 net.net 1800 net.net 1800 net.net 4928 net.net 4928 net.net 1440 net.net 1440 net.net 1512 net.net 1512 net.net 3180 net.net 3180 net.net 2240 net.net 2240 net.net 4416 net.net 4416 net.net 4008 net.net 4008 net.net 4804 net.net 4804 net.net 3612 net.net 3612 net.net 212 net.net 212 net.net 1132 net.net 1132 net.net 384 net.net 384 net.net 1856 net.net 1856 net.net 1852 net.net 1852 net.net 2372 net.net 2372 net.net 2456 net.net 2456 net.net 4000 net.net 4000 net.net 1724 net.net 1724 net.net -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5100 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 5100 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 5100 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 4604 net.net 4604 net.net 4604 net.net 4060 net.net 4060 net.net 4060 net.net 2220 net.net 2220 net.net 2220 net.net 3520 net.net 3520 net.net 3520 net.net 1680 net.net 1680 net.net 1680 net.net 3696 net.net 3696 net.net 3696 net.net 460 net.net 460 net.net 460 net.net 620 net.net 620 net.net 620 net.net 3988 net.net 3988 net.net 3988 net.net 184 net.net 184 net.net 184 net.net 3260 net.net 3260 net.net 3260 net.net 1828 net.net 1828 net.net 1828 net.net 1800 net.net 1800 net.net 1800 net.net 4928 net.net 4928 net.net 4928 net.net 1440 net.net 1440 net.net 1440 net.net 1512 net.net 1512 net.net 1512 net.net 3180 net.net 3180 net.net 3180 net.net 2240 net.net 2240 net.net 2240 net.net 4416 net.net 4416 net.net 4416 net.net 4008 net.net 4008 net.net 4008 net.net 4804 net.net -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 1328 5100 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 84 PID 5100 wrote to memory of 1328 5100 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 84 PID 5100 wrote to memory of 1328 5100 5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe 84 PID 1328 wrote to memory of 3392 1328 cmd.exe 86 PID 1328 wrote to memory of 3392 1328 cmd.exe 86 PID 1328 wrote to memory of 3392 1328 cmd.exe 86 PID 1328 wrote to memory of 1840 1328 cmd.exe 90 PID 1328 wrote to memory of 1840 1328 cmd.exe 90 PID 1328 wrote to memory of 1840 1328 cmd.exe 90 PID 1840 wrote to memory of 4604 1840 cmd.exe 91 PID 1840 wrote to memory of 4604 1840 cmd.exe 91 PID 1840 wrote to memory of 4604 1840 cmd.exe 91 PID 4604 wrote to memory of 4648 4604 net.net 92 PID 4604 wrote to memory of 4648 4604 net.net 92 PID 4604 wrote to memory of 4648 4604 net.net 92 PID 4648 wrote to memory of 1892 4648 cmd.exe 94 PID 4648 wrote to memory of 1892 4648 cmd.exe 94 PID 4648 wrote to memory of 1892 4648 cmd.exe 94 PID 4648 wrote to memory of 3016 4648 cmd.exe 99 PID 4648 wrote to memory of 3016 4648 cmd.exe 99 PID 4648 wrote to memory of 3016 4648 cmd.exe 99 PID 3016 wrote to memory of 4060 3016 cmd.exe 100 PID 3016 wrote to memory of 4060 3016 cmd.exe 100 PID 3016 wrote to memory of 4060 3016 cmd.exe 100 PID 4060 wrote to memory of 3488 4060 net.net 101 PID 4060 wrote to memory of 3488 4060 net.net 101 PID 4060 wrote to memory of 3488 4060 net.net 101 PID 3488 wrote to memory of 1756 3488 cmd.exe 103 PID 3488 wrote to memory of 1756 3488 cmd.exe 103 PID 3488 wrote to memory of 1756 3488 cmd.exe 103 PID 3488 wrote to memory of 1888 3488 cmd.exe 104 PID 3488 wrote to memory of 1888 3488 cmd.exe 104 PID 3488 wrote to memory of 1888 3488 cmd.exe 104 PID 1888 wrote to memory of 2220 1888 cmd.exe 105 PID 1888 wrote to memory of 2220 1888 cmd.exe 105 PID 1888 wrote to memory of 2220 1888 cmd.exe 105 PID 2220 wrote to memory of 2816 2220 net.net 106 PID 2220 wrote to memory of 2816 2220 net.net 106 PID 2220 wrote to memory of 2816 2220 net.net 106 PID 2816 wrote to memory of 804 2816 cmd.exe 109 PID 2816 wrote to memory of 804 2816 cmd.exe 109 PID 2816 wrote to memory of 804 2816 cmd.exe 109 PID 2816 wrote to memory of 5092 2816 cmd.exe 110 PID 2816 wrote to memory of 5092 2816 cmd.exe 110 PID 2816 wrote to memory of 5092 2816 cmd.exe 110 PID 5092 wrote to memory of 3520 5092 cmd.exe 111 PID 5092 wrote to memory of 3520 5092 cmd.exe 111 PID 5092 wrote to memory of 3520 5092 cmd.exe 111 PID 3520 wrote to memory of 3000 3520 net.net 112 PID 3520 wrote to memory of 3000 3520 net.net 112 PID 3520 wrote to memory of 3000 3520 net.net 112 PID 3000 wrote to memory of 2712 3000 cmd.exe 114 PID 3000 wrote to memory of 2712 3000 cmd.exe 114 PID 3000 wrote to memory of 2712 3000 cmd.exe 114 PID 3000 wrote to memory of 3556 3000 cmd.exe 116 PID 3000 wrote to memory of 3556 3000 cmd.exe 116 PID 3000 wrote to memory of 3556 3000 cmd.exe 116 PID 3556 wrote to memory of 1680 3556 cmd.exe 117 PID 3556 wrote to memory of 1680 3556 cmd.exe 117 PID 3556 wrote to memory of 1680 3556 cmd.exe 117 PID 1680 wrote to memory of 5024 1680 net.net 118 PID 1680 wrote to memory of 5024 1680 net.net 118 PID 1680 wrote to memory of 5024 1680 net.net 118 PID 5024 wrote to memory of 2664 5024 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e24f784ead0aacf1a086123d366de4c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
PID:3392
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"3⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL5⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 36⤵
- Runs ping.exe
PID:1892
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"6⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL8⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 39⤵
- Runs ping.exe
PID:1756
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"9⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"10⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL11⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 312⤵
- Runs ping.exe
PID:804
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"12⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"13⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL14⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 315⤵
- Runs ping.exe
PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"15⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"16⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL17⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 318⤵
- Runs ping.exe
PID:2664
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"18⤵PID:392
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"19⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3696 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL20⤵PID:824
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 321⤵
- Runs ping.exe
PID:1564
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"21⤵PID:2624
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"22⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:460 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL23⤵PID:4660
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 324⤵
- Runs ping.exe
PID:4816
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"24⤵PID:4800
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"25⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:620 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL26⤵PID:3392
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 327⤵
- Runs ping.exe
PID:4976
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"27⤵PID:2248
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"28⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3988 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL29⤵PID:1856
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 330⤵
- Runs ping.exe
PID:3360
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"30⤵PID:4340
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"31⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:184 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL32⤵PID:4796
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 333⤵
- Runs ping.exe
PID:4812
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"33⤵PID:540
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"34⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3260 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL35⤵PID:3488
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 336⤵
- Runs ping.exe
PID:4576
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"36⤵PID:4416
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"37⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL38⤵PID:732
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 339⤵
- Runs ping.exe
PID:3032
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"39⤵PID:2720
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"40⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL41⤵PID:3000
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 342⤵
- Runs ping.exe
PID:1652
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"42⤵PID:5024
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"43⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4928 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL44⤵PID:3936
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 345⤵
- Runs ping.exe
PID:3636
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"45⤵PID:4596
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"46⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL47⤵PID:3968
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 348⤵
- Runs ping.exe
PID:2080
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"48⤵PID:1520
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"49⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL50⤵PID:4080
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 351⤵
- Runs ping.exe
PID:464
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"51⤵PID:4892
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"52⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3180 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL53⤵PID:5052
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 354⤵
- Runs ping.exe
PID:900
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"54⤵PID:4812
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"55⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL56⤵PID:3744
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 357⤵
- Runs ping.exe
PID:4692
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"57⤵PID:4576
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"58⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4416 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL59⤵PID:2840
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 360⤵
- Runs ping.exe
PID:1136
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"60⤵PID:3032
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"61⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4008 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL62⤵PID:1332
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 363⤵
- Runs ping.exe
PID:3588
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"63⤵PID:1800
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"64⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4804 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL65⤵PID:4068
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 366⤵
- Runs ping.exe
PID:4528
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"66⤵PID:1808
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"67⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3612 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL68⤵PID:2912
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 369⤵
- Runs ping.exe
PID:2948
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"69⤵PID:1564
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"70⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:212 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL71⤵PID:2392
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 372⤵
- Runs ping.exe
PID:2140
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"72⤵PID:4660
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"73⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL74⤵PID:3616
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 375⤵
- Runs ping.exe
PID:1496
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"75⤵PID:1840
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"76⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:384 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL77⤵PID:2032
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 378⤵
- Runs ping.exe
PID:4328
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"78⤵PID:4648
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"79⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL80⤵PID:2136
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 381⤵
- Runs ping.exe
PID:1888
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"81⤵PID:1380
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"82⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL83⤵PID:2844
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 384⤵
- Runs ping.exe
PID:3744
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"84⤵PID:4020
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"85⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL86⤵PID:1136
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 387⤵
- Runs ping.exe
PID:4936
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"87⤵PID:3440
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"88⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL89⤵PID:3844
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 390⤵
- Runs ping.exe
PID:392
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"90⤵PID:1372
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"91⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4000 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL92⤵PID:3784
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 393⤵
- Runs ping.exe
PID:4596
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"93⤵PID:2624
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"94⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL95⤵PID:5096
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 396⤵
- Runs ping.exe
PID:3940
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"96⤵PID:3740
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"97⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3512 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL98⤵PID:4032
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 399⤵
- Runs ping.exe
PID:4792
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"99⤵PID:1632
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"100⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4828 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL101⤵PID:3628
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3102⤵
- Runs ping.exe
PID:3360
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"102⤵PID:5060
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"103⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3848 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL104⤵PID:552
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3105⤵
- Runs ping.exe
PID:5052
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"105⤵PID:3988
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"106⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL107⤵PID:2332
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3108⤵
- Runs ping.exe
PID:224
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"108⤵PID:2596
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"109⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4288 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL110⤵PID:2320
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3111⤵
- Runs ping.exe
PID:4132
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"111⤵PID:2720
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"112⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL113⤵PID:4184
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3114⤵
- Runs ping.exe
PID:5092
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"114⤵PID:3932
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"115⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3328 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL116⤵PID:1760
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3117⤵PID:1676
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"117⤵PID:3500
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"118⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3400 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL119⤵PID:4388
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 3120⤵
- Runs ping.exe
PID:4456
-
-
C:\Windows\SysWOW64\cmd.execmd /c start "" "C:\Windows\system32\net.net"120⤵PID:2580
-
C:\Windows\SysWOW64\net.net"C:\Windows\system32\net.net"121⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4528 -
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 >> NUL && cmd /c start "" "C:\Windows\system32\net.net" >> NUL122⤵PID:3000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-