Analysis
-
max time kernel
48s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
52ebe6ea13495b632846ee7786611380N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
52ebe6ea13495b632846ee7786611380N.exe
Resource
win10v2004-20240730-en
General
-
Target
52ebe6ea13495b632846ee7786611380N.exe
-
Size
78KB
-
MD5
52ebe6ea13495b632846ee7786611380
-
SHA1
a303e5f018ca0003b6f3e97926ba20b50878b204
-
SHA256
162fbe207503a9d87a3f0719c3d216a9aff3a36f26808118ff2647fbbc3639f4
-
SHA512
59098ea7978a251342296dcc7d9bd1a4c4c64fad87e529f96df998f95160234696be9d75fa86525a78a0084ed8a0a6176e42a22dba545677a751879167acbfa5
-
SSDEEP
1536:6zfMMkqZPUMRsNFljx5sGOgMsqPhd976zdNE6ecbe1wA2sAVz2:AfMibQPj7Msq5j5cUwAZ4S
Malware Config
Signatures
-
Executes dropped EXE 59 IoCs
pid Process 2816 Sysqempdtns.exe 2648 Sysqemqyeyt.exe 2612 Sysqemfnnqh.exe 1704 Sysqemerxlp.exe 1568 Sysqemxfjye.exe 2600 Sysqemebstj.exe 1740 Sysqemfshtb.exe 1744 Sysqemhkxge.exe 2384 Sysqemycirm.exe 2516 Sysqempqgej.exe 820 Sysqemjpxsg.exe 800 Sysqemrvghe.exe 1592 Sysqemjzusf.exe 1052 Sysqemxloix.exe 652 Sysqemmxunb.exe 2832 Sysqemepgvu.exe 2644 Sysqemtteay.exe 760 Sysqemuwfbm.exe 916 Sysqemrlmbf.exe 2312 Sysqemgbwln.exe 2188 Sysqemipyoi.exe 2904 Sysqemujnoo.exe 2504 Sysqemjgotm.exe 2196 Sysqemvtemt.exe 1976 Sysqemcqprx.exe 1740 Sysqemzutjd.exe 3056 Sysqemtajeg.exe 896 Sysqemlwyhc.exe 1028 Sysqemmrwcj.exe 1140 Sysqemoqmfb.exe 1600 Sysqemgflux.exe 2204 Sysqemlgtpo.exe 2000 Sysqemujksd.exe 768 Sysqemhsnfg.exe 652 Sysqemlyift.exe 2952 Sysqemsncvy.exe 2240 Sysqembtddq.exe 1184 Sysqemlwclr.exe 916 Sysqemvstgy.exe 2060 Sysqemuzres.exe 2188 Sysqemtvmtj.exe 2472 Sysqemnmdgf.exe 1744 Sysqemxafjp.exe 2196 Sysqemlmhzh.exe 1916 Sysqemkjupy.exe 1560 Sysqemifnui.exe 3056 Sysqempfcfw.exe 1512 Sysqemgqwfj.exe 1028 Sysqemipdvh.exe 1140 Sysqemrzydn.exe 1800 Sysqemrooaf.exe 2840 Sysqemtqoiz.exe 2712 Sysqemaqltf.exe 2752 Sysqemruivj.exe 2980 Sysqemiivla.exe 2496 Sysqemhtfow.exe 1904 Sysqemkalzd.exe 2432 Sysqemtvkmn.exe 1532 Sysqemvjnoi.exe -
Loads dropped DLL 64 IoCs
pid Process 2524 52ebe6ea13495b632846ee7786611380N.exe 2524 52ebe6ea13495b632846ee7786611380N.exe 2816 Sysqempdtns.exe 2816 Sysqempdtns.exe 2648 Sysqemqyeyt.exe 2648 Sysqemqyeyt.exe 2612 Sysqemfnnqh.exe 2612 Sysqemfnnqh.exe 1704 Sysqemerxlp.exe 1704 Sysqemerxlp.exe 1568 Sysqemxfjye.exe 1568 Sysqemxfjye.exe 2600 Sysqemebstj.exe 2600 Sysqemebstj.exe 1740 Sysqemfshtb.exe 1740 Sysqemfshtb.exe 1744 Sysqemhkxge.exe 1744 Sysqemhkxge.exe 2384 Sysqemycirm.exe 2384 Sysqemycirm.exe 2516 Sysqempqgej.exe 2516 Sysqempqgej.exe 820 Sysqemjpxsg.exe 820 Sysqemjpxsg.exe 800 Sysqemrvghe.exe 800 Sysqemrvghe.exe 1592 Sysqemjzusf.exe 1592 Sysqemjzusf.exe 1052 Sysqemxloix.exe 1052 Sysqemxloix.exe 652 Sysqemmxunb.exe 652 Sysqemmxunb.exe 2832 Sysqemepgvu.exe 2832 Sysqemepgvu.exe 2644 Sysqemtteay.exe 2644 Sysqemtteay.exe 760 Sysqemuwfbm.exe 760 Sysqemuwfbm.exe 916 Sysqemrlmbf.exe 916 Sysqemrlmbf.exe 2312 Sysqemgbwln.exe 2312 Sysqemgbwln.exe 2188 Sysqemipyoi.exe 2188 Sysqemipyoi.exe 2904 Sysqemujnoo.exe 2904 Sysqemujnoo.exe 2504 Sysqemjgotm.exe 2504 Sysqemjgotm.exe 2196 Sysqemvtemt.exe 2196 Sysqemvtemt.exe 1976 Sysqemcqprx.exe 1976 Sysqemcqprx.exe 1740 Sysqemzutjd.exe 1740 Sysqemzutjd.exe 3056 Sysqemtajeg.exe 3056 Sysqemtajeg.exe 896 Sysqemlwyhc.exe 896 Sysqemlwyhc.exe 1028 Sysqemmrwcj.exe 1028 Sysqemmrwcj.exe 1140 Sysqemoqmfb.exe 1140 Sysqemoqmfb.exe 1600 Sysqemgflux.exe 1600 Sysqemgflux.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 60 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlmhzh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrzydn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkalzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52ebe6ea13495b632846ee7786611380N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemnmdgf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtvmtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempdtns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemipyoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxloix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmxunb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlwyhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgqwfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemaqltf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhtfow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfnnqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemfshtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvjnoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvtemt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemqyeyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemerxlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemkjupy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrooaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgbwln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuzres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxafjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemebstj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemuwfbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjpxsg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempqgej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtvkmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqempfcfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtteay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemcqprx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemiivla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhkxge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrvghe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemoqmfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqembtddq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemvstgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemxfjye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemzutjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlgtpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemujksd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlyift.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemsncvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemruivj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemrlmbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjgotm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemhsnfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemlwclr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemipdvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemjzusf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtajeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemujnoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemmrwcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemgflux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemifnui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemtqoiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemycirm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysqemepgvu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2816 2524 52ebe6ea13495b632846ee7786611380N.exe 29 PID 2524 wrote to memory of 2816 2524 52ebe6ea13495b632846ee7786611380N.exe 29 PID 2524 wrote to memory of 2816 2524 52ebe6ea13495b632846ee7786611380N.exe 29 PID 2524 wrote to memory of 2816 2524 52ebe6ea13495b632846ee7786611380N.exe 29 PID 2816 wrote to memory of 2648 2816 Sysqempdtns.exe 30 PID 2816 wrote to memory of 2648 2816 Sysqempdtns.exe 30 PID 2816 wrote to memory of 2648 2816 Sysqempdtns.exe 30 PID 2816 wrote to memory of 2648 2816 Sysqempdtns.exe 30 PID 2648 wrote to memory of 2612 2648 Sysqemqyeyt.exe 31 PID 2648 wrote to memory of 2612 2648 Sysqemqyeyt.exe 31 PID 2648 wrote to memory of 2612 2648 Sysqemqyeyt.exe 31 PID 2648 wrote to memory of 2612 2648 Sysqemqyeyt.exe 31 PID 2612 wrote to memory of 1704 2612 Sysqemfnnqh.exe 32 PID 2612 wrote to memory of 1704 2612 Sysqemfnnqh.exe 32 PID 2612 wrote to memory of 1704 2612 Sysqemfnnqh.exe 32 PID 2612 wrote to memory of 1704 2612 Sysqemfnnqh.exe 32 PID 1704 wrote to memory of 1568 1704 Sysqemerxlp.exe 33 PID 1704 wrote to memory of 1568 1704 Sysqemerxlp.exe 33 PID 1704 wrote to memory of 1568 1704 Sysqemerxlp.exe 33 PID 1704 wrote to memory of 1568 1704 Sysqemerxlp.exe 33 PID 1568 wrote to memory of 2600 1568 Sysqemxfjye.exe 34 PID 1568 wrote to memory of 2600 1568 Sysqemxfjye.exe 34 PID 1568 wrote to memory of 2600 1568 Sysqemxfjye.exe 34 PID 1568 wrote to memory of 2600 1568 Sysqemxfjye.exe 34 PID 2600 wrote to memory of 1740 2600 Sysqemebstj.exe 35 PID 2600 wrote to memory of 1740 2600 Sysqemebstj.exe 35 PID 2600 wrote to memory of 1740 2600 Sysqemebstj.exe 35 PID 2600 wrote to memory of 1740 2600 Sysqemebstj.exe 35 PID 1740 wrote to memory of 1744 1740 Sysqemfshtb.exe 36 PID 1740 wrote to memory of 1744 1740 Sysqemfshtb.exe 36 PID 1740 wrote to memory of 1744 1740 Sysqemfshtb.exe 36 PID 1740 wrote to memory of 1744 1740 Sysqemfshtb.exe 36 PID 1744 wrote to memory of 2384 1744 Sysqemhkxge.exe 37 PID 1744 wrote to memory of 2384 1744 Sysqemhkxge.exe 37 PID 1744 wrote to memory of 2384 1744 Sysqemhkxge.exe 37 PID 1744 wrote to memory of 2384 1744 Sysqemhkxge.exe 37 PID 2384 wrote to memory of 2516 2384 Sysqemycirm.exe 38 PID 2384 wrote to memory of 2516 2384 Sysqemycirm.exe 38 PID 2384 wrote to memory of 2516 2384 Sysqemycirm.exe 38 PID 2384 wrote to memory of 2516 2384 Sysqemycirm.exe 38 PID 2516 wrote to memory of 820 2516 Sysqempqgej.exe 39 PID 2516 wrote to memory of 820 2516 Sysqempqgej.exe 39 PID 2516 wrote to memory of 820 2516 Sysqempqgej.exe 39 PID 2516 wrote to memory of 820 2516 Sysqempqgej.exe 39 PID 820 wrote to memory of 800 820 Sysqemjpxsg.exe 40 PID 820 wrote to memory of 800 820 Sysqemjpxsg.exe 40 PID 820 wrote to memory of 800 820 Sysqemjpxsg.exe 40 PID 820 wrote to memory of 800 820 Sysqemjpxsg.exe 40 PID 800 wrote to memory of 1592 800 Sysqemrvghe.exe 41 PID 800 wrote to memory of 1592 800 Sysqemrvghe.exe 41 PID 800 wrote to memory of 1592 800 Sysqemrvghe.exe 41 PID 800 wrote to memory of 1592 800 Sysqemrvghe.exe 41 PID 1592 wrote to memory of 1052 1592 Sysqemjzusf.exe 42 PID 1592 wrote to memory of 1052 1592 Sysqemjzusf.exe 42 PID 1592 wrote to memory of 1052 1592 Sysqemjzusf.exe 42 PID 1592 wrote to memory of 1052 1592 Sysqemjzusf.exe 42 PID 1052 wrote to memory of 652 1052 Sysqemxloix.exe 63 PID 1052 wrote to memory of 652 1052 Sysqemxloix.exe 63 PID 1052 wrote to memory of 652 1052 Sysqemxloix.exe 63 PID 1052 wrote to memory of 652 1052 Sysqemxloix.exe 63 PID 652 wrote to memory of 2832 652 Sysqemmxunb.exe 44 PID 652 wrote to memory of 2832 652 Sysqemmxunb.exe 44 PID 652 wrote to memory of 2832 652 Sysqemmxunb.exe 44 PID 652 wrote to memory of 2832 652 Sysqemmxunb.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\52ebe6ea13495b632846ee7786611380N.exe"C:\Users\Admin\AppData\Local\Temp\52ebe6ea13495b632846ee7786611380N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdtns.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdtns.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqyeyt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqyeyt.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfnnqh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfnnqh.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemerxlp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemerxlp.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxfjye.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxfjye.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemebstj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemebstj.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfshtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfshtb.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhkxge.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkxge.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemycirm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemycirm.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Sysqempqgej.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqgej.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjpxsg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjpxsg.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrvghe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvghe.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjzusf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjzusf.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxloix.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxloix.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmxunb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmxunb.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemepgvu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemepgvu.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtteay.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtteay.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuwfbm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuwfbm.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrlmbf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrlmbf.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgbwln.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgbwln.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemipyoi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemipyoi.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemujnoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemujnoo.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgotm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgotm.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvtemt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvtemt.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcqprx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcqprx.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzutjd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzutjd.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtajeg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtajeg.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwyhc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwyhc.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmrwcj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmrwcj.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoqmfb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqmfb.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgflux.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgflux.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlgtpo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlgtpo.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Sysqemujksd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemujksd.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhsnfg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhsnfg.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlyift.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlyift.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsncvy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsncvy.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Sysqembtddq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembtddq.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlwclr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwclr.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvstgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvstgy.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuzres.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuzres.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvmtj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvmtj.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnmdgf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnmdgf.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxafjp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxafjp.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlmhzh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlmhzh.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkjupy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkjupy.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Sysqemifnui.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemifnui.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Sysqempfcfw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempfcfw.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqwfj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqwfj.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemipdvh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemipdvh.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrzydn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrzydn.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrooaf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrooaf.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtqoiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtqoiz.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Sysqemaqltf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemaqltf.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Sysqemruivj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemruivj.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiivla.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiivla.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtfow.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtfow.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkalzd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkalzd.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtvkmn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtvkmn.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvjnoi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvjnoi.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Sysqemszvhd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemszvhd.exe"61⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemcnejm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcnejm.exe"62⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\Sysqemirnrx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemirnrx.exe"63⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsudhw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsudhw.exe"64⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjxqua.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjxqua.exe"65⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtlsxb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtlsxb.exe"66⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfcvke.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfcvke.exe"67⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxjvij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxjvij.exe"68⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgeuvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgeuvs.exe"69⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsdkqv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsdkqv.exe"70⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwanac.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwanac.exe"71⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Sysqembcwvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembcwvs.exe"72⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Sysqemctldk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemctldk.exe"73⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemirily.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemirily.exe"74⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmswji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmswji.exe"75⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfuzji.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfuzji.exe"76⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\Sysqemommjo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemommjo.exe"77⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrttud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrttud.exe"78⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqwlpt.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwlpt.exe"79⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Sysqempsxmq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempsxmq.exe"80⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrvqud.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrvqud.exe"81⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Sysqemowihg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemowihg.exe"82⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Sysqemfsxcc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfsxcc.exe"83⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\Sysqemijxsu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijxsu.exe"84⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoovps.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoovps.exe"85⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Sysqemqbysn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqbysn.exe"86⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Sysqempytim.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempytim.exe"87⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsehsb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsehsb.exe"88⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmvyfy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmvyfy.exe"89⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Sysqemoqbit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoqbit.exe"90⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhkeit.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhkeit.exe"91⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\Sysqemryflv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemryflv.exe"92⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdikqz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdikqz.exe"93⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyoalu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyoalu.exe"94⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Sysqemormgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemormgd.exe"95⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmlitu.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmlitu.exe"96⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Sysqemyulow.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyulow.exe"97⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtatjz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtatjz.exe"98⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiezod.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiezod.exe"99⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Sysqemwftum.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwftum.exe"100⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\Sysqemljqze.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemljqze.exe"101⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Sysqemiolrl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiolrl.exe"102⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhhvuz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhhvuz.exe"103⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\Sysqembypxw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembypxw.exe"104⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgwrxj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgwrxj.exe"105⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\Sysqemijvky.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemijvky.exe"106⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Sysqemjbksq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjbksq.exe"107⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeslvn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeslvn.exe"108⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgueda.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgueda.exe"109⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Sysqemitssy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemitssy.exe"110⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\Sysqempqdqj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempqdqj.exe"111⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\Sysqemmgkqc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmgkqc.exe"112⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Sysqemejybe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemejybe.exe"113⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgebdz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgebdz.exe"114⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxayyv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxayyv.exe"115⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrgoby.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrgoby.exe"116⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtbfwn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtbfwn.exe"117⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Sysqemikzoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemikzoo.exe"118⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Sysqemxogml.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxogml.exe"119⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzbiog.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzbiog.exe"120⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\Sysqemswmza.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemswmza.exe"121⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Sysqemugdws.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugdws.exe"122⤵PID:1488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-