Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
747.exe
Resource
win7-20240708-en
General
-
Target
747.exe
-
Size
7KB
-
MD5
d7378a262909fac70f5aa9f41a0811bf
-
SHA1
26f608d7c3d1a71057ca90e912359fa0c4358cd9
-
SHA256
9750eede207cae12bfce4c50dd1aac7edf9a54bd5f5b64d4ff8bad5d0b8394de
-
SHA512
d495eedb7de852296034a669393f054ec79397dedb45048e7a0880bbe7021a9ef0d1825f18dfe67d8d2b8dc52c453cd5d2bfe0086fc9da42270fbbc5959170ba
-
SSDEEP
96:X5T40gK4WFddriIe08H7yjSN+PlQ29zuGnGAOD1V6TuiO9zNt:1gK4WTn8by6IyYzJGxhVYub3
Malware Config
Extracted
asyncrat
1.0.7
Default
goooooooool.com:1337
sd2sadsdawqdanchun
-
delay
1
-
install
true
-
install_file
shellhost.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x003a000000016de2-156.dat family_asyncrat -
Blocklisted process makes network request 10 IoCs
flow pid Process 26 2592 747.exe 27 600 747.exe 29 1672 747.exe 31 1924 747.exe 33 1576 747.exe 34 3000 747.exe 40 2148 747.exe 41 624 747.exe 48 1528 747.exe 50 2456 747.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 64 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 972 powershell.exe 3948 powershell.exe 1564 powershell.exe 552 powershell.exe 3168 Process not Found 1528 powershell.exe 1056 Process not Found 5124 Process not Found 3484 powershell.exe 3904 powershell.exe 3644 powershell.exe 3112 powershell.exe 7696 Process not Found 1800 Process not Found 9620 Process not Found 6884 Process not Found 2504 powershell.exe 2588 powershell.exe 2760 powershell.exe 884 Process not Found 1668 powershell.exe 1652 powershell.exe 1244 powershell.exe 4048 Process not Found 3956 powershell.exe 4056 powershell.exe 3244 Process not Found 1868 powershell.exe 1804 Process not Found 2880 Process not Found 2884 powershell.exe 2872 powershell.exe 3508 Process not Found 2828 powershell.exe 1308 powershell.exe 4672 Process not Found 568 powershell.exe 2932 powershell.exe 2676 powershell.exe 5048 Process not Found 3168 powershell.exe 1924 powershell.exe 2200 powershell.exe 10380 Process not Found 1744 powershell.exe 2036 powershell.exe 2660 powershell.exe 1648 powershell.exe 1300 powershell.exe 2412 powershell.exe 1992 powershell.exe 2700 Process not Found 3352 powershell.exe 920 powershell.exe 3540 Process not Found 2264 Process not Found 2364 Process not Found 1028 powershell.exe 1972 powershell.exe 2972 Process not Found 6604 Process not Found 2316 powershell.exe 344 powershell.exe 780 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 25 IoCs
pid Process 3876 jwo3uvqg.t2d.exe 4056 qi1he4ss.v0e.exe 2844 yjjvfrq3.kc3.exe 4084 gwynp01f.pqy.exe 2688 djypbdy2.aev.exe 2392 tftpwp3k.dik.exe 3372 p03n21uj.a2n.exe 1556 4ccmmfk5.kzk.exe 3460 0cwn4jsb.ikn.exe 3660 qgudgtdf.smn.exe 3796 sgeymxi2.rgg.exe 2012 t5j1a2ew.1sy.exe 1640 qbuwib1g.q2j.exe 3312 52tixhym.3re.exe 4020 iwcdajxf.ldj.exe 3480 qof3u1dd.fvq.exe 4040 lyeym3pn.a5u.exe 3900 l1hz1wyd.f5q.exe 3892 ntspou0y.0hc.exe 1800 4v4oed1n.rgt.exe 3760 oi3bjlmn.o5d.exe 2424 5m0gaqkm.nxm.exe 4008 ukxgfzxe.ndz.exe 2760 24jsgtwo.jdq.exe 1072 ma3cf5b5.3tm.exe -
Loads dropped DLL 25 IoCs
pid Process 1744 747.exe 2496 747.exe 2808 747.exe 1672 747.exe 2592 747.exe 600 747.exe 780 747.exe 2276 747.exe 1924 747.exe 1576 747.exe 3000 747.exe 2280 747.exe 2148 747.exe 624 747.exe 2900 747.exe 2876 747.exe 292 747.exe 2448 747.exe 2200 747.exe 1528 747.exe 2340 747.exe 2756 747.exe 1508 747.exe 1536 747.exe 2456 747.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 747.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2456 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1924 schtasks.exe 1040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2816 powershell.exe 2024 powershell.exe 2896 powershell.exe 1760 powershell.exe 2600 powershell.exe 2956 powershell.exe 972 powershell.exe 1656 powershell.exe 2284 powershell.exe 2440 powershell.exe 3044 powershell.exe 2844 powershell.exe 1752 powershell.exe 1312 powershell.exe 2580 powershell.exe 1716 powershell.exe 2316 powershell.exe 2024 powershell.exe 568 powershell.exe 2336 powershell.exe 2164 powershell.exe 1512 powershell.exe 344 powershell.exe 1772 powershell.exe 2124 powershell.exe 716 powershell.exe 3168 powershell.exe 3308 powershell.exe 3520 powershell.exe 3708 powershell.exe 3904 powershell.exe 3176 powershell.exe 1744 powershell.exe 3524 powershell.exe 2336 powershell.exe 2812 powershell.exe 2076 powershell.exe 3476 powershell.exe 3052 powershell.exe 3196 powershell.exe 2740 powershell.exe 3040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2276 747.exe Token: SeDebugPrivilege 2808 747.exe Token: SeDebugPrivilege 2592 747.exe Token: SeDebugPrivilege 1672 747.exe Token: SeDebugPrivilege 1744 747.exe Token: SeDebugPrivilege 600 747.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 1760 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 1924 747.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 2496 747.exe Token: SeDebugPrivilege 780 747.exe Token: SeDebugPrivilege 972 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 2280 747.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 1576 747.exe Token: SeDebugPrivilege 3000 747.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 2148 747.exe Token: SeDebugPrivilege 624 747.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 1752 powershell.exe Token: SeDebugPrivilege 2900 747.exe Token: SeDebugPrivilege 1312 powershell.exe Token: SeDebugPrivilege 2340 747.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2876 747.exe Token: SeDebugPrivilege 292 747.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 2448 747.exe Token: SeDebugPrivilege 2200 747.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 568 powershell.exe Token: SeDebugPrivilege 1528 747.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 2756 747.exe Token: SeDebugPrivilege 2164 powershell.exe Token: SeDebugPrivilege 1536 747.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 2456 747.exe Token: SeDebugPrivilege 344 powershell.exe Token: SeDebugPrivilege 1508 747.exe Token: SeDebugPrivilege 1772 powershell.exe Token: SeDebugPrivilege 1740 747.exe Token: SeDebugPrivilege 2124 powershell.exe Token: SeDebugPrivilege 2284 747.exe Token: SeDebugPrivilege 716 powershell.exe Token: SeDebugPrivilege 3200 747.exe Token: SeDebugPrivilege 3320 747.exe Token: SeDebugPrivilege 3168 powershell.exe Token: SeDebugPrivilege 3308 powershell.exe Token: SeDebugPrivilege 3536 747.exe Token: SeDebugPrivilege 3520 powershell.exe Token: SeDebugPrivilege 3732 747.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 3928 747.exe Token: SeDebugPrivilege 3688 747.exe Token: SeDebugPrivilege 3904 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2952 2276 747.exe 30 PID 2276 wrote to memory of 2952 2276 747.exe 30 PID 2276 wrote to memory of 2952 2276 747.exe 30 PID 2276 wrote to memory of 2952 2276 747.exe 30 PID 2276 wrote to memory of 2816 2276 747.exe 32 PID 2276 wrote to memory of 2816 2276 747.exe 32 PID 2276 wrote to memory of 2816 2276 747.exe 32 PID 2276 wrote to memory of 2816 2276 747.exe 32 PID 2952 wrote to memory of 2808 2952 cmd.exe 34 PID 2952 wrote to memory of 2808 2952 cmd.exe 34 PID 2952 wrote to memory of 2808 2952 cmd.exe 34 PID 2952 wrote to memory of 2808 2952 cmd.exe 34 PID 2808 wrote to memory of 2840 2808 747.exe 35 PID 2808 wrote to memory of 2840 2808 747.exe 35 PID 2808 wrote to memory of 2840 2808 747.exe 35 PID 2808 wrote to memory of 2840 2808 747.exe 35 PID 2808 wrote to memory of 1760 2808 747.exe 37 PID 2808 wrote to memory of 1760 2808 747.exe 37 PID 2808 wrote to memory of 1760 2808 747.exe 37 PID 2808 wrote to memory of 1760 2808 747.exe 37 PID 2840 wrote to memory of 2592 2840 cmd.exe 38 PID 2840 wrote to memory of 2592 2840 cmd.exe 38 PID 2840 wrote to memory of 2592 2840 cmd.exe 38 PID 2840 wrote to memory of 2592 2840 cmd.exe 38 PID 2592 wrote to memory of 292 2592 747.exe 40 PID 2592 wrote to memory of 292 2592 747.exe 40 PID 2592 wrote to memory of 292 2592 747.exe 40 PID 2592 wrote to memory of 292 2592 747.exe 40 PID 292 wrote to memory of 1672 292 cmd.exe 42 PID 292 wrote to memory of 1672 292 cmd.exe 42 PID 292 wrote to memory of 1672 292 cmd.exe 42 PID 292 wrote to memory of 1672 292 cmd.exe 42 PID 2592 wrote to memory of 2896 2592 747.exe 43 PID 2592 wrote to memory of 2896 2592 747.exe 43 PID 2592 wrote to memory of 2896 2592 747.exe 43 PID 2592 wrote to memory of 2896 2592 747.exe 43 PID 1672 wrote to memory of 2112 1672 747.exe 45 PID 1672 wrote to memory of 2112 1672 747.exe 45 PID 1672 wrote to memory of 2112 1672 747.exe 45 PID 1672 wrote to memory of 2112 1672 747.exe 45 PID 1672 wrote to memory of 2024 1672 747.exe 47 PID 1672 wrote to memory of 2024 1672 747.exe 47 PID 1672 wrote to memory of 2024 1672 747.exe 47 PID 1672 wrote to memory of 2024 1672 747.exe 47 PID 2112 wrote to memory of 1744 2112 cmd.exe 48 PID 2112 wrote to memory of 1744 2112 cmd.exe 48 PID 2112 wrote to memory of 1744 2112 cmd.exe 48 PID 2112 wrote to memory of 1744 2112 cmd.exe 48 PID 1744 wrote to memory of 1540 1744 747.exe 50 PID 1744 wrote to memory of 1540 1744 747.exe 50 PID 1744 wrote to memory of 1540 1744 747.exe 50 PID 1744 wrote to memory of 1540 1744 747.exe 50 PID 1744 wrote to memory of 2600 1744 747.exe 52 PID 1744 wrote to memory of 2600 1744 747.exe 52 PID 1744 wrote to memory of 2600 1744 747.exe 52 PID 1744 wrote to memory of 2600 1744 747.exe 52 PID 1540 wrote to memory of 600 1540 cmd.exe 54 PID 1540 wrote to memory of 600 1540 cmd.exe 54 PID 1540 wrote to memory of 600 1540 cmd.exe 54 PID 1540 wrote to memory of 600 1540 cmd.exe 54 PID 600 wrote to memory of 1580 600 747.exe 55 PID 600 wrote to memory of 1580 600 747.exe 55 PID 600 wrote to memory of 1580 600 747.exe 55 PID 600 wrote to memory of 1580 600 747.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"7⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT8⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"9⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT10⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"11⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT12⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"13⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT14⤵
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"15⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT16⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"17⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT18⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"19⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT20⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"21⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT22⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"23⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT24⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"25⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT26⤵
- System Location Discovery: System Language Discovery
PID:848 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"27⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT28⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"29⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT30⤵
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"31⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT32⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"33⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT34⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"35⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT36⤵
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"37⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT38⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"39⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT40⤵
- System Location Discovery: System Language Discovery
PID:996 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"41⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT42⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"43⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT44⤵
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"45⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT46⤵
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"47⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT48⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"49⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT50⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"51⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT52⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"53⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT54⤵
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"55⤵
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT56⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"57⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT58⤵
- System Location Discovery: System Language Discovery
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"59⤵
- Suspicious use of AdjustPrivilegeToken
PID:3536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT60⤵
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"61⤵
- Suspicious use of AdjustPrivilegeToken
PID:3732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT62⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"63⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT64⤵
- System Location Discovery: System Language Discovery
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"65⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT66⤵
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"67⤵
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT68⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"69⤵PID:2152
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT70⤵
- System Location Discovery: System Language Discovery
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"71⤵
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT72⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"73⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT74⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"75⤵
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT76⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"77⤵
- System Location Discovery: System Language Discovery
PID:3136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT78⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"79⤵PID:1664
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT80⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"81⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT82⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"83⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT84⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"85⤵PID:2676
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT86⤵
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"87⤵PID:3184
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT88⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"89⤵PID:2772
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT90⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"91⤵PID:1440
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT92⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"93⤵PID:2628
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT94⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"95⤵PID:3784
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT96⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"97⤵PID:2524
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT98⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"99⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT100⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"101⤵PID:1508
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT102⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"103⤵PID:2412
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT104⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"105⤵PID:2888
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT106⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"107⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT108⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"109⤵PID:3876
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT110⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"111⤵PID:776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT112⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"113⤵PID:624
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT114⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"115⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT116⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"117⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT118⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"119⤵PID:3248
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT120⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\747.exe"C:\Users\Admin\AppData\Local\Temp\747.exe"121⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k START "" "C:\Users\Admin\AppData\Local\Temp\747.exe" & EXIT122⤵PID:3040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-