Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe
Resource
win10v2004-20240802-en
General
-
Target
fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe
-
Size
198KB
-
MD5
43b05ec95088079c4c78a195d6a99235
-
SHA1
3c8bf9fd4623757f890847fe5c825dd8521803c5
-
SHA256
fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f
-
SHA512
85f22e329d0b93e624c30fc548e0d9e44b9cd5fa1d6a0ef9e0148677d1a2b1b0350c595417cf8c68a532ef2e8bcccaf762899d44a251751cc84c618474ec9691
-
SSDEEP
3072:w5HoQYbm7xfb/QtrnDCWPswF9KYt4TeGdJfM5/Pkm/l16jH:wGm79/QtreosnYt4Tj/M5jq
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (76) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation yWQUUIMo.exe -
Executes dropped EXE 2 IoCs
pid Process 1176 yWQUUIMo.exe 1804 sqQksMIA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yWQUUIMo.exe = "C:\\Users\\Admin\\wugooQYc\\yWQUUIMo.exe" fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sqQksMIA.exe = "C:\\ProgramData\\luMoQwkY\\sqQksMIA.exe" fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yWQUUIMo.exe = "C:\\Users\\Admin\\wugooQYc\\yWQUUIMo.exe" yWQUUIMo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sqQksMIA.exe = "C:\\ProgramData\\luMoQwkY\\sqQksMIA.exe" sqQksMIA.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe yWQUUIMo.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe yWQUUIMo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 892 reg.exe 5028 reg.exe 4740 reg.exe 1976 reg.exe 3780 reg.exe 4572 reg.exe 4372 reg.exe 2584 reg.exe 4512 reg.exe 4236 reg.exe 3628 reg.exe 4684 reg.exe 2480 reg.exe 1620 reg.exe 3032 reg.exe 3564 reg.exe 4640 reg.exe 4176 reg.exe 3020 reg.exe 5076 reg.exe 652 reg.exe 4284 reg.exe 3792 reg.exe 3020 reg.exe 4500 reg.exe 4844 reg.exe 3592 reg.exe 4884 reg.exe 4492 reg.exe 4608 reg.exe 4968 Process not Found 3840 reg.exe 4836 Process not Found 3548 reg.exe 2776 reg.exe 2620 Process not Found 2236 Process not Found 3760 reg.exe 2236 reg.exe 1800 reg.exe 3776 reg.exe 2856 reg.exe 3440 reg.exe 1404 reg.exe 4532 Process not Found 3516 reg.exe 2556 reg.exe 3020 reg.exe 4972 reg.exe 2180 reg.exe 3516 reg.exe 3628 reg.exe 3168 reg.exe 4016 reg.exe 796 Process not Found 3584 reg.exe 4436 reg.exe 720 reg.exe 3096 reg.exe 1092 reg.exe 1680 reg.exe 4276 reg.exe 3264 reg.exe 3720 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1676 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1676 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1676 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1676 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1656 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1656 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1656 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1656 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1800 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1800 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1800 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1800 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1960 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1960 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1960 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1960 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2944 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2944 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2944 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2944 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1692 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1692 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1692 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 1692 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2388 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2388 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2388 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2388 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 3252 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 3252 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 3252 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 3252 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 4972 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 4972 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 4972 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 4972 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2828 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2828 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2828 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 2828 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 948 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 948 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 948 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 948 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 4608 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 4608 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 4608 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 4608 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 3376 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 3376 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 3376 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 3376 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1176 yWQUUIMo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe 1176 yWQUUIMo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1176 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 89 PID 1168 wrote to memory of 1176 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 89 PID 1168 wrote to memory of 1176 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 89 PID 1168 wrote to memory of 1804 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 90 PID 1168 wrote to memory of 1804 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 90 PID 1168 wrote to memory of 1804 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 90 PID 1168 wrote to memory of 3740 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 91 PID 1168 wrote to memory of 3740 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 91 PID 1168 wrote to memory of 3740 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 91 PID 1168 wrote to memory of 640 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 93 PID 1168 wrote to memory of 640 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 93 PID 1168 wrote to memory of 640 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 93 PID 1168 wrote to memory of 4460 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 94 PID 1168 wrote to memory of 4460 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 94 PID 1168 wrote to memory of 4460 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 94 PID 1168 wrote to memory of 3532 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 95 PID 1168 wrote to memory of 3532 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 95 PID 1168 wrote to memory of 3532 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 95 PID 1168 wrote to memory of 2960 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 96 PID 1168 wrote to memory of 2960 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 96 PID 1168 wrote to memory of 2960 1168 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 96 PID 3740 wrote to memory of 2536 3740 cmd.exe 99 PID 3740 wrote to memory of 2536 3740 cmd.exe 99 PID 3740 wrote to memory of 2536 3740 cmd.exe 99 PID 2960 wrote to memory of 4616 2960 cmd.exe 102 PID 2960 wrote to memory of 4616 2960 cmd.exe 102 PID 2960 wrote to memory of 4616 2960 cmd.exe 102 PID 2536 wrote to memory of 2284 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 105 PID 2536 wrote to memory of 2284 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 105 PID 2536 wrote to memory of 2284 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 105 PID 2536 wrote to memory of 2976 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 107 PID 2536 wrote to memory of 2976 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 107 PID 2536 wrote to memory of 2976 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 107 PID 2284 wrote to memory of 1760 2284 cmd.exe 108 PID 2284 wrote to memory of 1760 2284 cmd.exe 108 PID 2284 wrote to memory of 1760 2284 cmd.exe 108 PID 2536 wrote to memory of 3436 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 109 PID 2536 wrote to memory of 3436 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 109 PID 2536 wrote to memory of 3436 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 109 PID 2536 wrote to memory of 3760 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 110 PID 2536 wrote to memory of 3760 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 110 PID 2536 wrote to memory of 3760 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 110 PID 2536 wrote to memory of 2796 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 111 PID 2536 wrote to memory of 2796 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 111 PID 2536 wrote to memory of 2796 2536 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 111 PID 2796 wrote to memory of 3480 2796 cmd.exe 116 PID 2796 wrote to memory of 3480 2796 cmd.exe 116 PID 2796 wrote to memory of 3480 2796 cmd.exe 116 PID 1760 wrote to memory of 924 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 117 PID 1760 wrote to memory of 924 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 117 PID 1760 wrote to memory of 924 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 117 PID 924 wrote to memory of 1676 924 cmd.exe 119 PID 924 wrote to memory of 1676 924 cmd.exe 119 PID 924 wrote to memory of 1676 924 cmd.exe 119 PID 1760 wrote to memory of 4656 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 120 PID 1760 wrote to memory of 4656 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 120 PID 1760 wrote to memory of 4656 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 120 PID 1760 wrote to memory of 4868 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 121 PID 1760 wrote to memory of 4868 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 121 PID 1760 wrote to memory of 4868 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 121 PID 1760 wrote to memory of 4880 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 122 PID 1760 wrote to memory of 4880 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 122 PID 1760 wrote to memory of 4880 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 122 PID 1760 wrote to memory of 1328 1760 fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe"C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\wugooQYc\yWQUUIMo.exe"C:\Users\Admin\wugooQYc\yWQUUIMo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1176
-
-
C:\ProgramData\luMoQwkY\sqQksMIA.exe"C:\ProgramData\luMoQwkY\sqQksMIA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"2⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"6⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"8⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"10⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"12⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"14⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"16⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"18⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"20⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"22⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"24⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"26⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f27⤵
- Suspicious behavior: EnumeratesProcesses
PID:948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"28⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"30⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"32⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f33⤵PID:1852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"34⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f35⤵PID:3764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"36⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f37⤵PID:980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"38⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f39⤵
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"40⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f41⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"42⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f43⤵PID:2780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"44⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f45⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"46⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f47⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"48⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f49⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"50⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f51⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"52⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f53⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"54⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f55⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"56⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f57⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"58⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f59⤵PID:1748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"60⤵PID:3792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f61⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"62⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f63⤵PID:1848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"64⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f65⤵PID:3760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"66⤵PID:4576
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f67⤵PID:212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"68⤵PID:4500
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f69⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"70⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f71⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"72⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f73⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"74⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f75⤵PID:3884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"76⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f77⤵PID:3104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"78⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f79⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"80⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f81⤵PID:3140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"82⤵
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f83⤵PID:3412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"84⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f85⤵PID:720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"86⤵PID:4972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f87⤵PID:2960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"88⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f89⤵PID:1524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"90⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f91⤵PID:3992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"92⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f93⤵PID:2388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"94⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f95⤵PID:3140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"96⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f97⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"98⤵
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f99⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"100⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f101⤵
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"102⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f103⤵PID:1612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"104⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f105⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"106⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f107⤵PID:1800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"108⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f109⤵PID:1464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"110⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f111⤵PID:3748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"112⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f113⤵PID:3876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"114⤵
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f115⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"116⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f117⤵PID:1708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"118⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f119⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"120⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f.exeC:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f121⤵PID:4908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fc6c4d24900b4363f1b0ea5954b831eedac2ecc011164208ac5b7bbb461db40f"122⤵PID:1800
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-