Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 18:22
Behavioral task
behavioral1
Sample
2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe
-
Size
1.0MB
-
MD5
0aa3e15460b1a3f22eca1420b9928f0a
-
SHA1
cbe35d8fbcaaa9a20c1be6bcf95088823a42b592
-
SHA256
a13c72b97622964c9aa04e414a281a831ee7a66c6c16bf7d022fa5d13b881771
-
SHA512
3f53c77d9a9a1d33260d139ada7d02149251bfccfc59f8c222089db9ccbbd1eb4865a45e5004d9aa399530e5c5c4b462c1f2026f1385b27e2fd8e277af8680b5
-
SSDEEP
24576:JcQi2yQSu77BeUMjBMiIZ0Bl3XZ/h8mebhO6ds:JcQij2BeUMVMiIZ0j3n8me9O6ds
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x0008000000016d4f-2.dat family_neshta behavioral1/files/0x000700000001033a-16.dat family_neshta behavioral1/files/0x0022000000010678-15.dat family_neshta behavioral1/files/0x0007000000016d58-14.dat family_neshta behavioral1/files/0x0001000000010312-23.dat family_neshta behavioral1/files/0x0001000000010314-26.dat family_neshta behavioral1/memory/1788-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2864-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2760-46-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2084-47-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2736-60-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2852-59-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2916-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2604-73-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2268-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1648-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2664-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1860-101-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7d3-119.dat family_neshta behavioral1/files/0x000100000000f7e6-123.dat family_neshta behavioral1/files/0x000100000000f7ca-122.dat family_neshta behavioral1/memory/1620-128-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2384-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f776-121.dat family_neshta behavioral1/files/0x000100000000f7d8-120.dat family_neshta behavioral1/memory/1876-142-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1836-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2780-160-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2488-159-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1472-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2700-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1948-191-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1120-192-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1644-209-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1824-208-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/688-217-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/780-216-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1668-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2540-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1052-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2356-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2100-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1816-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2076-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/580-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2208-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2820-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2804-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2760-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2332-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2740-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2916-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2660-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2404-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1096-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2592-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1588-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1996-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2664-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1272-360-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1308-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1504-369-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2908-368-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1404-376-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 3068 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 1788 svchost.com 2864 2024-1~1.EXE 2760 svchost.com 2084 2024-1~1.EXE 2736 svchost.com 2852 2024-1~1.EXE 2916 svchost.com 2604 2024-1~1.EXE 2268 svchost.com 1648 2024-1~1.EXE 2664 svchost.com 1860 2024-1~1.EXE 1620 svchost.com 2384 2024-1~1.EXE 1876 svchost.com 1836 2024-1~1.EXE 2780 svchost.com 2488 2024-1~1.EXE 2700 svchost.com 1472 2024-1~1.EXE 1120 svchost.com 1948 2024-1~1.EXE 1824 svchost.com 1644 2024-1~1.EXE 688 svchost.com 780 2024-1~1.EXE 1668 svchost.com 2540 2024-1~1.EXE 2356 svchost.com 1052 2024-1~1.EXE 1816 svchost.com 2100 2024-1~1.EXE 2076 svchost.com 580 2024-1~1.EXE 2820 svchost.com 2208 2024-1~1.EXE 2760 svchost.com 2804 2024-1~1.EXE 2332 svchost.com 2740 2024-1~1.EXE 2660 svchost.com 2916 2024-1~1.EXE 2404 svchost.com 1096 2024-1~1.EXE 1588 svchost.com 2592 2024-1~1.EXE 1996 svchost.com 2664 2024-1~1.EXE 1308 svchost.com 1272 2024-1~1.EXE 1504 svchost.com 2908 2024-1~1.EXE 1764 svchost.com 1404 2024-1~1.EXE 3028 svchost.com 2304 2024-1~1.EXE 2552 svchost.com 2292 2024-1~1.EXE 2780 svchost.com 864 2024-1~1.EXE 2964 svchost.com 2784 2024-1~1.EXE 1324 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 1788 svchost.com 1788 svchost.com 2760 svchost.com 2760 svchost.com 2736 svchost.com 2736 svchost.com 2916 svchost.com 2916 svchost.com 2268 svchost.com 2268 svchost.com 2664 svchost.com 2664 svchost.com 1620 svchost.com 1620 svchost.com 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 3068 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 1876 svchost.com 1876 svchost.com 2780 svchost.com 2780 svchost.com 2700 svchost.com 2700 svchost.com 1120 svchost.com 1120 svchost.com 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 1824 svchost.com 1824 svchost.com 688 svchost.com 688 svchost.com 1668 svchost.com 1668 svchost.com 2356 svchost.com 2356 svchost.com 1816 svchost.com 1816 svchost.com 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 2076 svchost.com 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 2076 svchost.com 2820 svchost.com 2820 svchost.com 2760 svchost.com 2760 svchost.com 2332 svchost.com 2332 svchost.com 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 2660 svchost.com 2660 svchost.com 2404 svchost.com 2404 svchost.com 1588 svchost.com 1588 svchost.com 1996 svchost.com 1996 svchost.com 1308 svchost.com 1308 svchost.com 1504 svchost.com 1504 svchost.com 1764 svchost.com 1764 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2024-1~1.EXE File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2024-1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3068 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 30 PID 2860 wrote to memory of 3068 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 30 PID 2860 wrote to memory of 3068 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 30 PID 2860 wrote to memory of 3068 2860 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 30 PID 3068 wrote to memory of 1788 3068 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 31 PID 3068 wrote to memory of 1788 3068 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 31 PID 3068 wrote to memory of 1788 3068 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 31 PID 3068 wrote to memory of 1788 3068 2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe 31 PID 1788 wrote to memory of 2864 1788 svchost.com 32 PID 1788 wrote to memory of 2864 1788 svchost.com 32 PID 1788 wrote to memory of 2864 1788 svchost.com 32 PID 1788 wrote to memory of 2864 1788 svchost.com 32 PID 2864 wrote to memory of 2760 2864 2024-1~1.EXE 67 PID 2864 wrote to memory of 2760 2864 2024-1~1.EXE 67 PID 2864 wrote to memory of 2760 2864 2024-1~1.EXE 67 PID 2864 wrote to memory of 2760 2864 2024-1~1.EXE 67 PID 2760 wrote to memory of 2084 2760 svchost.com 34 PID 2760 wrote to memory of 2084 2760 svchost.com 34 PID 2760 wrote to memory of 2084 2760 svchost.com 34 PID 2760 wrote to memory of 2084 2760 svchost.com 34 PID 2084 wrote to memory of 2736 2084 2024-1~1.EXE 35 PID 2084 wrote to memory of 2736 2084 2024-1~1.EXE 35 PID 2084 wrote to memory of 2736 2084 2024-1~1.EXE 35 PID 2084 wrote to memory of 2736 2084 2024-1~1.EXE 35 PID 2736 wrote to memory of 2852 2736 svchost.com 36 PID 2736 wrote to memory of 2852 2736 svchost.com 36 PID 2736 wrote to memory of 2852 2736 svchost.com 36 PID 2736 wrote to memory of 2852 2736 svchost.com 36 PID 2852 wrote to memory of 2916 2852 2024-1~1.EXE 72 PID 2852 wrote to memory of 2916 2852 2024-1~1.EXE 72 PID 2852 wrote to memory of 2916 2852 2024-1~1.EXE 72 PID 2852 wrote to memory of 2916 2852 2024-1~1.EXE 72 PID 2916 wrote to memory of 2604 2916 svchost.com 38 PID 2916 wrote to memory of 2604 2916 svchost.com 38 PID 2916 wrote to memory of 2604 2916 svchost.com 38 PID 2916 wrote to memory of 2604 2916 svchost.com 38 PID 2604 wrote to memory of 2268 2604 2024-1~1.EXE 39 PID 2604 wrote to memory of 2268 2604 2024-1~1.EXE 39 PID 2604 wrote to memory of 2268 2604 2024-1~1.EXE 39 PID 2604 wrote to memory of 2268 2604 2024-1~1.EXE 39 PID 2268 wrote to memory of 1648 2268 svchost.com 40 PID 2268 wrote to memory of 1648 2268 svchost.com 40 PID 2268 wrote to memory of 1648 2268 svchost.com 40 PID 2268 wrote to memory of 1648 2268 svchost.com 40 PID 1648 wrote to memory of 2664 1648 2024-1~1.EXE 128 PID 1648 wrote to memory of 2664 1648 2024-1~1.EXE 128 PID 1648 wrote to memory of 2664 1648 2024-1~1.EXE 128 PID 1648 wrote to memory of 2664 1648 2024-1~1.EXE 128 PID 2664 wrote to memory of 1860 2664 svchost.com 42 PID 2664 wrote to memory of 1860 2664 svchost.com 42 PID 2664 wrote to memory of 1860 2664 svchost.com 42 PID 2664 wrote to memory of 1860 2664 svchost.com 42 PID 1860 wrote to memory of 1620 1860 2024-1~1.EXE 43 PID 1860 wrote to memory of 1620 1860 2024-1~1.EXE 43 PID 1860 wrote to memory of 1620 1860 2024-1~1.EXE 43 PID 1860 wrote to memory of 1620 1860 2024-1~1.EXE 43 PID 1620 wrote to memory of 2384 1620 svchost.com 44 PID 1620 wrote to memory of 2384 1620 svchost.com 44 PID 1620 wrote to memory of 2384 1620 svchost.com 44 PID 1620 wrote to memory of 2384 1620 svchost.com 44 PID 2384 wrote to memory of 1876 2384 2024-1~1.EXE 134 PID 2384 wrote to memory of 1876 2384 2024-1~1.EXE 134 PID 2384 wrote to memory of 1876 2384 2024-1~1.EXE 134 PID 2384 wrote to memory of 1876 2384 2024-1~1.EXE 134
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2024-12-05_0aa3e15460b1a3f22eca1420b9928f0a_lockergoga_luca-stealer_neshta.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE20⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE22⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE24⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE26⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE28⤵
- Executes dropped EXE
PID:780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE30⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE32⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE34⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE36⤵
- Executes dropped EXE
PID:580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE40⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE42⤵
- Executes dropped EXE
PID:2740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE44⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE46⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE48⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE52⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE54⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE56⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"57⤵
- Executes dropped EXE
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE58⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"59⤵
- Executes dropped EXE
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE62⤵
- Executes dropped EXE
PID:864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"63⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE64⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"65⤵
- Executes dropped EXE
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE66⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"67⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE68⤵PID:1708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"69⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE70⤵PID:1824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"71⤵
- Drops file in Windows directory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE72⤵PID:2572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"73⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE74⤵PID:2420
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"75⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE76⤵
- System Location Discovery: System Language Discovery
PID:304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"77⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE78⤵PID:2356
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"79⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE80⤵PID:1744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"81⤵
- Drops file in Windows directory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE82⤵
- Drops file in Windows directory
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"83⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE84⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"85⤵
- Drops file in Windows directory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE86⤵
- Drops file in Windows directory
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE88⤵PID:2804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"89⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE90⤵PID:2264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"91⤵
- Drops file in Windows directory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE92⤵PID:3044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"93⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE94⤵PID:1064
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"95⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE96⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"97⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE98⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"99⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE100⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"101⤵
- Drops file in Windows directory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE102⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"103⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE104⤵
- Drops file in Windows directory
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"105⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE106⤵PID:2304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"107⤵
- Drops file in Windows directory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE108⤵PID:2584
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"109⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE110⤵
- Drops file in Windows directory
PID:2200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE112⤵
- Drops file in Windows directory
PID:2004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"113⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE114⤵PID:1188
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"115⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE116⤵PID:832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"117⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE118⤵PID:2192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"119⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE120⤵PID:2576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE"121⤵
- Drops file in Windows directory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2024-1~1.EXE122⤵PID:304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-