Analysis
-
max time kernel
5s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
da36cac19bc6154d19eff33dfa68d7f6
-
SHA1
88087003e03b7b3a0805cc698a81044b40c99610
-
SHA256
56a27d4fe9918b316ef49d625ab0b671376c50d5c5220cc76a3f5be08e970a0b
-
SHA512
73f7666792fe4b1f0bc65ec1cd5e084fd3bb1515384907625fd94d3ff44f4098c65b51b19ab23ba07b472e87a8df73a29809a2f3f66d1f5321851f12f3ca3f12
-
SSDEEP
24576:YverFiJoEIGw5/F8aar8JTOANhTa7TL0w4W+xZPdpADCUIzM+iRJqTVYd/pG8vGI:1o8F8IKITD3PA+KETw/ruCj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral2/files/0x00090000000233f6-5.dat modiloader_stage2 behavioral2/memory/4968-41-0x0000000049240000-0x000000004940C000-memory.dmp modiloader_stage2 behavioral2/memory/2740-57-0x0000000049240000-0x000000004940C000-memory.dmp modiloader_stage2 behavioral2/memory/4804-113-0x0000000049240000-0x000000004940C000-memory.dmp modiloader_stage2 behavioral2/memory/4884-116-0x0000000049240000-0x000000004940C000-memory.dmp modiloader_stage2 behavioral2/memory/1900-122-0x0000000049240000-0x000000004940C000-memory.dmp modiloader_stage2 behavioral2/memory/4516-136-0x0000000049240000-0x000000004940C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation gliderdeploy.exe Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation GLIDERDEPLOY.EXE -
Executes dropped EXE 35 IoCs
pid Process 4968 gliderdeploy.exe 2740 GLIDERDEPLOY.EXE 4136 SERVER.EXE 4804 GLIDERDEPLOY.EXE 4808 SERVER.EXE 4884 GLIDERDEPLOY.EXE 2320 SERVER.EXE 4516 GLIDERDEPLOY.EXE 2224 SERVER.EXE 1900 GLIDERDEPLOY.EXE 2012 SERVER.EXE 1980 GLIDERDEPLOY.EXE 2412 SERVER.EXE 3196 GLIDERDEPLOY.EXE 3100 SERVER.EXE 4564 GLIDERDEPLOY.EXE 3320 SERVER.EXE 1052 GLIDERDEPLOY.EXE 636 SERVER.EXE 3712 GLIDERDEPLOY.EXE 1504 SERVER.EXE 4916 GLIDERDEPLOY.EXE 3236 SERVER.EXE 3500 GLIDERDEPLOY.EXE 4168 SERVER.EXE 3056 GLIDERDEPLOY.EXE 4808 SERVER.EXE 4104 GLIDERDEPLOY.EXE 3144 SERVER.EXE 3604 GLIDERDEPLOY.EXE 4292 SERVER.EXE 1292 GLIDERDEPLOY.EXE 3100 SERVER.EXE 1044 GLIDERDEPLOY.EXE 1420 SERVER.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gliderdeploy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLIDERDEPLOY.EXE -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings gliderdeploy.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings GLIDERDEPLOY.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4136 SERVER.EXE 4136 SERVER.EXE 4136 SERVER.EXE 4136 SERVER.EXE 4808 SERVER.EXE 4808 SERVER.EXE 4808 SERVER.EXE 4808 SERVER.EXE 2320 SERVER.EXE 2320 SERVER.EXE 2320 SERVER.EXE 2320 SERVER.EXE 2224 SERVER.EXE 2224 SERVER.EXE 2224 SERVER.EXE 2224 SERVER.EXE 2012 SERVER.EXE 2012 SERVER.EXE 2012 SERVER.EXE 2012 SERVER.EXE 2412 SERVER.EXE 2412 SERVER.EXE 2412 SERVER.EXE 2412 SERVER.EXE 3100 SERVER.EXE 3100 SERVER.EXE 3100 SERVER.EXE 3100 SERVER.EXE 3320 SERVER.EXE 3320 SERVER.EXE 3320 SERVER.EXE 3320 SERVER.EXE 636 SERVER.EXE 636 SERVER.EXE 636 SERVER.EXE 636 SERVER.EXE 1504 SERVER.EXE 1504 SERVER.EXE 1504 SERVER.EXE 1504 SERVER.EXE 3236 SERVER.EXE 3236 SERVER.EXE 3236 SERVER.EXE 3236 SERVER.EXE 4168 SERVER.EXE 4168 SERVER.EXE 4168 SERVER.EXE 4168 SERVER.EXE 4808 SERVER.EXE 4808 SERVER.EXE 4808 SERVER.EXE 4808 SERVER.EXE 3144 SERVER.EXE 3144 SERVER.EXE 3144 SERVER.EXE 3144 SERVER.EXE 4292 SERVER.EXE 4292 SERVER.EXE 4292 SERVER.EXE 4292 SERVER.EXE 3100 SERVER.EXE 3100 SERVER.EXE 3100 SERVER.EXE 3100 SERVER.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4912 da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe 4520 OpenWith.exe 3060 OpenWith.exe 4412 OpenWith.exe 1468 OpenWith.exe 2948 OpenWith.exe 3312 OpenWith.exe 2276 OpenWith.exe 2464 OpenWith.exe 2736 OpenWith.exe 2528 OpenWith.exe 60 OpenWith.exe 4372 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4968 4912 da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe 86 PID 4912 wrote to memory of 4968 4912 da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe 86 PID 4912 wrote to memory of 4968 4912 da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe 86 PID 4968 wrote to memory of 2740 4968 gliderdeploy.exe 87 PID 4968 wrote to memory of 2740 4968 gliderdeploy.exe 87 PID 4968 wrote to memory of 2740 4968 gliderdeploy.exe 87 PID 4968 wrote to memory of 4136 4968 gliderdeploy.exe 88 PID 4968 wrote to memory of 4136 4968 gliderdeploy.exe 88 PID 4968 wrote to memory of 4136 4968 gliderdeploy.exe 88 PID 4136 wrote to memory of 3476 4136 SERVER.EXE 56 PID 2740 wrote to memory of 4804 2740 GLIDERDEPLOY.EXE 90 PID 2740 wrote to memory of 4804 2740 GLIDERDEPLOY.EXE 90 PID 2740 wrote to memory of 4804 2740 GLIDERDEPLOY.EXE 90 PID 4136 wrote to memory of 3476 4136 SERVER.EXE 56 PID 2740 wrote to memory of 4808 2740 GLIDERDEPLOY.EXE 124 PID 2740 wrote to memory of 4808 2740 GLIDERDEPLOY.EXE 124 PID 2740 wrote to memory of 4808 2740 GLIDERDEPLOY.EXE 124 PID 4808 wrote to memory of 3476 4808 SERVER.EXE 56 PID 4136 wrote to memory of 3476 4136 SERVER.EXE 56 PID 4136 wrote to memory of 3476 4136 SERVER.EXE 56 PID 4808 wrote to memory of 3476 4808 SERVER.EXE 56 PID 4804 wrote to memory of 4884 4804 GLIDERDEPLOY.EXE 93 PID 4804 wrote to memory of 4884 4804 GLIDERDEPLOY.EXE 93 PID 4804 wrote to memory of 4884 4804 GLIDERDEPLOY.EXE 93 PID 4804 wrote to memory of 2320 4804 GLIDERDEPLOY.EXE 238 PID 4804 wrote to memory of 2320 4804 GLIDERDEPLOY.EXE 238 PID 4804 wrote to memory of 2320 4804 GLIDERDEPLOY.EXE 238 PID 4808 wrote to memory of 3476 4808 SERVER.EXE 56 PID 4136 wrote to memory of 3476 4136 SERVER.EXE 56 PID 2320 wrote to memory of 3476 2320 SERVER.EXE 56 PID 4136 wrote to memory of 3476 4136 SERVER.EXE 56 PID 4808 wrote to memory of 3476 4808 SERVER.EXE 56 PID 2320 wrote to memory of 3476 2320 SERVER.EXE 56 PID 4808 wrote to memory of 3476 4808 SERVER.EXE 56 PID 2320 wrote to memory of 3476 2320 SERVER.EXE 56 PID 4884 wrote to memory of 4516 4884 GLIDERDEPLOY.EXE 96 PID 4884 wrote to memory of 4516 4884 GLIDERDEPLOY.EXE 96 PID 4884 wrote to memory of 4516 4884 GLIDERDEPLOY.EXE 96 PID 4808 wrote to memory of 3476 4808 SERVER.EXE 56 PID 2320 wrote to memory of 3476 2320 SERVER.EXE 56 PID 4884 wrote to memory of 2224 4884 GLIDERDEPLOY.EXE 97 PID 4884 wrote to memory of 2224 4884 GLIDERDEPLOY.EXE 97 PID 4884 wrote to memory of 2224 4884 GLIDERDEPLOY.EXE 97 PID 2224 wrote to memory of 3476 2224 SERVER.EXE 56 PID 2320 wrote to memory of 3476 2320 SERVER.EXE 56 PID 2224 wrote to memory of 3476 2224 SERVER.EXE 56 PID 2320 wrote to memory of 3476 2320 SERVER.EXE 56 PID 2224 wrote to memory of 3476 2224 SERVER.EXE 56 PID 4516 wrote to memory of 1900 4516 GLIDERDEPLOY.EXE 199 PID 4516 wrote to memory of 1900 4516 GLIDERDEPLOY.EXE 199 PID 4516 wrote to memory of 1900 4516 GLIDERDEPLOY.EXE 199 PID 2224 wrote to memory of 3476 2224 SERVER.EXE 56 PID 4516 wrote to memory of 2012 4516 GLIDERDEPLOY.EXE 231 PID 4516 wrote to memory of 2012 4516 GLIDERDEPLOY.EXE 231 PID 4516 wrote to memory of 2012 4516 GLIDERDEPLOY.EXE 231 PID 2012 wrote to memory of 3476 2012 SERVER.EXE 56 PID 2224 wrote to memory of 3476 2224 SERVER.EXE 56 PID 2224 wrote to memory of 3476 2224 SERVER.EXE 56 PID 2012 wrote to memory of 3476 2012 SERVER.EXE 56 PID 2012 wrote to memory of 3476 2012 SERVER.EXE 56 PID 1900 wrote to memory of 1980 1900 GLIDERDEPLOY.EXE 264 PID 1900 wrote to memory of 1980 1900 GLIDERDEPLOY.EXE 264 PID 1900 wrote to memory of 1980 1900 GLIDERDEPLOY.EXE 264 PID 2012 wrote to memory of 3476 2012 SERVER.EXE 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da36cac19bc6154d19eff33dfa68d7f6_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\gliderdeploy.exeC:\Users\Admin\AppData\Local\Temp\\gliderdeploy.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"11⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"15⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"17⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"19⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"21⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"22⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"23⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"24⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"25⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"26⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"27⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"28⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"29⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"30⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"31⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"32⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"33⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"34⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"35⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"36⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"37⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"38⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"39⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"40⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"41⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"42⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"43⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"44⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"45⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"46⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"47⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"48⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"49⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"50⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"51⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"52⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"53⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"54⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"55⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"56⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"57⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"58⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"59⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"60⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"61⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"62⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"63⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"64⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"65⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"66⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"67⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"68⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"69⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"70⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"71⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"72⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"73⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"74⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"75⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"76⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"77⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"78⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"79⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"80⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"81⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"82⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"83⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"84⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"85⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"86⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"87⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"88⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"89⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"90⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"91⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"92⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"93⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"94⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"95⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"96⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"97⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"98⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"99⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"100⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"101⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"102⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"103⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"104⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"105⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"106⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"107⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"108⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"109⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"110⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"111⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"112⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"113⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"114⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"115⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"116⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"117⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"118⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"119⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"120⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"121⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"122⤵PID:5080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-