Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe
Resource
win10v2004-20241007-en
General
-
Target
da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe
-
Size
112KB
-
MD5
8730099121a477763cdb5fb5107f878e
-
SHA1
67b95a1b80f54b4b324f199e7555ea935ad68459
-
SHA256
da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1
-
SHA512
25086e43ae6c519662b628201671d4703f7102f338f020c94906a66fd168e52b41f3c8c253c53d9c54ddf5a8ee17cccb998821478ef5ef8c939656a97847bce4
-
SSDEEP
1536:taFSpzohUHIhKGdZvR0InLdV2MJbQT8jJHQjFedghKIYxViuLfI6LVWyZ+Uj:cFS8zv3xkMJbQTcwRL8IQV9TL8yAUj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 64 IoCs
Processes:
da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exedescription pid Process procid_target PID 2624 set thread context of 1660 2624 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 84 PID 1660 set thread context of 212 1660 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 85 PID 212 set thread context of 3332 212 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 86 PID 3332 set thread context of 1564 3332 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 87 PID 1564 set thread context of 4864 1564 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 88 PID 4864 set thread context of 808 4864 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 89 PID 808 set thread context of 2740 808 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 90 PID 2740 set thread context of 1400 2740 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 91 PID 1400 set thread context of 2152 1400 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 92 PID 2152 set thread context of 2112 2152 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 93 PID 2112 set thread context of 5088 2112 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 94 PID 5088 set thread context of 4372 5088 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 95 PID 4372 set thread context of 4640 4372 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 96 PID 4640 set thread context of 4012 4640 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 97 PID 4012 set thread context of 4264 4012 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 98 PID 4264 set thread context of 4008 4264 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 99 PID 4008 set thread context of 3624 4008 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 100 PID 3624 set thread context of 2524 3624 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 101 PID 2524 set thread context of 5096 2524 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 102 PID 5096 set thread context of 324 5096 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 103 PID 324 set thread context of 4888 324 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 104 PID 4888 set thread context of 3692 4888 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 105 PID 3692 set thread context of 756 3692 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 106 PID 756 set thread context of 2512 756 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 107 PID 2512 set thread context of 4284 2512 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 108 PID 4284 set thread context of 3704 4284 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 109 PID 3704 set thread context of 2444 3704 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 110 PID 2444 set thread context of 3268 2444 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 111 PID 3268 set thread context of 316 3268 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 112 PID 316 set thread context of 4728 316 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 113 PID 4728 set thread context of 2248 4728 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 114 PID 2248 set thread context of 3020 2248 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 115 PID 3020 set thread context of 2268 3020 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 116 PID 2268 set thread context of 3348 2268 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 117 PID 3348 set thread context of 1964 3348 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 118 PID 1964 set thread context of 924 1964 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 119 PID 924 set thread context of 1156 924 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 120 PID 1156 set thread context of 1484 1156 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 121 PID 1484 set thread context of 1032 1484 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 122 PID 1032 set thread context of 3640 1032 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 123 PID 3640 set thread context of 1860 3640 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 124 PID 1860 set thread context of 4452 1860 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 125 PID 4452 set thread context of 4956 4452 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 126 PID 4956 set thread context of 2996 4956 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 127 PID 2996 set thread context of 1312 2996 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 128 PID 1312 set thread context of 4504 1312 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 129 PID 4504 set thread context of 2224 4504 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 130 PID 2224 set thread context of 2528 2224 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 131 PID 2528 set thread context of 1756 2528 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 132 PID 1756 set thread context of 2500 1756 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 133 PID 2500 set thread context of 4752 2500 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 134 PID 4752 set thread context of 2960 4752 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 135 PID 2960 set thread context of 2244 2960 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 136 PID 2244 set thread context of 4432 2244 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 137 PID 4432 set thread context of 3360 4432 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 138 PID 3360 set thread context of 1008 3360 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 139 PID 1008 set thread context of 4948 1008 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 140 PID 4948 set thread context of 2644 4948 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 141 PID 2644 set thread context of 4540 2644 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 142 PID 4540 set thread context of 4884 4540 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 143 PID 4884 set thread context of 2156 4884 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 144 PID 2156 set thread context of 228 2156 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 145 PID 228 set thread context of 864 228 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 146 PID 864 set thread context of 4220 864 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 147 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5944 5164 WerFault.exe 652 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeda7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exedescription pid Process procid_target PID 2624 wrote to memory of 1660 2624 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 84 PID 2624 wrote to memory of 1660 2624 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 84 PID 2624 wrote to memory of 1660 2624 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 84 PID 2624 wrote to memory of 1660 2624 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 84 PID 2624 wrote to memory of 1660 2624 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 84 PID 1660 wrote to memory of 212 1660 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 85 PID 1660 wrote to memory of 212 1660 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 85 PID 1660 wrote to memory of 212 1660 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 85 PID 1660 wrote to memory of 212 1660 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 85 PID 1660 wrote to memory of 212 1660 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 85 PID 212 wrote to memory of 3332 212 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 86 PID 212 wrote to memory of 3332 212 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 86 PID 212 wrote to memory of 3332 212 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 86 PID 212 wrote to memory of 3332 212 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 86 PID 212 wrote to memory of 3332 212 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 86 PID 3332 wrote to memory of 1564 3332 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 87 PID 3332 wrote to memory of 1564 3332 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 87 PID 3332 wrote to memory of 1564 3332 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 87 PID 3332 wrote to memory of 1564 3332 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 87 PID 3332 wrote to memory of 1564 3332 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 87 PID 1564 wrote to memory of 4864 1564 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 88 PID 1564 wrote to memory of 4864 1564 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 88 PID 1564 wrote to memory of 4864 1564 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 88 PID 1564 wrote to memory of 4864 1564 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 88 PID 1564 wrote to memory of 4864 1564 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 88 PID 4864 wrote to memory of 808 4864 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 89 PID 4864 wrote to memory of 808 4864 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 89 PID 4864 wrote to memory of 808 4864 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 89 PID 4864 wrote to memory of 808 4864 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 89 PID 4864 wrote to memory of 808 4864 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 89 PID 808 wrote to memory of 2740 808 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 90 PID 808 wrote to memory of 2740 808 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 90 PID 808 wrote to memory of 2740 808 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 90 PID 808 wrote to memory of 2740 808 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 90 PID 808 wrote to memory of 2740 808 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 90 PID 2740 wrote to memory of 1400 2740 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 91 PID 2740 wrote to memory of 1400 2740 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 91 PID 2740 wrote to memory of 1400 2740 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 91 PID 2740 wrote to memory of 1400 2740 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 91 PID 2740 wrote to memory of 1400 2740 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 91 PID 1400 wrote to memory of 2152 1400 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 92 PID 1400 wrote to memory of 2152 1400 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 92 PID 1400 wrote to memory of 2152 1400 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 92 PID 1400 wrote to memory of 2152 1400 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 92 PID 1400 wrote to memory of 2152 1400 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 92 PID 2152 wrote to memory of 2112 2152 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 93 PID 2152 wrote to memory of 2112 2152 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 93 PID 2152 wrote to memory of 2112 2152 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 93 PID 2152 wrote to memory of 2112 2152 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 93 PID 2152 wrote to memory of 2112 2152 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 93 PID 2112 wrote to memory of 5088 2112 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 94 PID 2112 wrote to memory of 5088 2112 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 94 PID 2112 wrote to memory of 5088 2112 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 94 PID 2112 wrote to memory of 5088 2112 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 94 PID 2112 wrote to memory of 5088 2112 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 94 PID 5088 wrote to memory of 4372 5088 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 95 PID 5088 wrote to memory of 4372 5088 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 95 PID 5088 wrote to memory of 4372 5088 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 95 PID 5088 wrote to memory of 4372 5088 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 95 PID 5088 wrote to memory of 4372 5088 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 95 PID 4372 wrote to memory of 4640 4372 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 96 PID 4372 wrote to memory of 4640 4372 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 96 PID 4372 wrote to memory of 4640 4372 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 96 PID 4372 wrote to memory of 4640 4372 da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe"C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe7⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe9⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe10⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe14⤵
- Suspicious use of SetThreadContext
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe15⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe16⤵
- Suspicious use of SetThreadContext
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe17⤵
- Suspicious use of SetThreadContext
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe18⤵
- Suspicious use of SetThreadContext
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe19⤵
- Suspicious use of SetThreadContext
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe20⤵
- Suspicious use of SetThreadContext
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe21⤵
- Suspicious use of SetThreadContext
PID:324 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe22⤵
- Suspicious use of SetThreadContext
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe23⤵
- Suspicious use of SetThreadContext
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe24⤵
- Suspicious use of SetThreadContext
PID:756 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe25⤵
- Suspicious use of SetThreadContext
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe26⤵
- Suspicious use of SetThreadContext
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe27⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe28⤵
- Suspicious use of SetThreadContext
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe29⤵
- Suspicious use of SetThreadContext
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe30⤵
- Suspicious use of SetThreadContext
PID:316 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe31⤵
- Suspicious use of SetThreadContext
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe32⤵
- Suspicious use of SetThreadContext
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe33⤵
- Suspicious use of SetThreadContext
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe34⤵
- Suspicious use of SetThreadContext
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe35⤵
- Suspicious use of SetThreadContext
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe36⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe37⤵
- Suspicious use of SetThreadContext
PID:924 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe38⤵
- Suspicious use of SetThreadContext
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe39⤵
- Suspicious use of SetThreadContext
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe40⤵
- Suspicious use of SetThreadContext
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe41⤵
- Suspicious use of SetThreadContext
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe42⤵
- Suspicious use of SetThreadContext
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe43⤵
- Suspicious use of SetThreadContext
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe44⤵
- Suspicious use of SetThreadContext
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe45⤵
- Suspicious use of SetThreadContext
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe46⤵
- Suspicious use of SetThreadContext
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe47⤵
- Suspicious use of SetThreadContext
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe48⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe49⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe50⤵
- Suspicious use of SetThreadContext
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe51⤵
- Suspicious use of SetThreadContext
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe52⤵
- Suspicious use of SetThreadContext
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe53⤵
- Suspicious use of SetThreadContext
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe54⤵
- Suspicious use of SetThreadContext
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe55⤵
- Suspicious use of SetThreadContext
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe56⤵
- Suspicious use of SetThreadContext
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe57⤵
- Suspicious use of SetThreadContext
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe58⤵
- Suspicious use of SetThreadContext
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe59⤵
- Suspicious use of SetThreadContext
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe60⤵
- Suspicious use of SetThreadContext
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe61⤵
- Suspicious use of SetThreadContext
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe62⤵
- Suspicious use of SetThreadContext
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe63⤵
- Suspicious use of SetThreadContext
PID:228 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe64⤵
- Suspicious use of SetThreadContext
PID:864 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe65⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe66⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe67⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe68⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe69⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe70⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe71⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe72⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe73⤵
- System Location Discovery: System Language Discovery
PID:792 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe74⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe75⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe76⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe77⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe78⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe79⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe80⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe81⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe82⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe83⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe84⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe85⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe86⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe87⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe88⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe89⤵
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe90⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe91⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe92⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe93⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe94⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe95⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe96⤵
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe97⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe98⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe99⤵
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe100⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe101⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe102⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe103⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe104⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe105⤵
- System Location Discovery: System Language Discovery
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe106⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe107⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe108⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe109⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe110⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe111⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe112⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe113⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe114⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe115⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe116⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe117⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe118⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe119⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe120⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe121⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exeC:\Users\Admin\AppData\Local\Temp\da7ba6743ff18a14522d68cc59c0f01d5fd6f7d1886541bf4016e62487f146a1.exe122⤵PID:4468
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-