Analysis
-
max time kernel
123s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 03:36
Behavioral task
behavioral1
Sample
JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll
-
Size
96KB
-
MD5
524a5a07f07bf68e51c47b83b6f8547d
-
SHA1
94eeccbd259d51daf335064daf94d0ec0bb8fd11
-
SHA256
bc8ddd486732be6276efc99228c8724cae928e9c800db2a20933f97fe49aca65
-
SHA512
37c76b6fb2f35bf63ae29cb501456f46bb1dcf9324d32a2363b94c2643b1a659f27f5dc9fa1cdbcdf3d597b1ab0f4d9e2fd800a358eef328218303b321f8ee8c
-
SSDEEP
1536:IQmaqgf69m0+XUCHE5XRGkHc0gffcgKvT+TwepRt786YJ:BmfY0+XHBkHDgHcgKb+TwepRto6YJ
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 17276 created 8 17276 WerFaultSecure.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFaultSecure.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFaultSecure.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFaultSecure.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFaultSecure.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFaultSecure.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 16984 WerFaultSecure.exe 16984 WerFaultSecure.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17372 dwm.exe Token: SeChangeNotifyPrivilege 17372 dwm.exe Token: 33 17372 dwm.exe Token: SeIncBasePriorityPrivilege 17372 dwm.exe Token: SeShutdownPrivilege 17372 dwm.exe Token: SeCreatePagefilePrivilege 17372 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3132 3000 rundll32.exe 82 PID 3000 wrote to memory of 3132 3000 rundll32.exe 82 PID 3000 wrote to memory of 3132 3000 rundll32.exe 82 PID 3132 wrote to memory of 2340 3132 rundll32.exe 83 PID 3132 wrote to memory of 2340 3132 rundll32.exe 83 PID 3132 wrote to memory of 2340 3132 rundll32.exe 83 PID 2340 wrote to memory of 3012 2340 rundll32.exe 84 PID 2340 wrote to memory of 3012 2340 rundll32.exe 84 PID 2340 wrote to memory of 3012 2340 rundll32.exe 84 PID 3012 wrote to memory of 5088 3012 rundll32.exe 85 PID 3012 wrote to memory of 5088 3012 rundll32.exe 85 PID 3012 wrote to memory of 5088 3012 rundll32.exe 85 PID 5088 wrote to memory of 4548 5088 rundll32.exe 86 PID 5088 wrote to memory of 4548 5088 rundll32.exe 86 PID 5088 wrote to memory of 4548 5088 rundll32.exe 86 PID 4548 wrote to memory of 228 4548 rundll32.exe 87 PID 4548 wrote to memory of 228 4548 rundll32.exe 87 PID 4548 wrote to memory of 228 4548 rundll32.exe 87 PID 228 wrote to memory of 1788 228 rundll32.exe 88 PID 228 wrote to memory of 1788 228 rundll32.exe 88 PID 228 wrote to memory of 1788 228 rundll32.exe 88 PID 1788 wrote to memory of 2136 1788 rundll32.exe 89 PID 1788 wrote to memory of 2136 1788 rundll32.exe 89 PID 1788 wrote to memory of 2136 1788 rundll32.exe 89 PID 2136 wrote to memory of 5040 2136 rundll32.exe 90 PID 2136 wrote to memory of 5040 2136 rundll32.exe 90 PID 2136 wrote to memory of 5040 2136 rundll32.exe 90 PID 5040 wrote to memory of 2792 5040 rundll32.exe 91 PID 5040 wrote to memory of 2792 5040 rundll32.exe 91 PID 5040 wrote to memory of 2792 5040 rundll32.exe 91 PID 2792 wrote to memory of 3436 2792 rundll32.exe 92 PID 2792 wrote to memory of 3436 2792 rundll32.exe 92 PID 2792 wrote to memory of 3436 2792 rundll32.exe 92 PID 3436 wrote to memory of 4348 3436 rundll32.exe 93 PID 3436 wrote to memory of 4348 3436 rundll32.exe 93 PID 3436 wrote to memory of 4348 3436 rundll32.exe 93 PID 4348 wrote to memory of 3176 4348 rundll32.exe 94 PID 4348 wrote to memory of 3176 4348 rundll32.exe 94 PID 4348 wrote to memory of 3176 4348 rundll32.exe 94 PID 3176 wrote to memory of 4284 3176 rundll32.exe 95 PID 3176 wrote to memory of 4284 3176 rundll32.exe 95 PID 3176 wrote to memory of 4284 3176 rundll32.exe 95 PID 4284 wrote to memory of 2668 4284 rundll32.exe 96 PID 4284 wrote to memory of 2668 4284 rundll32.exe 96 PID 4284 wrote to memory of 2668 4284 rundll32.exe 96 PID 2668 wrote to memory of 3164 2668 rundll32.exe 97 PID 2668 wrote to memory of 3164 2668 rundll32.exe 97 PID 2668 wrote to memory of 3164 2668 rundll32.exe 97 PID 3164 wrote to memory of 668 3164 rundll32.exe 98 PID 3164 wrote to memory of 668 3164 rundll32.exe 98 PID 3164 wrote to memory of 668 3164 rundll32.exe 98 PID 668 wrote to memory of 4180 668 rundll32.exe 99 PID 668 wrote to memory of 4180 668 rundll32.exe 99 PID 668 wrote to memory of 4180 668 rundll32.exe 99 PID 4180 wrote to memory of 848 4180 rundll32.exe 100 PID 4180 wrote to memory of 848 4180 rundll32.exe 100 PID 4180 wrote to memory of 848 4180 rundll32.exe 100 PID 848 wrote to memory of 4152 848 rundll32.exe 101 PID 848 wrote to memory of 4152 848 rundll32.exe 101 PID 848 wrote to memory of 4152 848 rundll32.exe 101 PID 4152 wrote to memory of 4608 4152 rundll32.exe 102 PID 4152 wrote to memory of 4608 4152 rundll32.exe 102 PID 4152 wrote to memory of 4608 4152 rundll32.exe 102 PID 4608 wrote to memory of 3020 4608 rundll32.exe 103
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc1⤵PID:8
-
C:\Windows\system32\WerFaultSecure.exeC:\Windows\system32\WerFaultSecure.exe -u -p 8 -s 21162⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:16984
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#17⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#123⤵PID:3020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#124⤵PID:2856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#125⤵PID:1512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#126⤵PID:1684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#127⤵PID:980
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#128⤵PID:3140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#129⤵PID:4596
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#130⤵
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#131⤵PID:3460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#132⤵PID:3028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#133⤵PID:1524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#134⤵PID:4812
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#135⤵PID:1560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#136⤵PID:3348
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#137⤵PID:1704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#138⤵PID:856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#139⤵PID:2344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#140⤵PID:2708
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#141⤵PID:3452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#142⤵
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#143⤵PID:4728
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#144⤵PID:420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#145⤵PID:1836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#146⤵PID:4748
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#147⤵PID:4792
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#148⤵PID:4296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#149⤵PID:4156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#150⤵PID:4476
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#151⤵PID:3844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#152⤵PID:5080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#153⤵PID:3484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#154⤵
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#155⤵PID:4576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#156⤵PID:3672
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#157⤵PID:4104
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#158⤵PID:4796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#159⤵PID:2224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#160⤵PID:2200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#161⤵PID:4268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#162⤵PID:1608
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#163⤵
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#164⤵PID:3128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#165⤵PID:4440
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#166⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#167⤵
- System Location Discovery: System Language Discovery
PID:4428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#168⤵PID:5112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#169⤵PID:908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#170⤵PID:4600
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#171⤵PID:1028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#172⤵PID:2380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#173⤵PID:3724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#174⤵PID:4460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#175⤵PID:4656
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#176⤵PID:864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#177⤵PID:2328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#178⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#179⤵PID:2896
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#180⤵PID:2068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#181⤵PID:3084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#182⤵PID:2436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#183⤵PID:3728
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#184⤵PID:2784
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#185⤵PID:2904
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#186⤵PID:2588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#187⤵PID:1948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#188⤵PID:384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#189⤵PID:3612
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#190⤵PID:1540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#191⤵PID:4516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#192⤵PID:1712
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#193⤵PID:2132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#194⤵PID:2640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#195⤵PID:2172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#196⤵PID:220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#197⤵PID:3968
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#198⤵PID:4552
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#199⤵PID:4164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1100⤵PID:464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1101⤵PID:1732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1102⤵PID:2064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1103⤵PID:2040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1104⤵PID:4036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1105⤵PID:4484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1106⤵PID:4396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1107⤵PID:4424
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1108⤵PID:3796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1109⤵PID:944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1110⤵PID:2036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1111⤵PID:4824
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1112⤵PID:4420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1113⤵PID:5136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1114⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1115⤵PID:5164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1116⤵PID:5180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1117⤵PID:5196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1118⤵PID:5216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1119⤵PID:5228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1120⤵PID:5240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1121⤵PID:5256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524a5a07f07bf68e51c47b83b6f8547d.dll,#1122⤵PID:5272
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-