Analysis
-
max time kernel
175s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 23:50
Static task
static1
General
-
Target
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe
-
Size
705KB
-
MD5
c515a556d7cc1fb7a476fb0fb1aadaaa
-
SHA1
c5690d2abee36e06c2c40dceba693bc7eeeda7be
-
SHA256
4ba67a000526a4abcf098ab1671fae28996f0db56a67bdeb36d2ef653e34c35b
-
SHA512
ceb6047816345ad1767698982d448d48accc1e9b22f0fb7ca9c9233444523531b9ef672041dc73ce6a6b6f22fd7263ca882d6fb19288d0dd726cb7c0eb94a1a2
-
SSDEEP
12288:0J0unggMGIwHJo8spfSPFWHw2Y8ZKk8mZfurZB+n3mfYBkU4f5YNmmh8o:luoG9priSPFWHw2Y8ZK5d22fYBkU4f5q
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
yoqmiiwhxyjcorck
Extracted
netwire
greatking.freeddns.org:3362
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/4060-52-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral1/memory/764-96-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral1/memory/4536-137-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral1/memory/4876-386-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral1/memory/4420-526-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral1/memory/5004-3037-0x0000000000400000-0x0000000000423000-memory.dmp netwire -
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral1/memory/1452-246-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/1452-248-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral1/memory/1452-245-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/1452-246-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral1/memory/1452-248-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral1/memory/1452-245-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Host.exeApp.exeApp.exeApp.exeApp.exeApp.exeHost.exeHost.exeHost.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeHost.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeHost.exeHost.exeHost.exeHost.exeApp.exeHost.exeHost.exeHost.exeApp.exeApp.exeHost.exeHost.exeApp.exeApp.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeHost.exeApp.exeApp.exeApp.exeApp.exeHost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe -
Executes dropped EXE 64 IoCs
Processes:
coded.exeApp.execoded.exeWindows Update.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.exepid process 544 coded.exe 2936 App.exe 4308 coded.exe 1336 Windows Update.exe 4060 App.exe 4148 Host.exe 4300 coded.exe 4592 App.exe 5096 coded.exe 764 App.exe 4104 Host.exe 3360 coded.exe 64 App.exe 3076 coded.exe 4536 App.exe 4656 Host.exe 448 coded.exe 4112 App.exe 1048 coded.exe 3320 App.exe 4484 Host.exe 1920 coded.exe 808 App.exe 2372 coded.exe 2544 App.exe 1816 Host.exe 1040 coded.exe 3360 App.exe 4356 coded.exe 540 App.exe 2368 Host.exe 1316 coded.exe 4956 App.exe 4060 coded.exe 3372 App.exe 2452 Host.exe 4812 coded.exe 1928 App.exe 2940 coded.exe 2156 App.exe 2328 Host.exe 1864 coded.exe 4732 App.exe 4988 coded.exe 3504 App.exe 4420 Host.exe 4644 coded.exe 4456 App.exe 5020 coded.exe 4992 App.exe 1884 App.exe 468 Host.exe 2408 coded.exe 840 App.exe 3016 coded.exe 4876 App.exe 3636 Host.exe 4616 coded.exe 1176 App.exe 3368 coded.exe 4952 App.exe 1936 Host.exe 2968 coded.exe 1420 App.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Update.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" Windows Update.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 checkip.dyndns.org -
Suspicious use of SetThreadContext 64 IoCs
Processes:
App.exeApp.exeApp.exeApp.exeApp.exeWindows Update.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exedescription pid process target process PID 2936 set thread context of 4060 2936 App.exe cmd.exe PID 4592 set thread context of 764 4592 App.exe schtasks.exe PID 64 set thread context of 4536 64 App.exe App.exe PID 4112 set thread context of 3320 4112 App.exe App.exe PID 808 set thread context of 2544 808 App.exe App.exe PID 1336 set thread context of 1452 1336 Windows Update.exe vbc.exe PID 3360 set thread context of 540 3360 App.exe Conhost.exe PID 4956 set thread context of 3372 4956 App.exe Conhost.exe PID 1928 set thread context of 2156 1928 App.exe App.exe PID 4732 set thread context of 3504 4732 App.exe cmd.exe PID 4456 set thread context of 1884 4456 App.exe TrustedInstaller.exe PID 840 set thread context of 4876 840 App.exe App.exe PID 1176 set thread context of 4952 1176 App.exe App.exe PID 1420 set thread context of 3304 1420 App.exe App.exe PID 4604 set thread context of 2460 4604 App.exe App.exe PID 4648 set thread context of 4984 4648 App.exe schtasks.exe PID 1336 set thread context of 4756 1336 Windows Update.exe vbc.exe PID 4088 set thread context of 4420 4088 App.exe App.exe PID 5096 set thread context of 1492 5096 App.exe App.exe PID 1188 set thread context of 792 1188 App.exe App.exe PID 3464 set thread context of 5104 3464 App.exe App.exe PID 1680 set thread context of 3368 1680 App.exe App.exe PID 2856 set thread context of 3220 2856 App.exe App.exe PID 1724 set thread context of 964 1724 App.exe App.exe PID 1216 set thread context of 1628 1216 App.exe App.exe PID 4828 set thread context of 764 4828 App.exe App.exe PID 452 set thread context of 2912 452 App.exe App.exe PID 212 set thread context of 1316 212 App.exe App.exe PID 4320 set thread context of 2024 4320 App.exe cmd.exe PID 4532 set thread context of 692 4532 App.exe App.exe PID 3520 set thread context of 4484 3520 App.exe App.exe PID 808 set thread context of 3340 808 App.exe App.exe PID 872 set thread context of 4672 872 App.exe App.exe PID 704 set thread context of 4044 704 App.exe App.exe PID 748 set thread context of 4476 748 App.exe App.exe PID 4656 set thread context of 4148 4656 App.exe App.exe PID 4120 set thread context of 4792 4120 App.exe App.exe PID 3056 set thread context of 3220 3056 App.exe App.exe PID 212 set thread context of 4304 212 App.exe App.exe PID 1404 set thread context of 5084 1404 App.exe schtasks.exe PID 3308 set thread context of 5052 3308 App.exe App.exe PID 1928 set thread context of 4620 1928 App.exe App.exe PID 4120 set thread context of 740 4120 App.exe App.exe PID 4500 set thread context of 2436 4500 App.exe App.exe PID 5088 set thread context of 2288 5088 App.exe App.exe PID 3160 set thread context of 1076 3160 App.exe App.exe PID 1664 set thread context of 2360 1664 App.exe App.exe PID 3268 set thread context of 4724 3268 App.exe App.exe PID 4448 set thread context of 3776 4448 App.exe App.exe PID 5072 set thread context of 4668 5072 App.exe App.exe PID 3916 set thread context of 1392 3916 App.exe App.exe PID 2868 set thread context of 4400 2868 App.exe App.exe PID 3684 set thread context of 4484 3684 App.exe App.exe PID 3484 set thread context of 4964 3484 App.exe App.exe PID 4060 set thread context of 3572 4060 App.exe App.exe PID 4716 set thread context of 232 4716 App.exe App.exe PID 60 set thread context of 5048 60 App.exe App.exe PID 3504 set thread context of 2956 3504 App.exe App.exe PID 4068 set thread context of 4716 4068 App.exe App.exe PID 900 set thread context of 1688 900 App.exe App.exe PID 4848 set thread context of 4400 4848 App.exe App.exe PID 3148 set thread context of 4256 3148 App.exe App.exe PID 3260 set thread context of 4868 3260 App.exe App.exe PID 2140 set thread context of 4292 2140 App.exe App.exe -
Processes:
resource yara_rule behavioral1/memory/4060-50-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/4060-52-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/4060-48-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/764-95-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/764-96-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/4536-137-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/4536-136-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/4876-386-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/4876-385-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/4420-526-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/4420-525-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/5004-3037-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/5004-3031-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
coded.exeApp.exeApp.exeschtasks.exeHost.execmd.execmd.execmd.execoded.exeHost.exeApp.execmd.exec515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exeApp.exeschtasks.exeschtasks.execoded.execoded.exeschtasks.exeschtasks.execmd.execmd.exeApp.exeApp.exeschtasks.execoded.exeApp.exeApp.exeApp.execmd.execoded.exeApp.exeHost.exeschtasks.exeApp.exeHost.exeschtasks.execmd.execoded.exeApp.execoded.execmd.exeApp.exeschtasks.exeApp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5116 schtasks.exe 456 schtasks.exe 1036 schtasks.exe 3476 schtasks.exe 1004 4900 schtasks.exe 5072 schtasks.exe 3320 schtasks.exe 388 schtasks.exe 4740 schtasks.exe 232 schtasks.exe 3744 5048 1912 2584 916 schtasks.exe 4940 schtasks.exe 3776 schtasks.exe 3992 3476 64 schtasks.exe 516 schtasks.exe 4312 schtasks.exe 2936 2760 schtasks.exe 3972 schtasks.exe 4980 schtasks.exe 1936 schtasks.exe 2372 schtasks.exe 5048 1392 4432 2996 1972 schtasks.exe 1940 schtasks.exe 4740 schtasks.exe 4448 schtasks.exe 1984 228 4224 schtasks.exe 4956 4656 schtasks.exe 4812 schtasks.exe 2160 schtasks.exe 3452 schtasks.exe 1492 schtasks.exe 2368 688 schtasks.exe 5068 schtasks.exe 4988 schtasks.exe 3776 schtasks.exe 4216 schtasks.exe 764 4304 schtasks.exe 2496 schtasks.exe 1868 schtasks.exe 3228 schtasks.exe 3700 schtasks.exe 4016 4752 1544 schtasks.exe 3160 4748 1176 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exepid process 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 2936 App.exe 2936 App.exe 4148 Host.exe 4148 Host.exe 4592 App.exe 4592 App.exe 4104 Host.exe 4104 Host.exe 64 App.exe 64 App.exe 4656 Host.exe 4656 Host.exe 4112 App.exe 4112 App.exe 4484 Host.exe 4484 Host.exe 808 App.exe 808 App.exe 1816 Host.exe 1816 Host.exe 3360 App.exe 3360 App.exe 2368 Host.exe 2368 Host.exe 4956 App.exe 4956 App.exe 2452 Host.exe 2452 Host.exe 1928 App.exe 1928 App.exe 2328 Host.exe 2328 Host.exe 4732 App.exe 4732 App.exe 4420 Host.exe 4420 Host.exe 4456 App.exe 4456 App.exe 468 Host.exe 468 Host.exe 840 App.exe 840 App.exe 3636 Host.exe 3636 Host.exe 1176 App.exe 1176 App.exe 1936 Host.exe 1936 Host.exe 1420 App.exe 1420 App.exe 5040 Host.exe 5040 Host.exe 4604 App.exe 4604 App.exe 2344 Host.exe 2344 Host.exe 4648 App.exe 4648 App.exe 1724 Host.exe 1724 Host.exe 4088 App.exe 4088 App.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exeApp.exeHost.exeApp.exeWindows Update.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exedescription pid process Token: SeDebugPrivilege 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe Token: SeDebugPrivilege 2936 App.exe Token: SeDebugPrivilege 4148 Host.exe Token: SeDebugPrivilege 4592 App.exe Token: SeDebugPrivilege 1336 Windows Update.exe Token: SeDebugPrivilege 4104 Host.exe Token: SeDebugPrivilege 64 App.exe Token: SeDebugPrivilege 4656 Host.exe Token: SeDebugPrivilege 4112 App.exe Token: SeDebugPrivilege 4484 Host.exe Token: SeDebugPrivilege 808 App.exe Token: SeDebugPrivilege 1816 Host.exe Token: SeDebugPrivilege 3360 App.exe Token: SeDebugPrivilege 2368 Host.exe Token: SeDebugPrivilege 4956 App.exe Token: SeDebugPrivilege 2452 Host.exe Token: SeDebugPrivilege 1928 App.exe Token: SeDebugPrivilege 2328 Host.exe Token: SeDebugPrivilege 4732 App.exe Token: SeDebugPrivilege 4420 Host.exe Token: SeDebugPrivilege 4456 App.exe Token: SeDebugPrivilege 468 Host.exe Token: SeDebugPrivilege 840 App.exe Token: SeDebugPrivilege 3636 Host.exe Token: SeDebugPrivilege 1176 App.exe Token: SeDebugPrivilege 1936 Host.exe Token: SeDebugPrivilege 1420 App.exe Token: SeDebugPrivilege 5040 Host.exe Token: SeDebugPrivilege 4604 App.exe Token: SeDebugPrivilege 2344 Host.exe Token: SeDebugPrivilege 4648 App.exe Token: SeDebugPrivilege 1724 Host.exe Token: SeDebugPrivilege 4088 App.exe Token: SeDebugPrivilege 1508 Host.exe Token: SeDebugPrivilege 5096 App.exe Token: SeDebugPrivilege 1544 Host.exe Token: SeDebugPrivilege 1188 App.exe Token: SeDebugPrivilege 3560 Host.exe Token: SeDebugPrivilege 3464 App.exe Token: SeDebugPrivilege 4184 Host.exe Token: SeDebugPrivilege 1680 App.exe Token: SeDebugPrivilege 3376 Host.exe Token: SeDebugPrivilege 2856 App.exe Token: SeDebugPrivilege 4588 Host.exe Token: SeDebugPrivilege 1724 App.exe Token: SeDebugPrivilege 4400 Host.exe Token: SeDebugPrivilege 1216 App.exe Token: SeDebugPrivilege 1588 Host.exe Token: SeDebugPrivilege 4828 App.exe Token: SeDebugPrivilege 4300 Host.exe Token: SeDebugPrivilege 452 App.exe Token: SeDebugPrivilege 4388 Host.exe Token: SeDebugPrivilege 212 App.exe Token: SeDebugPrivilege 700 Host.exe Token: SeDebugPrivilege 4320 App.exe Token: SeDebugPrivilege 1076 Host.exe Token: SeDebugPrivilege 4532 App.exe Token: SeDebugPrivilege 1624 Host.exe Token: SeDebugPrivilege 3520 App.exe Token: SeDebugPrivilege 864 Host.exe Token: SeDebugPrivilege 808 App.exe Token: SeDebugPrivilege 3244 Host.exe Token: SeDebugPrivilege 872 App.exe Token: SeDebugPrivilege 1632 Host.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Update.exepid process 1336 Windows Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.execmd.exeApp.execmd.execmd.execoded.exeApp.exeHost.execmd.exeApp.execmd.execmd.exedescription pid process target process PID 224 wrote to memory of 544 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe coded.exe PID 224 wrote to memory of 544 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe coded.exe PID 224 wrote to memory of 544 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe coded.exe PID 224 wrote to memory of 2760 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe schtasks.exe PID 224 wrote to memory of 2760 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe schtasks.exe PID 224 wrote to memory of 2760 224 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe schtasks.exe PID 2760 wrote to memory of 2936 2760 cmd.exe cmd.exe PID 2760 wrote to memory of 2936 2760 cmd.exe cmd.exe PID 2760 wrote to memory of 2936 2760 cmd.exe cmd.exe PID 2936 wrote to memory of 4308 2936 App.exe coded.exe PID 2936 wrote to memory of 4308 2936 App.exe coded.exe PID 2936 wrote to memory of 4308 2936 App.exe coded.exe PID 2936 wrote to memory of 1676 2936 App.exe cmd.exe PID 2936 wrote to memory of 1676 2936 App.exe cmd.exe PID 2936 wrote to memory of 1676 2936 App.exe cmd.exe PID 1676 wrote to memory of 1712 1676 cmd.exe schtasks.exe PID 1676 wrote to memory of 1712 1676 cmd.exe schtasks.exe PID 1676 wrote to memory of 1712 1676 cmd.exe schtasks.exe PID 2936 wrote to memory of 2096 2936 App.exe cmd.exe PID 2936 wrote to memory of 2096 2936 App.exe cmd.exe PID 2936 wrote to memory of 2096 2936 App.exe cmd.exe PID 2096 wrote to memory of 3936 2096 cmd.exe schtasks.exe PID 2096 wrote to memory of 3936 2096 cmd.exe schtasks.exe PID 2096 wrote to memory of 3936 2096 cmd.exe schtasks.exe PID 544 wrote to memory of 1336 544 coded.exe Windows Update.exe PID 544 wrote to memory of 1336 544 coded.exe Windows Update.exe PID 544 wrote to memory of 1336 544 coded.exe Windows Update.exe PID 2936 wrote to memory of 4060 2936 App.exe cmd.exe PID 2936 wrote to memory of 4060 2936 App.exe cmd.exe PID 2936 wrote to memory of 4060 2936 App.exe cmd.exe PID 2936 wrote to memory of 4060 2936 App.exe cmd.exe PID 2936 wrote to memory of 4060 2936 App.exe cmd.exe PID 2936 wrote to memory of 4060 2936 App.exe cmd.exe PID 2936 wrote to memory of 4060 2936 App.exe cmd.exe PID 2936 wrote to memory of 4060 2936 App.exe cmd.exe PID 4060 wrote to memory of 4148 4060 App.exe cmd.exe PID 4060 wrote to memory of 4148 4060 App.exe cmd.exe PID 4060 wrote to memory of 4148 4060 App.exe cmd.exe PID 4148 wrote to memory of 4300 4148 Host.exe coded.exe PID 4148 wrote to memory of 4300 4148 Host.exe coded.exe PID 4148 wrote to memory of 4300 4148 Host.exe coded.exe PID 4148 wrote to memory of 4124 4148 Host.exe schtasks.exe PID 4148 wrote to memory of 4124 4148 Host.exe schtasks.exe PID 4148 wrote to memory of 4124 4148 Host.exe schtasks.exe PID 4124 wrote to memory of 4592 4124 cmd.exe App.exe PID 4124 wrote to memory of 4592 4124 cmd.exe App.exe PID 4124 wrote to memory of 4592 4124 cmd.exe App.exe PID 4592 wrote to memory of 5096 4592 App.exe cmd.exe PID 4592 wrote to memory of 5096 4592 App.exe cmd.exe PID 4592 wrote to memory of 5096 4592 App.exe cmd.exe PID 4592 wrote to memory of 1408 4592 App.exe cmd.exe PID 4592 wrote to memory of 1408 4592 App.exe cmd.exe PID 4592 wrote to memory of 1408 4592 App.exe cmd.exe PID 1408 wrote to memory of 740 1408 cmd.exe schtasks.exe PID 1408 wrote to memory of 740 1408 cmd.exe schtasks.exe PID 1408 wrote to memory of 740 1408 cmd.exe schtasks.exe PID 4592 wrote to memory of 4616 4592 App.exe coded.exe PID 4592 wrote to memory of 4616 4592 App.exe coded.exe PID 4592 wrote to memory of 4616 4592 App.exe coded.exe PID 4616 wrote to memory of 2460 4616 cmd.exe schtasks.exe PID 4616 wrote to memory of 2460 4616 cmd.exe schtasks.exe PID 4616 wrote to memory of 2460 4616 cmd.exe schtasks.exe PID 4592 wrote to memory of 764 4592 App.exe schtasks.exe PID 4592 wrote to memory of 764 4592 App.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:224 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1336 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
PID:1452
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\holderwb.txt"4⤵PID:4756
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"4⤵
- Executes dropped EXE
PID:4308
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F5⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\74904793.xml"5⤵PID:3936
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"6⤵
- Executes dropped EXE
PID:4300
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"8⤵
- Executes dropped EXE
PID:5096
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F9⤵PID:740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\255253727.xml"9⤵PID:2460
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"10⤵
- Executes dropped EXE
PID:3360
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:1176
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"12⤵
- Executes dropped EXE
PID:3076
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:116
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F13⤵PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:4072
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\2051533596.xml"13⤵
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "12⤵
- Executes dropped EXE
PID:4536 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"14⤵
- Executes dropped EXE
PID:448
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"14⤵PID:3608
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"16⤵
- Executes dropped EXE
PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"16⤵PID:624
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F17⤵PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"16⤵PID:1364
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\353636649.xml"17⤵
- Scheduled Task/Job: Scheduled Task
PID:688
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "16⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"18⤵
- Executes dropped EXE
PID:1920
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"18⤵PID:4180
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"20⤵
- Executes dropped EXE
PID:2372
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"20⤵PID:5096
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F21⤵PID:4312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"20⤵PID:4148
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\2112394922.xml"21⤵PID:1756
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "20⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"22⤵
- Executes dropped EXE
PID:1040
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"22⤵PID:4788
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"24⤵
- Executes dropped EXE
PID:4356
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"24⤵PID:3624
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F25⤵PID:1284
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"24⤵PID:4168
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1304513511.xml"25⤵PID:1724
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"26⤵
- Executes dropped EXE
PID:1316
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"26⤵PID:3684
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"28⤵
- Executes dropped EXE
PID:4060
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"28⤵PID:2936
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F29⤵PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"28⤵PID:456
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1454431782.xml"29⤵PID:3272
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "28⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"30⤵
- Executes dropped EXE
PID:4812
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"30⤵PID:388
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"32⤵
- Executes dropped EXE
PID:2940
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"32⤵PID:1860
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F33⤵PID:764
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"32⤵PID:5116
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\63294197.xml"33⤵
- Scheduled Task/Job: Scheduled Task
PID:1972
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "32⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"34⤵
- Executes dropped EXE
PID:1864
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"34⤵PID:1564
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"36⤵
- Executes dropped EXE
PID:4988
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"36⤵PID:4952
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F37⤵PID:3340
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"36⤵PID:1188
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1522384041.xml"37⤵PID:4288
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "36⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"38⤵
- Executes dropped EXE
PID:4644
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"38⤵PID:3464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:540
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"40⤵
- Executes dropped EXE
PID:5020
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"40⤵PID:3304
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F41⤵PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"40⤵PID:3092
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\482618347.xml"41⤵PID:3520
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "40⤵
- Executes dropped EXE
PID:4992
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "40⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"42⤵
- Executes dropped EXE
PID:2408
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"42⤵PID:4060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:3372
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"44⤵
- Executes dropped EXE
PID:3016
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"44⤵PID:388
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F45⤵PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"44⤵PID:3776
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:1756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\86802040.xml"45⤵PID:4676
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "44⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"46⤵
- Executes dropped EXE
PID:4616
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"46⤵PID:2940
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"48⤵
- Executes dropped EXE
PID:3368
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"48⤵PID:1564
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F49⤵PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"48⤵PID:1932
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\154754299.xml"49⤵
- Scheduled Task/Job: Scheduled Task
PID:916
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "48⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"50⤵
- Executes dropped EXE
PID:2968
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"50⤵PID:4988
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"52⤵PID:3608
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"52⤵PID:4660
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F53⤵PID:688
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"52⤵PID:4520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:1316
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\2025909247.xml"53⤵
- Scheduled Task/Job: Scheduled Task
PID:5068
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "52⤵PID:4900
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "52⤵PID:3304
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"53⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"54⤵PID:3380
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"54⤵PID:700
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:4180
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"55⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"56⤵PID:4812
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"56⤵PID:4960
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F57⤵PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"56⤵PID:4256
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\178262142.xml"57⤵
- Scheduled Task/Job: Scheduled Task
PID:5116
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "56⤵PID:1860
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "56⤵PID:3308
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "56⤵PID:4484
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "56⤵PID:2460
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"57⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"58⤵PID:4024
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"58⤵PID:1076
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"59⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"60⤵PID:3956
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"60⤵PID:5016
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F61⤵PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"60⤵PID:1448
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1974542011.xml"61⤵
- Scheduled Task/Job: Scheduled Task
PID:1176
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "60⤵PID:4984
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"61⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"62⤵PID:3484
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"62⤵PID:4416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:1816
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"63⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"64⤵PID:4436
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"64⤵PID:2776
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F65⤵PID:4844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"64⤵PID:1348
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1848131583.xml"65⤵PID:3836
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "64⤵PID:4420
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"65⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"66⤵PID:4100
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"66⤵PID:4184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:388
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"67⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5096 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"68⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"68⤵PID:1984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:5040
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F69⤵PID:4120
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"68⤵PID:740
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1908992909.xml"69⤵
- Scheduled Task/Job: Scheduled Task
PID:4304
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "68⤵PID:316
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "68⤵PID:1492
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"69⤵
- Suspicious use of AdjustPrivilegeToken
PID:1544 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"70⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"70⤵PID:4736
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"71⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"72⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"72⤵PID:3504
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F73⤵PID:3148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"72⤵PID:2856
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\218355008.xml"73⤵PID:4976
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "72⤵PID:792
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"73⤵
- Suspicious use of AdjustPrivilegeToken
PID:3560 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"74⤵PID:3092
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"74⤵PID:3936
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"75⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3464 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"76⤵PID:5052
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"76⤵PID:764
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:1972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F77⤵PID:388
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"76⤵PID:704
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1237016016.xml"77⤵PID:3964
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "76⤵PID:5104
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"77⤵
- Suspicious use of AdjustPrivilegeToken
PID:4184 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"78⤵PID:4068
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"78⤵PID:4112
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"80⤵PID:2288
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"80⤵PID:2908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F81⤵PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"80⤵PID:4836
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\40409231.xml"81⤵PID:2672
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "80⤵PID:3368
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"82⤵PID:4988
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"82⤵PID:3328
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"84⤵PID:1104
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"84⤵PID:1936
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F85⤵PID:3844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"84⤵
- System Location Discovery: System Language Discovery
PID:3372 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1492408142.xml"85⤵
- Scheduled Task/Job: Scheduled Task
PID:3972
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "84⤵
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"85⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"86⤵PID:4180
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"86⤵PID:4456
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"87⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"88⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"88⤵PID:1068
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F89⤵PID:3252
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"88⤵PID:3700
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1253601039.xml"89⤵
- Scheduled Task/Job: Scheduled Task
PID:4980
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "88⤵PID:964
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"89⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"90⤵PID:3388
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"90⤵PID:4532
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"91⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"92⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"92⤵PID:4416
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F93⤵PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"92⤵PID:3216
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1860196943.xml"93⤵
- Scheduled Task/Job: Scheduled Task
PID:4988
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "92⤵PID:1364
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "92⤵PID:3520
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "92⤵PID:3536
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "92⤵PID:1628
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"93⤵
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"94⤵PID:4872
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"94⤵PID:4124
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"95⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"96⤵PID:4208
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"96⤵PID:544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:5052
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F97⤵PID:312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"96⤵PID:4968
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\738465237.xml"97⤵
- Scheduled Task/Job: Scheduled Task
PID:2496
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "96⤵PID:764
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"97⤵
- Suspicious use of AdjustPrivilegeToken
PID:4300 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"98⤵PID:5048
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"98⤵PID:2412
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"99⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:452 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"100⤵PID:1408
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"100⤵PID:3000
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F101⤵PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"100⤵PID:2160
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\806417496.xml"101⤵PID:3428
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "100⤵PID:4736
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "100⤵PID:2912
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"101⤵
- Suspicious use of AdjustPrivilegeToken
PID:4388 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"102⤵PID:3336
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"102⤵PID:4416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:876
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"103⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:212 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"104⤵PID:900
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"104⤵PID:4088
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F105⤵PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"104⤵PID:1544
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\448122785.xml"105⤵PID:4872
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "104⤵PID:1316
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"105⤵
- Suspicious use of AdjustPrivilegeToken
PID:700 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"106⤵PID:3580
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"106⤵PID:3964
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"107⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"108⤵PID:740
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"108⤵PID:4112
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F109⤵PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"108⤵PID:1068
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1286602972.xml"109⤵PID:3012
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "108⤵PID:4812
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "108⤵PID:2024
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"109⤵
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"110⤵PID:4836
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"110⤵PID:4604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:5108
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"111⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"112⤵PID:1496
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"112⤵PID:4416
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F113⤵PID:4752
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"112⤵PID:3328
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\157780333.xml"113⤵PID:1668
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "112⤵PID:692
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"113⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"114⤵PID:4872
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"114⤵PID:4728
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3520 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"116⤵PID:3880
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"116⤵PID:1936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:3372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F117⤵PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"116⤵PID:2736
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\150857513.xml"117⤵PID:3580
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "116⤵PID:4484
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"117⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"118⤵PID:2336
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"118⤵PID:3484
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:808 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"120⤵PID:4320
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"120⤵PID:2024
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F121⤵PID:3384
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"120⤵PID:5108
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:3428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1289006129.xml"121⤵
- System Location Discovery: System Language Discovery
PID:748
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "120⤵PID:3340
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"121⤵
- Suspicious use of AdjustPrivilegeToken
PID:3244 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"122⤵PID:876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-