Analysis
-
max time kernel
116s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe
-
Size
6.1MB
-
MD5
b6996f1307bf63655e005fbd11665cab
-
SHA1
de837b07acd5f03db04ffe9b95cb2293dfa5c529
-
SHA256
88e2ce9606dee00f972a705a939bf3b1fdd5e6870757cd27f820efa00798432c
-
SHA512
83308f72939312279fec986609ff508a2936847a7339fdfa40a45a7d4494cda8503fb16428d550bef220839d2f4e788e3fe54b755ebb28968de74111ba5db8ab
-
SSDEEP
98304:8zsVLT0V6JYlrI4REFGsRNxqsMzC+IyK+zxYvM1djrUab1MZpr8hD8PF3admsR2l:8i9JQDENY9V+M3Ug0MNxo00AfW96m
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6000 2388 Process not Found 129 -
Modifies Windows Firewall 2 TTPs 64 IoCs
pid Process 5328 Process not Found 2464 Process not Found 880 netsh.exe 5284 netsh.exe 4848 netsh.exe 5360 Process not Found 5232 Process not Found 5132 Process not Found 3320 Process not Found 1884 netsh.exe 2528 netsh.exe 5148 Process not Found 6816 Process not Found 7084 Process not Found 6024 Process not Found 5200 Process not Found 1660 Process not Found 5156 Process not Found 6208 Process not Found 2876 netsh.exe 2120 netsh.exe 5612 Process not Found 5288 Process not Found 5232 Process not Found 4112 netsh.exe 4656 netsh.exe 3364 netsh.exe 5088 netsh.exe 2864 netsh.exe 6016 netsh.exe 5540 netsh.exe 4772 Process not Found 6716 Process not Found 6280 Process not Found 3312 Process not Found 5492 Process not Found 2296 Process not Found 2456 netsh.exe 1432 netsh.exe 5652 netsh.exe 4472 Process not Found 4732 Process not Found 5684 Process not Found 5776 Process not Found 5776 Process not Found 3192 netsh.exe 4112 netsh.exe 5196 netsh.exe 5708 netsh.exe 5616 Process not Found 4480 netsh.exe 2248 netsh.exe 2748 Process not Found 5804 Process not Found 6900 Process not Found 4640 netsh.exe 2528 netsh.exe 2036 netsh.exe 5828 netsh.exe 4524 netsh.exe 4684 netsh.exe 1564 netsh.exe 5696 netsh.exe 5492 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 2868 Fbot.exe 2192 Fbot.exe 2008 Install.exe 408 ri0t.exe 1588 ri0t.exe 3604 svchosts.exe 4508 ri0t.exe 4936 svchosts.exe 3708 ri0t.exe 4412 ri0t.exe 2752 ri0t.exe 2100 ri0t.exe 2868 ri0t.exe 3612 ri0t.exe 960 ri0t.exe 3568 ri0t.exe 1752 ri0t.exe 4528 ri0t.exe 4612 ri0t.exe 4784 ri0t.exe 5104 ri0t.exe 568 ri0t.exe 4368 ri0t.exe 1784 ri0t.exe 2472 ri0t.exe 2712 ri0t.exe 4608 ri0t.exe 3036 ri0t.exe 2380 ri0t.exe 1596 ri0t.exe 1236 ri0t.exe 4536 ri0t.exe 1800 ri0t.exe 2968 ri0t.exe 2552 ri0t.exe 3968 ri0t.exe 4552 ri0t.exe 1884 ri0t.exe 4308 ri0t.exe 864 ri0t.exe 4460 ri0t.exe 2700 ri0t.exe 888 ri0t.exe 2044 ri0t.exe 3752 ri0t.exe 4516 ri0t.exe 3568 ri0t.exe 2196 ri0t.exe 4428 ri0t.exe 5084 ri0t.exe 2520 ri0t.exe 2032 ri0t.exe 2704 ri0t.exe 4384 ri0t.exe 1992 ri0t.exe 1908 ri0t.exe 2456 ri0t.exe 2952 ri0t.exe 2152 ri0t.exe 1808 ri0t.exe 4400 ri0t.exe 3660 ri0t.exe 3552 ri0t.exe 1864 ri0t.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchosts.exe svchosts.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe svchosts.exe File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe svchosts.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe Process not Found File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe svchosts.exe File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe svchosts.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe Process not Found File created C:\Windows\SysWOW64\svchosts.exe Fbot.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe Fbot.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe Process not Found File created C:\Windows\SysWOW64\svchosts.exe Process not Found File created C:\Windows\SysWOW64\svchosts.exe Process not Found File created C:\Windows\SysWOW64\svchosts.exe Process not Found -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2868 set thread context of 2192 2868 Fbot.exe 90 PID 408 set thread context of 1588 408 ri0t.exe 92 PID 3604 set thread context of 4936 3604 svchosts.exe 96 PID 4508 set thread context of 3708 4508 ri0t.exe 97 PID 4412 set thread context of 2752 4412 ri0t.exe 102 PID 2100 set thread context of 2868 2100 ri0t.exe 105 PID 3612 set thread context of 960 3612 ri0t.exe 111 PID 3568 set thread context of 1752 3568 ri0t.exe 114 PID 4528 set thread context of 4612 4528 ri0t.exe 117 PID 4784 set thread context of 5104 4784 ri0t.exe 120 PID 568 set thread context of 4368 568 ri0t.exe 123 PID 1784 set thread context of 2472 1784 ri0t.exe 127 PID 2712 set thread context of 4608 2712 ri0t.exe 131 PID 3036 set thread context of 2380 3036 ri0t.exe 134 PID 1596 set thread context of 1236 1596 ri0t.exe 137 PID 4536 set thread context of 1800 4536 ri0t.exe 140 PID 2968 set thread context of 2552 2968 ri0t.exe 143 PID 3968 set thread context of 4552 3968 ri0t.exe 146 PID 1884 set thread context of 4308 1884 ri0t.exe 149 PID 864 set thread context of 4460 864 ri0t.exe 152 PID 2700 set thread context of 888 2700 ri0t.exe 155 PID 2044 set thread context of 3752 2044 ri0t.exe 158 PID 4516 set thread context of 3568 4516 ri0t.exe 161 PID 2196 set thread context of 4428 2196 ri0t.exe 164 PID 5084 set thread context of 2520 5084 ri0t.exe 167 PID 2032 set thread context of 2704 2032 ri0t.exe 171 PID 4384 set thread context of 1992 4384 ri0t.exe 174 PID 1908 set thread context of 2456 1908 ri0t.exe 177 PID 2952 set thread context of 2152 2952 ri0t.exe 180 PID 1808 set thread context of 4400 1808 ri0t.exe 183 PID 3660 set thread context of 3552 3660 ri0t.exe 186 PID 1864 set thread context of 2100 1864 ri0t.exe 189 PID 5088 set thread context of 3744 5088 ri0t.exe 192 PID 3668 set thread context of 4408 3668 ri0t.exe 195 PID 4212 set thread context of 1596 4212 ri0t.exe 198 PID 1988 set thread context of 4816 1988 ri0t.exe 201 PID 892 set thread context of 4664 892 ri0t.exe 204 PID 1240 set thread context of 944 1240 ri0t.exe 207 PID 2952 set thread context of 3616 2952 ri0t.exe 210 PID 1864 set thread context of 3232 1864 ri0t.exe 218 PID 2604 set thread context of 4360 2604 ri0t.exe 221 PID 736 set thread context of 4416 736 ri0t.exe 224 PID 4656 set thread context of 5052 4656 ri0t.exe 227 PID 2248 set thread context of 4488 2248 ri0t.exe 230 PID 4864 set thread context of 4052 4864 ri0t.exe 233 PID 2952 set thread context of 2096 2952 ri0t.exe 236 PID 3572 set thread context of 1092 3572 ri0t.exe 242 PID 380 set thread context of 2872 380 ri0t.exe 245 PID 3364 set thread context of 1932 3364 ri0t.exe 248 PID 1764 set thread context of 4164 1764 ri0t.exe 251 PID 2248 set thread context of 2612 2248 ri0t.exe 254 PID 2480 set thread context of 3836 2480 ri0t.exe 257 PID 4784 set thread context of 1784 4784 ri0t.exe 260 PID 1040 set thread context of 3920 1040 ri0t.exe 263 PID 2044 set thread context of 2600 2044 ri0t.exe 266 PID 380 set thread context of 4740 380 ri0t.exe 269 PID 2812 set thread context of 4524 2812 ri0t.exe 272 PID 3884 set thread context of 3492 3884 ri0t.exe 275 PID 2640 set thread context of 4684 2640 ri0t.exe 278 PID 2372 set thread context of 1172 2372 ri0t.exe 281 PID 384 set thread context of 5064 384 ri0t.exe 284 PID 5028 set thread context of 3464 5028 ri0t.exe 287 PID 3264 set thread context of 4500 3264 ri0t.exe 290 PID 568 set thread context of 2196 568 ri0t.exe 293 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ri0t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2868 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 88 PID 2196 wrote to memory of 2868 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 88 PID 2196 wrote to memory of 2868 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 88 PID 2868 wrote to memory of 2192 2868 Fbot.exe 90 PID 2868 wrote to memory of 2192 2868 Fbot.exe 90 PID 2868 wrote to memory of 2192 2868 Fbot.exe 90 PID 2868 wrote to memory of 2192 2868 Fbot.exe 90 PID 2868 wrote to memory of 2192 2868 Fbot.exe 90 PID 2196 wrote to memory of 2008 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 89 PID 2196 wrote to memory of 2008 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 89 PID 2196 wrote to memory of 2008 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 89 PID 2196 wrote to memory of 408 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 91 PID 2196 wrote to memory of 408 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 91 PID 2196 wrote to memory of 408 2196 b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe 91 PID 408 wrote to memory of 1588 408 ri0t.exe 92 PID 408 wrote to memory of 1588 408 ri0t.exe 92 PID 408 wrote to memory of 1588 408 ri0t.exe 92 PID 408 wrote to memory of 1588 408 ri0t.exe 92 PID 408 wrote to memory of 1588 408 ri0t.exe 92 PID 1588 wrote to memory of 2040 1588 ri0t.exe 93 PID 1588 wrote to memory of 2040 1588 ri0t.exe 93 PID 1588 wrote to memory of 2040 1588 ri0t.exe 93 PID 2192 wrote to memory of 3604 2192 Fbot.exe 94 PID 2192 wrote to memory of 3604 2192 Fbot.exe 94 PID 2192 wrote to memory of 3604 2192 Fbot.exe 94 PID 1588 wrote to memory of 4508 1588 ri0t.exe 95 PID 1588 wrote to memory of 4508 1588 ri0t.exe 95 PID 1588 wrote to memory of 4508 1588 ri0t.exe 95 PID 3604 wrote to memory of 4936 3604 svchosts.exe 96 PID 3604 wrote to memory of 4936 3604 svchosts.exe 96 PID 3604 wrote to memory of 4936 3604 svchosts.exe 96 PID 3604 wrote to memory of 4936 3604 svchosts.exe 96 PID 3604 wrote to memory of 4936 3604 svchosts.exe 96 PID 4508 wrote to memory of 3708 4508 ri0t.exe 97 PID 4508 wrote to memory of 3708 4508 ri0t.exe 97 PID 4508 wrote to memory of 3708 4508 ri0t.exe 97 PID 4508 wrote to memory of 3708 4508 ri0t.exe 97 PID 4508 wrote to memory of 3708 4508 ri0t.exe 97 PID 3708 wrote to memory of 4488 3708 ri0t.exe 98 PID 3708 wrote to memory of 4488 3708 ri0t.exe 98 PID 3708 wrote to memory of 4488 3708 ri0t.exe 98 PID 3708 wrote to memory of 4412 3708 ri0t.exe 99 PID 3708 wrote to memory of 4412 3708 ri0t.exe 99 PID 3708 wrote to memory of 4412 3708 ri0t.exe 99 PID 2008 wrote to memory of 4572 2008 Install.exe 100 PID 2008 wrote to memory of 4572 2008 Install.exe 100 PID 2008 wrote to memory of 4572 2008 Install.exe 100 PID 4412 wrote to memory of 2752 4412 ri0t.exe 102 PID 4412 wrote to memory of 2752 4412 ri0t.exe 102 PID 4412 wrote to memory of 2752 4412 ri0t.exe 102 PID 4412 wrote to memory of 2752 4412 ri0t.exe 102 PID 4412 wrote to memory of 2752 4412 ri0t.exe 102 PID 2752 wrote to memory of 3776 2752 ri0t.exe 103 PID 2752 wrote to memory of 3776 2752 ri0t.exe 103 PID 2752 wrote to memory of 3776 2752 ri0t.exe 103 PID 2752 wrote to memory of 2100 2752 ri0t.exe 104 PID 2752 wrote to memory of 2100 2752 ri0t.exe 104 PID 2752 wrote to memory of 2100 2752 ri0t.exe 104 PID 2100 wrote to memory of 2868 2100 ri0t.exe 105 PID 2100 wrote to memory of 2868 2100 ri0t.exe 105 PID 2100 wrote to memory of 2868 2100 ri0t.exe 105 PID 2100 wrote to memory of 2868 2100 ri0t.exe 105 PID 2100 wrote to memory of 2868 2100 ri0t.exe 105 PID 2868 wrote to memory of 3048 2868 ri0t.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6996f1307bf63655e005fbd11665cab_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\Fbot.exe"C:\Users\Admin\AppData\Local\Temp\tempalbert\Fbot.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\Fbot.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\Fbot.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe 1048 "C:\Users\Admin\AppData\Local\Temp\tempalbert\Fbot.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4936 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe 1148 "C:\Windows\SysWOW64\svchosts.exe"6⤵PID:4356
-
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe7⤵
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe 1124 "C:\Windows\SysWOW64\svchosts.exe"8⤵PID:3960
-
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe9⤵
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe 1124 "C:\Windows\SysWOW64\svchosts.exe"10⤵PID:4176
-
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe11⤵
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe 1124 "C:\Windows\SysWOW64\svchosts.exe"12⤵PID:5672
-
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe13⤵
- Drops file in System32 directory
PID:5720
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\Install.exe"C:\Users\Admin\AppData\Local\Temp\tempalbert\Install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Windows Vista SP2 Activator v2.0 By CLoNY.bat" "3⤵PID:4572
-
C:\Windows\SysWOW64\choice.exeCHOICE /C ABCDEFGHIJKLMNOPQRSTUVWXYZ /N /M "Which SLIC would you like to install?"4⤵PID:876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe"C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE4⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE6⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE8⤵PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE10⤵PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe11⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE12⤵PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe13⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE14⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe15⤵
- Executes dropped EXE
PID:4612 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE16⤵PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe17⤵
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE18⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe18⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:568 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE20⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe20⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe21⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE22⤵PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe23⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE24⤵PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe25⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE26⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe26⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe27⤵
- Executes dropped EXE
PID:1236 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE28⤵PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe28⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe29⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE30⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe30⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe31⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE32⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe33⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE34⤵PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe34⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe35⤵
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE36⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe36⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:864 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe37⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE38⤵PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe38⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe39⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE40⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe40⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe41⤵
- Executes dropped EXE
PID:3752 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE42⤵
- Modifies Windows Firewall
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe42⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe43⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE44⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe44⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe45⤵
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE46⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe46⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe47⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE48⤵PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe48⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe49⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE50⤵PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe50⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe51⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE52⤵PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe52⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe53⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE54⤵PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe54⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe55⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE56⤵
- System Location Discovery: System Language Discovery
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe56⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe57⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE58⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe58⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe59⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE60⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe60⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe61⤵PID:2100
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE62⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe62⤵
- Suspicious use of SetThreadContext
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe63⤵PID:3744
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE64⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe64⤵
- Suspicious use of SetThreadContext
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe65⤵PID:4408
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE66⤵PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe66⤵
- Suspicious use of SetThreadContext
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe67⤵PID:1596
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE68⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe68⤵
- Suspicious use of SetThreadContext
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe69⤵PID:4816
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE70⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe70⤵
- Suspicious use of SetThreadContext
PID:892 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe71⤵PID:4664
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE72⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe72⤵
- Suspicious use of SetThreadContext
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe73⤵PID:944
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE74⤵
- Modifies Windows Firewall
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe74⤵
- Suspicious use of SetThreadContext
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe75⤵PID:3616
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE76⤵PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe76⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe77⤵PID:3760
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE78⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe78⤵
- Suspicious use of SetThreadContext
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe79⤵PID:3232
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE80⤵PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe80⤵
- Suspicious use of SetThreadContext
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe81⤵PID:4360
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE82⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe82⤵
- Suspicious use of SetThreadContext
PID:736 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe83⤵PID:4416
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE84⤵PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe84⤵
- Suspicious use of SetThreadContext
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe85⤵PID:5052
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE86⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe86⤵
- Suspicious use of SetThreadContext
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe87⤵PID:4488
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE88⤵PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe88⤵
- Suspicious use of SetThreadContext
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe89⤵PID:4052
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE90⤵
- System Location Discovery: System Language Discovery
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe90⤵
- Suspicious use of SetThreadContext
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe91⤵PID:2096
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE92⤵PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe92⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe93⤵PID:3896
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE94⤵PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe94⤵
- Suspicious use of SetThreadContext
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe95⤵PID:1092
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE96⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe96⤵
- Suspicious use of SetThreadContext
PID:380 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe97⤵PID:2872
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE98⤵PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe98⤵
- Suspicious use of SetThreadContext
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe99⤵PID:1932
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE100⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe100⤵
- Suspicious use of SetThreadContext
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe101⤵PID:4164
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE102⤵
- Modifies Windows Firewall
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe102⤵
- Suspicious use of SetThreadContext
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe103⤵PID:2612
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE104⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe104⤵
- Suspicious use of SetThreadContext
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe105⤵PID:3836
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE106⤵PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe106⤵
- Suspicious use of SetThreadContext
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe107⤵PID:1784
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE108⤵
- Modifies Windows Firewall
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe108⤵
- Suspicious use of SetThreadContext
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe109⤵PID:3920
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE110⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe110⤵
- Suspicious use of SetThreadContext
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe111⤵PID:2600
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE112⤵PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe112⤵
- Suspicious use of SetThreadContext
PID:380 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe113⤵PID:4740
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE114⤵PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe114⤵
- Suspicious use of SetThreadContext
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe115⤵PID:4524
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE116⤵PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe116⤵
- Suspicious use of SetThreadContext
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe117⤵PID:3492
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE118⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe118⤵
- Suspicious use of SetThreadContext
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe119⤵PID:4684
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE120⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe120⤵
- Suspicious use of SetThreadContext
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exeC:\Users\Admin\AppData\Local\Temp\tempalbert\ri0t.exe121⤵PID:1172
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall add allowedprogram dlmanager.exe dlmanager ENABLE122⤵PID:4272
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-