Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe
Resource
win10v2004-20241007-en
General
-
Target
d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe
-
Size
220KB
-
MD5
30e73f871d7eea01c3b848e2c89142b4
-
SHA1
81a18f8c3df46c501af7f555b6a42f55f9601c7d
-
SHA256
d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7
-
SHA512
4b505debb845bd6196cac0e29bc4b0b806f2ea47109c2b1ad8bf8456ef1993ca6bb78db167426ea88dc57c6773056af0f69acce51531d5f250a489082e0cdf90
-
SSDEEP
6144:t1JIfielipuGOMlliO1DmWIgff9aGzde4qz7:t1JKi8ciYq0fZzqz7
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wmirpcf.exe -
Deletes itself 1 IoCs
pid Process 4048 wmirpcf.exe -
Executes dropped EXE 64 IoCs
pid Process 1460 wmirpcf.exe 4048 wmirpcf.exe 4012 wmirpcf.exe 232 wmirpcf.exe 2196 wmirpcf.exe 4688 wmirpcf.exe 2780 wmirpcf.exe 2488 wmirpcf.exe 2728 wmirpcf.exe 4772 wmirpcf.exe 1912 wmirpcf.exe 736 wmirpcf.exe 2112 wmirpcf.exe 3864 wmirpcf.exe 2424 wmirpcf.exe 820 wmirpcf.exe 516 wmirpcf.exe 2776 wmirpcf.exe 1312 wmirpcf.exe 2300 wmirpcf.exe 2400 wmirpcf.exe 4012 wmirpcf.exe 3832 wmirpcf.exe 2540 wmirpcf.exe 904 wmirpcf.exe 2996 wmirpcf.exe 4112 wmirpcf.exe 536 wmirpcf.exe 2856 wmirpcf.exe 3136 wmirpcf.exe 1732 wmirpcf.exe 4720 wmirpcf.exe 2248 wmirpcf.exe 4280 wmirpcf.exe 1112 wmirpcf.exe 1152 wmirpcf.exe 672 wmirpcf.exe 1268 wmirpcf.exe 2004 wmirpcf.exe 1120 wmirpcf.exe 3444 wmirpcf.exe 3184 wmirpcf.exe 4164 wmirpcf.exe 3832 wmirpcf.exe 1916 wmirpcf.exe 1680 wmirpcf.exe 4536 wmirpcf.exe 1716 wmirpcf.exe 3100 wmirpcf.exe 2256 wmirpcf.exe 632 wmirpcf.exe 4216 wmirpcf.exe 4480 wmirpcf.exe 4900 wmirpcf.exe 2144 wmirpcf.exe 3192 wmirpcf.exe 2528 wmirpcf.exe 1880 wmirpcf.exe 4936 wmirpcf.exe 2148 wmirpcf.exe 2616 wmirpcf.exe 2240 wmirpcf.exe 3812 wmirpcf.exe 2372 wmirpcf.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 216 set thread context of 4992 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 84 PID 1460 set thread context of 4048 1460 wmirpcf.exe 86 PID 4012 set thread context of 232 4012 wmirpcf.exe 88 PID 2196 set thread context of 4688 2196 wmirpcf.exe 90 PID 2780 set thread context of 2488 2780 wmirpcf.exe 94 PID 2728 set thread context of 4772 2728 wmirpcf.exe 98 PID 1912 set thread context of 736 1912 wmirpcf.exe 101 PID 2112 set thread context of 3864 2112 wmirpcf.exe 103 PID 2424 set thread context of 820 2424 wmirpcf.exe 107 PID 516 set thread context of 2776 516 wmirpcf.exe 109 PID 1312 set thread context of 2300 1312 wmirpcf.exe 111 PID 2400 set thread context of 4012 2400 wmirpcf.exe 113 PID 3832 set thread context of 2540 3832 wmirpcf.exe 115 PID 904 set thread context of 2996 904 wmirpcf.exe 117 PID 4112 set thread context of 536 4112 wmirpcf.exe 119 PID 2856 set thread context of 3136 2856 wmirpcf.exe 121 PID 1732 set thread context of 4720 1732 wmirpcf.exe 123 PID 2248 set thread context of 4280 2248 wmirpcf.exe 125 PID 1112 set thread context of 1152 1112 wmirpcf.exe 128 PID 672 set thread context of 1268 672 wmirpcf.exe 130 PID 2004 set thread context of 1120 2004 wmirpcf.exe 133 PID 3444 set thread context of 3184 3444 wmirpcf.exe 135 PID 4164 set thread context of 3832 4164 wmirpcf.exe 137 PID 1916 set thread context of 1680 1916 wmirpcf.exe 139 PID 4536 set thread context of 1716 4536 wmirpcf.exe 141 PID 3100 set thread context of 2256 3100 wmirpcf.exe 143 PID 632 set thread context of 4216 632 wmirpcf.exe 145 PID 4480 set thread context of 4900 4480 wmirpcf.exe 147 PID 2144 set thread context of 3192 2144 wmirpcf.exe 149 PID 2528 set thread context of 1880 2528 wmirpcf.exe 151 PID 4936 set thread context of 2148 4936 wmirpcf.exe 153 PID 2616 set thread context of 2240 2616 wmirpcf.exe 155 PID 3812 set thread context of 2372 3812 wmirpcf.exe 157 PID 4868 set thread context of 3808 4868 wmirpcf.exe 159 PID 1300 set thread context of 5112 1300 wmirpcf.exe 161 PID 4372 set thread context of 4612 4372 wmirpcf.exe 163 PID 4524 set thread context of 1352 4524 wmirpcf.exe 165 PID 4800 set thread context of 2264 4800 wmirpcf.exe 167 PID 4564 set thread context of 1732 4564 wmirpcf.exe 169 PID 3260 set thread context of 2716 3260 wmirpcf.exe 171 PID 3176 set thread context of 1280 3176 wmirpcf.exe 173 PID 1688 set thread context of 4316 1688 wmirpcf.exe 175 PID 228 set thread context of 1036 228 wmirpcf.exe 177 PID 1624 set thread context of 2160 1624 wmirpcf.exe 179 PID 3984 set thread context of 4848 3984 wmirpcf.exe 181 PID 1576 set thread context of 3912 1576 wmirpcf.exe 183 PID 3652 set thread context of 4724 3652 wmirpcf.exe 185 PID 2860 set thread context of 2976 2860 wmirpcf.exe 187 PID 748 set thread context of 3348 748 wmirpcf.exe 189 PID 4860 set thread context of 4648 4860 wmirpcf.exe 191 PID 3684 set thread context of 1188 3684 wmirpcf.exe 193 PID 1980 set thread context of 3664 1980 wmirpcf.exe 195 PID 3176 set thread context of 1100 3176 wmirpcf.exe 197 PID 4520 set thread context of 1536 4520 wmirpcf.exe 199 PID 4792 set thread context of 4968 4792 wmirpcf.exe 201 PID 5108 set thread context of 2004 5108 wmirpcf.exe 203 PID 1668 set thread context of 1220 1668 wmirpcf.exe 205 PID 1776 set thread context of 1984 1776 wmirpcf.exe 207 PID 3368 set thread context of 3436 3368 wmirpcf.exe 209 PID 2864 set thread context of 3724 2864 wmirpcf.exe 211 PID 468 set thread context of 3656 468 wmirpcf.exe 213 PID 2704 set thread context of 3428 2704 wmirpcf.exe 215 PID 4552 set thread context of 2748 4552 wmirpcf.exe 217 PID 4860 set thread context of 2192 4860 wmirpcf.exe 219 -
resource yara_rule behavioral2/memory/4992-3-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4992-5-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4992-4-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4992-8-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4992-9-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4992-11-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4992-10-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4992-76-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4048-84-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4048-86-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4048-87-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4048-85-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4048-92-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/232-101-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/232-103-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/232-102-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/232-105-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4688-115-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4688-116-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4688-117-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4688-119-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2488-129-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2488-130-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2488-132-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2488-131-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2488-134-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4772-146-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4772-147-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4772-145-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4772-144-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4772-149-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/736-160-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/736-166-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3864-176-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3864-182-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/820-192-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/820-198-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2776-213-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2300-223-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2300-230-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4012-245-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2540-257-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2540-261-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2996-276-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/536-292-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3136-302-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3136-308-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4720-323-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4280-338-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/1152-354-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/1268-369-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/1120-384-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3184-399-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3832-409-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3832-415-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/1680-426-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/1680-429-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/1716-442-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/2256-455-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4216-464-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4216-469-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4900-482-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/3192-495-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/1880-508-0x0000000000400000-0x0000000000460000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4992 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 4992 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 4048 wmirpcf.exe 4048 wmirpcf.exe 232 wmirpcf.exe 232 wmirpcf.exe 4688 wmirpcf.exe 4688 wmirpcf.exe 2488 wmirpcf.exe 2488 wmirpcf.exe 4772 wmirpcf.exe 4772 wmirpcf.exe 736 wmirpcf.exe 736 wmirpcf.exe 3864 wmirpcf.exe 3864 wmirpcf.exe 820 wmirpcf.exe 820 wmirpcf.exe 2776 wmirpcf.exe 2776 wmirpcf.exe 2300 wmirpcf.exe 2300 wmirpcf.exe 4012 wmirpcf.exe 4012 wmirpcf.exe 2540 wmirpcf.exe 2540 wmirpcf.exe 2996 wmirpcf.exe 2996 wmirpcf.exe 536 wmirpcf.exe 536 wmirpcf.exe 3136 wmirpcf.exe 3136 wmirpcf.exe 4720 wmirpcf.exe 4720 wmirpcf.exe 4280 wmirpcf.exe 4280 wmirpcf.exe 1152 wmirpcf.exe 1152 wmirpcf.exe 1268 wmirpcf.exe 1268 wmirpcf.exe 1120 wmirpcf.exe 1120 wmirpcf.exe 3184 wmirpcf.exe 3184 wmirpcf.exe 3832 wmirpcf.exe 3832 wmirpcf.exe 1680 wmirpcf.exe 1680 wmirpcf.exe 1716 wmirpcf.exe 1716 wmirpcf.exe 2256 wmirpcf.exe 2256 wmirpcf.exe 4216 wmirpcf.exe 4216 wmirpcf.exe 4900 wmirpcf.exe 4900 wmirpcf.exe 3192 wmirpcf.exe 3192 wmirpcf.exe 1880 wmirpcf.exe 1880 wmirpcf.exe 2148 wmirpcf.exe 2148 wmirpcf.exe 2240 wmirpcf.exe 2240 wmirpcf.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 1460 wmirpcf.exe 4012 wmirpcf.exe 2196 wmirpcf.exe 2780 wmirpcf.exe 2728 wmirpcf.exe 1912 wmirpcf.exe 2112 wmirpcf.exe 2424 wmirpcf.exe 516 wmirpcf.exe 1312 wmirpcf.exe 2400 wmirpcf.exe 3832 wmirpcf.exe 904 wmirpcf.exe 4112 wmirpcf.exe 2856 wmirpcf.exe 1732 wmirpcf.exe 2248 wmirpcf.exe 1112 wmirpcf.exe 672 wmirpcf.exe 2004 wmirpcf.exe 3444 wmirpcf.exe 4164 wmirpcf.exe 1916 wmirpcf.exe 4536 wmirpcf.exe 3100 wmirpcf.exe 632 wmirpcf.exe 4480 wmirpcf.exe 2144 wmirpcf.exe 2528 wmirpcf.exe 4936 wmirpcf.exe 2616 wmirpcf.exe 3812 wmirpcf.exe 4868 wmirpcf.exe 1300 wmirpcf.exe 4372 wmirpcf.exe 4524 wmirpcf.exe 4800 wmirpcf.exe 4564 wmirpcf.exe 3260 wmirpcf.exe 3176 wmirpcf.exe 1688 wmirpcf.exe 228 wmirpcf.exe 1624 wmirpcf.exe 3984 wmirpcf.exe 1576 wmirpcf.exe 3652 wmirpcf.exe 2860 wmirpcf.exe 748 wmirpcf.exe 4860 wmirpcf.exe 3684 wmirpcf.exe 1980 wmirpcf.exe 3176 wmirpcf.exe 4520 wmirpcf.exe 4792 wmirpcf.exe 5108 wmirpcf.exe 1668 wmirpcf.exe 1776 wmirpcf.exe 3368 wmirpcf.exe 2864 wmirpcf.exe 468 wmirpcf.exe 2704 wmirpcf.exe 4552 wmirpcf.exe 4860 wmirpcf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 4992 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 84 PID 216 wrote to memory of 4992 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 84 PID 216 wrote to memory of 4992 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 84 PID 216 wrote to memory of 4992 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 84 PID 216 wrote to memory of 4992 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 84 PID 216 wrote to memory of 4992 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 84 PID 216 wrote to memory of 4992 216 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 84 PID 4992 wrote to memory of 1460 4992 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 85 PID 4992 wrote to memory of 1460 4992 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 85 PID 4992 wrote to memory of 1460 4992 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 85 PID 1460 wrote to memory of 4048 1460 wmirpcf.exe 86 PID 1460 wrote to memory of 4048 1460 wmirpcf.exe 86 PID 1460 wrote to memory of 4048 1460 wmirpcf.exe 86 PID 1460 wrote to memory of 4048 1460 wmirpcf.exe 86 PID 1460 wrote to memory of 4048 1460 wmirpcf.exe 86 PID 1460 wrote to memory of 4048 1460 wmirpcf.exe 86 PID 1460 wrote to memory of 4048 1460 wmirpcf.exe 86 PID 4048 wrote to memory of 4012 4048 wmirpcf.exe 87 PID 4048 wrote to memory of 4012 4048 wmirpcf.exe 87 PID 4048 wrote to memory of 4012 4048 wmirpcf.exe 87 PID 4012 wrote to memory of 232 4012 wmirpcf.exe 88 PID 4012 wrote to memory of 232 4012 wmirpcf.exe 88 PID 4012 wrote to memory of 232 4012 wmirpcf.exe 88 PID 4012 wrote to memory of 232 4012 wmirpcf.exe 88 PID 4012 wrote to memory of 232 4012 wmirpcf.exe 88 PID 4012 wrote to memory of 232 4012 wmirpcf.exe 88 PID 4012 wrote to memory of 232 4012 wmirpcf.exe 88 PID 232 wrote to memory of 2196 232 wmirpcf.exe 89 PID 232 wrote to memory of 2196 232 wmirpcf.exe 89 PID 232 wrote to memory of 2196 232 wmirpcf.exe 89 PID 2196 wrote to memory of 4688 2196 wmirpcf.exe 90 PID 2196 wrote to memory of 4688 2196 wmirpcf.exe 90 PID 2196 wrote to memory of 4688 2196 wmirpcf.exe 90 PID 2196 wrote to memory of 4688 2196 wmirpcf.exe 90 PID 2196 wrote to memory of 4688 2196 wmirpcf.exe 90 PID 2196 wrote to memory of 4688 2196 wmirpcf.exe 90 PID 2196 wrote to memory of 4688 2196 wmirpcf.exe 90 PID 4688 wrote to memory of 2780 4688 wmirpcf.exe 93 PID 4688 wrote to memory of 2780 4688 wmirpcf.exe 93 PID 4688 wrote to memory of 2780 4688 wmirpcf.exe 93 PID 2780 wrote to memory of 2488 2780 wmirpcf.exe 94 PID 2780 wrote to memory of 2488 2780 wmirpcf.exe 94 PID 2780 wrote to memory of 2488 2780 wmirpcf.exe 94 PID 2780 wrote to memory of 2488 2780 wmirpcf.exe 94 PID 2780 wrote to memory of 2488 2780 wmirpcf.exe 94 PID 2780 wrote to memory of 2488 2780 wmirpcf.exe 94 PID 2780 wrote to memory of 2488 2780 wmirpcf.exe 94 PID 2488 wrote to memory of 2728 2488 wmirpcf.exe 97 PID 2488 wrote to memory of 2728 2488 wmirpcf.exe 97 PID 2488 wrote to memory of 2728 2488 wmirpcf.exe 97 PID 2728 wrote to memory of 4772 2728 wmirpcf.exe 98 PID 2728 wrote to memory of 4772 2728 wmirpcf.exe 98 PID 2728 wrote to memory of 4772 2728 wmirpcf.exe 98 PID 2728 wrote to memory of 4772 2728 wmirpcf.exe 98 PID 2728 wrote to memory of 4772 2728 wmirpcf.exe 98 PID 2728 wrote to memory of 4772 2728 wmirpcf.exe 98 PID 2728 wrote to memory of 4772 2728 wmirpcf.exe 98 PID 4772 wrote to memory of 1912 4772 wmirpcf.exe 100 PID 4772 wrote to memory of 1912 4772 wmirpcf.exe 100 PID 4772 wrote to memory of 1912 4772 wmirpcf.exe 100 PID 1912 wrote to memory of 736 1912 wmirpcf.exe 101 PID 1912 wrote to memory of 736 1912 wmirpcf.exe 101 PID 1912 wrote to memory of 736 1912 wmirpcf.exe 101 PID 1912 wrote to memory of 736 1912 wmirpcf.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe"C:\Users\Admin\AppData\Local\Temp\d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exeC:\Users\Admin\AppData\Local\Temp\d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Users\Admin\AppData\Local\Temp\D2336F~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Users\Admin\AppData\Local\Temp\D2336F~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:736 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3864 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:516 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4012 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3832 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4112 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3136 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4720 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4280 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1112 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1152 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:672 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3444 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3184 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4164 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3832 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4536 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3100 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4216 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4900 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3192 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4936 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3812 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4868 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe68⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3808 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe70⤵
- Checks computer location settings
PID:5112 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4372 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe72⤵
- Checks computer location settings
- Modifies registry class
PID:4612 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4524 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe74⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4800 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe76⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe77⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe78⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe79⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3260 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe80⤵
- Checks computer location settings
PID:2716 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3176 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe82⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe84⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:228 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe86⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe88⤵
- Modifies registry class
PID:2160 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3984 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe92⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3912 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe93⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3652 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe94⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4724 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe95⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe96⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3348 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe100⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4648 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe101⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3684 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe102⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1188 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe103⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe104⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3664 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3176 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe106⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe107⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4520 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe108⤵
- Checks computer location settings
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe109⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe110⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4968 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe111⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe112⤵
- Drops file in System32 directory
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe113⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe114⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1220 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe115⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe116⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe117⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe118⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3436 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe119⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe120⤵
- Drops file in System32 directory
PID:3724 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe121⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:468 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe122⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-