Analysis

  • max time kernel
    188s
  • max time network
    227s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:24

General

  • Target

    e1849a4536153ef45b2a5ad196854ebf6ae6d8e9ee918eea253f08f62acc730c.exe

  • Size

    124KB

  • MD5

    53bb1401b62473906e50b2f0de55d370

  • SHA1

    86be2edec1479f513ae3408c9c60879ed0b36cf2

  • SHA256

    e1849a4536153ef45b2a5ad196854ebf6ae6d8e9ee918eea253f08f62acc730c

  • SHA512

    87065878fb5dda42a46f8079e45cd0c5d77b90af68e7e57dcb4207e56177b01fe0455d33e65d24a8bb3ed9abc2a1f8eed0c87f46f343ce6524eda3792f75773d

  • SSDEEP

    1536:YIszx5YeL1hRO/N69BH3OoGa+FLHjKceRgrkOSoINeGUmE:zG/YEhkFoN3Oo1+FvfSW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 22 IoCs
  • Executes dropped EXE 22 IoCs
  • Loads dropped DLL 44 IoCs
  • Adds Run key to start application 2 TTPs 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1849a4536153ef45b2a5ad196854ebf6ae6d8e9ee918eea253f08f62acc730c.exe
    "C:\Users\Admin\AppData\Local\Temp\e1849a4536153ef45b2a5ad196854ebf6ae6d8e9ee918eea253f08f62acc730c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\rxleil.exe
      "C:\Users\Admin\rxleil.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\gxnic.exe
        "C:\Users\Admin\gxnic.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\Users\Admin\paexeug.exe
          "C:\Users\Admin\paexeug.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Users\Admin\neaxau.exe
            "C:\Users\Admin\neaxau.exe"
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1020
            • C:\Users\Admin\zeuut.exe
              "C:\Users\Admin\zeuut.exe"
              6⤵
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:776
              • C:\Users\Admin\htgem.exe
                "C:\Users\Admin\htgem.exe"
                7⤵
                • Modifies visiblity of hidden/system files in Explorer
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:296
                • C:\Users\Admin\miaju.exe
                  "C:\Users\Admin\miaju.exe"
                  8⤵
                  • Modifies visiblity of hidden/system files in Explorer
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1440
                  • C:\Users\Admin\wuituas.exe
                    "C:\Users\Admin\wuituas.exe"
                    9⤵
                    • Modifies visiblity of hidden/system files in Explorer
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1432
                    • C:\Users\Admin\xiecak.exe
                      "C:\Users\Admin\xiecak.exe"
                      10⤵
                      • Modifies visiblity of hidden/system files in Explorer
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:1608
                      • C:\Users\Admin\blbor.exe
                        "C:\Users\Admin\blbor.exe"
                        11⤵
                        • Modifies visiblity of hidden/system files in Explorer
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Adds Run key to start application
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:652
                        • C:\Users\Admin\buuqeu.exe
                          "C:\Users\Admin\buuqeu.exe"
                          12⤵
                          • Modifies visiblity of hidden/system files in Explorer
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:1444
                          • C:\Users\Admin\xoaub.exe
                            "C:\Users\Admin\xoaub.exe"
                            13⤵
                            • Modifies visiblity of hidden/system files in Explorer
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1792
                            • C:\Users\Admin\seoura.exe
                              "C:\Users\Admin\seoura.exe"
                              14⤵
                              • Modifies visiblity of hidden/system files in Explorer
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Adds Run key to start application
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:316
                              • C:\Users\Admin\dabij.exe
                                "C:\Users\Admin\dabij.exe"
                                15⤵
                                • Modifies visiblity of hidden/system files in Explorer
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Adds Run key to start application
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:300
                                • C:\Users\Admin\sueik.exe
                                  "C:\Users\Admin\sueik.exe"
                                  16⤵
                                  • Modifies visiblity of hidden/system files in Explorer
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Adds Run key to start application
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:1844
                                  • C:\Users\Admin\reyeg.exe
                                    "C:\Users\Admin\reyeg.exe"
                                    17⤵
                                    • Modifies visiblity of hidden/system files in Explorer
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Adds Run key to start application
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SetWindowsHookEx
                                    PID:536
                                    • C:\Users\Admin\yuuamo.exe
                                      "C:\Users\Admin\yuuamo.exe"
                                      18⤵
                                      • Modifies visiblity of hidden/system files in Explorer
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Adds Run key to start application
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1948
                                      • C:\Users\Admin\tbwoy.exe
                                        "C:\Users\Admin\tbwoy.exe"
                                        19⤵
                                        • Modifies visiblity of hidden/system files in Explorer
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Adds Run key to start application
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1108
                                        • C:\Users\Admin\waiko.exe
                                          "C:\Users\Admin\waiko.exe"
                                          20⤵
                                          • Modifies visiblity of hidden/system files in Explorer
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Adds Run key to start application
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1652
                                          • C:\Users\Admin\tiiwuz.exe
                                            "C:\Users\Admin\tiiwuz.exe"
                                            21⤵
                                            • Modifies visiblity of hidden/system files in Explorer
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Adds Run key to start application
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of SetWindowsHookEx
                                            PID:900
                                            • C:\Users\Admin\jvriit.exe
                                              "C:\Users\Admin\jvriit.exe"
                                              22⤵
                                              • Modifies visiblity of hidden/system files in Explorer
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Adds Run key to start application
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1968
                                              • C:\Users\Admin\wiufo.exe
                                                "C:\Users\Admin\wiufo.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\blbor.exe

    Filesize

    124KB

    MD5

    d9409304bfd8c52d95265f255d3fecfe

    SHA1

    87526ea358a690bff19ba98acf9163e7f02edb92

    SHA256

    1058297c8c1a09d745d57a76a35df3bd6311242f481c716b6091fe1ad7adbaa1

    SHA512

    b72a6609eea78705c1baa90741a79a7d7600c7209f9d05a48a8ebbedddb24891a3a84526606a8ff708e1db410960d050ed0c4ed66d6207cbbfc70b4af012c571

  • C:\Users\Admin\blbor.exe

    Filesize

    124KB

    MD5

    d9409304bfd8c52d95265f255d3fecfe

    SHA1

    87526ea358a690bff19ba98acf9163e7f02edb92

    SHA256

    1058297c8c1a09d745d57a76a35df3bd6311242f481c716b6091fe1ad7adbaa1

    SHA512

    b72a6609eea78705c1baa90741a79a7d7600c7209f9d05a48a8ebbedddb24891a3a84526606a8ff708e1db410960d050ed0c4ed66d6207cbbfc70b4af012c571

  • C:\Users\Admin\buuqeu.exe

    Filesize

    124KB

    MD5

    f01a940ae8c1e1f12cd50cf0befb940b

    SHA1

    5b8fca17ebf007aaa6c48388b7be3427b7a79767

    SHA256

    ba9c39914e1cf1df4a5e4ac9a608adad00c81681db049987708051801f5ab243

    SHA512

    3c2064dddca0f47600746dda445688333af524ae75e930b8aff24d29fdf435edd667d1f0ad652f40ce2c92d23bc01f407f4e6b8a91d12510520f71abc9bb0981

  • C:\Users\Admin\buuqeu.exe

    Filesize

    124KB

    MD5

    f01a940ae8c1e1f12cd50cf0befb940b

    SHA1

    5b8fca17ebf007aaa6c48388b7be3427b7a79767

    SHA256

    ba9c39914e1cf1df4a5e4ac9a608adad00c81681db049987708051801f5ab243

    SHA512

    3c2064dddca0f47600746dda445688333af524ae75e930b8aff24d29fdf435edd667d1f0ad652f40ce2c92d23bc01f407f4e6b8a91d12510520f71abc9bb0981

  • C:\Users\Admin\dabij.exe

    Filesize

    124KB

    MD5

    d24610784d262ec9df17fd1733890c08

    SHA1

    a13bb1bf4424e30b38cdd664847e732505d92bc2

    SHA256

    7f9e011c2d83d9f93abb102c571dc0fcd1764d0b73439bbc827e62c9c666e6c2

    SHA512

    e7d6f9f07b43d33772dd1ca02ac5ec4e37d78c95a3a1654e76c2d0c3ee2c804f09fa97778574351528ec3dfad5dbb4336541957b5581dc4fe19764789bf8ef4a

  • C:\Users\Admin\dabij.exe

    Filesize

    124KB

    MD5

    d24610784d262ec9df17fd1733890c08

    SHA1

    a13bb1bf4424e30b38cdd664847e732505d92bc2

    SHA256

    7f9e011c2d83d9f93abb102c571dc0fcd1764d0b73439bbc827e62c9c666e6c2

    SHA512

    e7d6f9f07b43d33772dd1ca02ac5ec4e37d78c95a3a1654e76c2d0c3ee2c804f09fa97778574351528ec3dfad5dbb4336541957b5581dc4fe19764789bf8ef4a

  • C:\Users\Admin\gxnic.exe

    Filesize

    124KB

    MD5

    5cc7c95901a409eb5e1130798a054aeb

    SHA1

    8f9fa639bd69c3176e6ff69f04dbcf9f3314110f

    SHA256

    868790ea17a1a1ef1e6e2953a5e3113aba2d121a45c89ba5ef82e7df7c018b12

    SHA512

    83a3678b8278de45ffb9e4bb8b41f2910710f9d2252274f3eff3fe24cd73f59ff680ba3b5f4cd9954aee7bfa996fd9f98b76f6d80408df5f0af0f9a51424c4db

  • C:\Users\Admin\gxnic.exe

    Filesize

    124KB

    MD5

    5cc7c95901a409eb5e1130798a054aeb

    SHA1

    8f9fa639bd69c3176e6ff69f04dbcf9f3314110f

    SHA256

    868790ea17a1a1ef1e6e2953a5e3113aba2d121a45c89ba5ef82e7df7c018b12

    SHA512

    83a3678b8278de45ffb9e4bb8b41f2910710f9d2252274f3eff3fe24cd73f59ff680ba3b5f4cd9954aee7bfa996fd9f98b76f6d80408df5f0af0f9a51424c4db

  • C:\Users\Admin\htgem.exe

    Filesize

    124KB

    MD5

    babfa5766b171931363cc1328c450416

    SHA1

    3f5e3558d4faab62661e84f6b61bc0339ab48f3d

    SHA256

    625b1b65d2b213427b59ae99c9bcadaf50b9a134510b180c0d2dc093289e7a97

    SHA512

    0f31eef906bc6e027c41ad6b9c97b107c6e7a81c4ab33c9ef5c4da911f8da66d933b6ffed2aacfe0b4c7560b2c961732875e33862a72e34459f2232ac294dc62

  • C:\Users\Admin\htgem.exe

    Filesize

    124KB

    MD5

    babfa5766b171931363cc1328c450416

    SHA1

    3f5e3558d4faab62661e84f6b61bc0339ab48f3d

    SHA256

    625b1b65d2b213427b59ae99c9bcadaf50b9a134510b180c0d2dc093289e7a97

    SHA512

    0f31eef906bc6e027c41ad6b9c97b107c6e7a81c4ab33c9ef5c4da911f8da66d933b6ffed2aacfe0b4c7560b2c961732875e33862a72e34459f2232ac294dc62

  • C:\Users\Admin\miaju.exe

    Filesize

    124KB

    MD5

    d1bb4e93606ff1249ecda9ce8c4b4bb6

    SHA1

    42d7fab8aac93b45bedb7c2230128934133bec5e

    SHA256

    9d6f2a3364e9ff92fa981196b0e067a22d3b1d51bfcdfa887e2d2e947eb6ea4d

    SHA512

    f91ceed702fe15d054d55d24db05da9b9173a9287a2aa09fc6c47f55c330d759e34dbe468026615d04e16629708bed598ed3e5902f128ddaee12aa258d8b6cb3

  • C:\Users\Admin\miaju.exe

    Filesize

    124KB

    MD5

    d1bb4e93606ff1249ecda9ce8c4b4bb6

    SHA1

    42d7fab8aac93b45bedb7c2230128934133bec5e

    SHA256

    9d6f2a3364e9ff92fa981196b0e067a22d3b1d51bfcdfa887e2d2e947eb6ea4d

    SHA512

    f91ceed702fe15d054d55d24db05da9b9173a9287a2aa09fc6c47f55c330d759e34dbe468026615d04e16629708bed598ed3e5902f128ddaee12aa258d8b6cb3

  • C:\Users\Admin\neaxau.exe

    Filesize

    124KB

    MD5

    5c0459f11df839d77faf5ce170e6dfc0

    SHA1

    520167902b9609fac7e9900ead000a3cdac094f5

    SHA256

    3887124049697a2db434d756e7a9b512e67d3c6e65c7ac7bf2634f8663e585a3

    SHA512

    d70f72e36d34c26e8c657c919bc06c5c3e5577f8f6e22b5295c51f0b6b51c8966728affda626cd7b48193758a9ac0c16521aa5246cd588a797db2e82e66c5b88

  • C:\Users\Admin\neaxau.exe

    Filesize

    124KB

    MD5

    5c0459f11df839d77faf5ce170e6dfc0

    SHA1

    520167902b9609fac7e9900ead000a3cdac094f5

    SHA256

    3887124049697a2db434d756e7a9b512e67d3c6e65c7ac7bf2634f8663e585a3

    SHA512

    d70f72e36d34c26e8c657c919bc06c5c3e5577f8f6e22b5295c51f0b6b51c8966728affda626cd7b48193758a9ac0c16521aa5246cd588a797db2e82e66c5b88

  • C:\Users\Admin\paexeug.exe

    Filesize

    124KB

    MD5

    34e872004eab99f5d21b8e2ac43807a2

    SHA1

    cf687d57fca84dcd33a98116753290ab561407dc

    SHA256

    e27e2b6d9628137a90046ae0525ab0c06bc9122d2abfed701ee94a4724c6de58

    SHA512

    d2452d99a2be28ce20cf96150b06947f1c45dfafe4031928e92444df2fa2d4e7cdae1e302cac0fcf12722397c2282591823c17ab9ef6ec9873ec9483d87281fd

  • C:\Users\Admin\paexeug.exe

    Filesize

    124KB

    MD5

    34e872004eab99f5d21b8e2ac43807a2

    SHA1

    cf687d57fca84dcd33a98116753290ab561407dc

    SHA256

    e27e2b6d9628137a90046ae0525ab0c06bc9122d2abfed701ee94a4724c6de58

    SHA512

    d2452d99a2be28ce20cf96150b06947f1c45dfafe4031928e92444df2fa2d4e7cdae1e302cac0fcf12722397c2282591823c17ab9ef6ec9873ec9483d87281fd

  • C:\Users\Admin\reyeg.exe

    Filesize

    124KB

    MD5

    4a38a0361295f69c06fa2aab4bfe3bbc

    SHA1

    120a07703b52c788ca25ec70c3d2e1d937537f07

    SHA256

    f2a29915fe264685af798f8afec3db3252ea26b2bb7e353a7b119f2d7e61f4d5

    SHA512

    c250c7697a47327a3a94acf6ed613cb2e1bfc445941794a6dbb901d772e0c104f2bad9123df06175e9915e6d61f9fc71c27f806fff5068d3a0b21172d4de8085

  • C:\Users\Admin\reyeg.exe

    Filesize

    124KB

    MD5

    4a38a0361295f69c06fa2aab4bfe3bbc

    SHA1

    120a07703b52c788ca25ec70c3d2e1d937537f07

    SHA256

    f2a29915fe264685af798f8afec3db3252ea26b2bb7e353a7b119f2d7e61f4d5

    SHA512

    c250c7697a47327a3a94acf6ed613cb2e1bfc445941794a6dbb901d772e0c104f2bad9123df06175e9915e6d61f9fc71c27f806fff5068d3a0b21172d4de8085

  • C:\Users\Admin\rxleil.exe

    Filesize

    124KB

    MD5

    cec639b77bb61a4316c99978a5dbc80a

    SHA1

    73282f74b803da7beb1743538ce4bb7774d6d766

    SHA256

    21e5bd7f1c2dd10b474e5ea2d1dd80eab932e50bbb15d953956fea0526e46c91

    SHA512

    a6681193f3fda58c43a7980d138806e807454aa4c5a197cdbdd27c13a383cfa7470c600bad30c9f53197d0dfc45c6d0ae172177c55156e3c653a2b8833983eac

  • C:\Users\Admin\rxleil.exe

    Filesize

    124KB

    MD5

    cec639b77bb61a4316c99978a5dbc80a

    SHA1

    73282f74b803da7beb1743538ce4bb7774d6d766

    SHA256

    21e5bd7f1c2dd10b474e5ea2d1dd80eab932e50bbb15d953956fea0526e46c91

    SHA512

    a6681193f3fda58c43a7980d138806e807454aa4c5a197cdbdd27c13a383cfa7470c600bad30c9f53197d0dfc45c6d0ae172177c55156e3c653a2b8833983eac

  • C:\Users\Admin\seoura.exe

    Filesize

    124KB

    MD5

    065ff8fed0cd4dee8c54dda114b25942

    SHA1

    ddf212e4d571aa68715f879a736e12f06ed42ba4

    SHA256

    5c9e540a659e41bdcb3c995f044612d22497491671f1b1df9f396dd68b8af09b

    SHA512

    7973f5cb6fbc82f1db79be9ce151ad8563b9b599a2a6f6ff319ec193c043e34430c30b31266bde026fa3f437d62f1868a15b78dd93bf3946c5a0f527b3f60bfb

  • C:\Users\Admin\seoura.exe

    Filesize

    124KB

    MD5

    065ff8fed0cd4dee8c54dda114b25942

    SHA1

    ddf212e4d571aa68715f879a736e12f06ed42ba4

    SHA256

    5c9e540a659e41bdcb3c995f044612d22497491671f1b1df9f396dd68b8af09b

    SHA512

    7973f5cb6fbc82f1db79be9ce151ad8563b9b599a2a6f6ff319ec193c043e34430c30b31266bde026fa3f437d62f1868a15b78dd93bf3946c5a0f527b3f60bfb

  • C:\Users\Admin\sueik.exe

    Filesize

    124KB

    MD5

    f427c00d9e6cd07bc2e301cab27226ff

    SHA1

    bc16cf091e8614ebc11663f1b0e12a05a5af54be

    SHA256

    2dce37ac7d7d6b81bf240a04baab75e71a9f885491a1d6bba4e64358bcce03b4

    SHA512

    ccc4350c1fadc5341c8e821fb3386ed8672718443b0365b291065735550d21839df695b45e45a752ee65939d06ab9a1b41411ab52f153351293e55101d2747a2

  • C:\Users\Admin\sueik.exe

    Filesize

    124KB

    MD5

    f427c00d9e6cd07bc2e301cab27226ff

    SHA1

    bc16cf091e8614ebc11663f1b0e12a05a5af54be

    SHA256

    2dce37ac7d7d6b81bf240a04baab75e71a9f885491a1d6bba4e64358bcce03b4

    SHA512

    ccc4350c1fadc5341c8e821fb3386ed8672718443b0365b291065735550d21839df695b45e45a752ee65939d06ab9a1b41411ab52f153351293e55101d2747a2

  • C:\Users\Admin\wuituas.exe

    Filesize

    124KB

    MD5

    b9dd61e62f03be29e918dfbac33096e3

    SHA1

    5a025e12bbf6b979b978983ec00e3cc342f83d9d

    SHA256

    952ad8796ae853be6f2dfe6f3c66c6ba8c843c2b05201f4a7854237eaded302b

    SHA512

    d58601dbc11492d60151d4a9d8dd7c101052fd1f420038c1cc6307db0cebd7dc35955038100347e6a68843fcdea0dc6df827df69bcc323c592aed9ed31d22dfe

  • C:\Users\Admin\wuituas.exe

    Filesize

    124KB

    MD5

    b9dd61e62f03be29e918dfbac33096e3

    SHA1

    5a025e12bbf6b979b978983ec00e3cc342f83d9d

    SHA256

    952ad8796ae853be6f2dfe6f3c66c6ba8c843c2b05201f4a7854237eaded302b

    SHA512

    d58601dbc11492d60151d4a9d8dd7c101052fd1f420038c1cc6307db0cebd7dc35955038100347e6a68843fcdea0dc6df827df69bcc323c592aed9ed31d22dfe

  • C:\Users\Admin\xiecak.exe

    Filesize

    124KB

    MD5

    c63458f2d267cfe4ee3edf3e1fbef6f2

    SHA1

    d9cdb1f8fd09984c00c190d1dc72bb126668e665

    SHA256

    1f114a843290b78142534b424f78f0d948e5c1eab3cdee3c6f0f822f3dcf13b7

    SHA512

    5714dd32f389ae7fa68441fc85fcd92056338da7db046ac39063695a715c7d407536912ce04bf5d9acde6a7ee51b931f0aedf76b77bd165a65172b85e28a6a59

  • C:\Users\Admin\xiecak.exe

    Filesize

    124KB

    MD5

    c63458f2d267cfe4ee3edf3e1fbef6f2

    SHA1

    d9cdb1f8fd09984c00c190d1dc72bb126668e665

    SHA256

    1f114a843290b78142534b424f78f0d948e5c1eab3cdee3c6f0f822f3dcf13b7

    SHA512

    5714dd32f389ae7fa68441fc85fcd92056338da7db046ac39063695a715c7d407536912ce04bf5d9acde6a7ee51b931f0aedf76b77bd165a65172b85e28a6a59

  • C:\Users\Admin\xoaub.exe

    Filesize

    124KB

    MD5

    aaccf49a5af082a33873c939668664ae

    SHA1

    6b68595d1e5ab1b52b835cfabc3d2402b30b0c42

    SHA256

    fda0f17170e985afa1f7ff76031ec1d445371a33e2c01989bb02b61bc0ebf23f

    SHA512

    5cfc6f535ea13922c876daa2b748a648dd107bf3cb286883bd7abec6cb1351914aa58c959481b502bf49d70a6943f96e5fb22210317e4d1891eb09de93abc2cd

  • C:\Users\Admin\xoaub.exe

    Filesize

    124KB

    MD5

    aaccf49a5af082a33873c939668664ae

    SHA1

    6b68595d1e5ab1b52b835cfabc3d2402b30b0c42

    SHA256

    fda0f17170e985afa1f7ff76031ec1d445371a33e2c01989bb02b61bc0ebf23f

    SHA512

    5cfc6f535ea13922c876daa2b748a648dd107bf3cb286883bd7abec6cb1351914aa58c959481b502bf49d70a6943f96e5fb22210317e4d1891eb09de93abc2cd

  • C:\Users\Admin\zeuut.exe

    Filesize

    124KB

    MD5

    91768ccb32c089397100535438453daf

    SHA1

    447492e99ad2f54ca6f21babadf720ed0fa7ea70

    SHA256

    ea63bc301dd4a14ca9b92fd29e19a7752bece557f88da5a6d1e9106697473be4

    SHA512

    d9062326c6172f64a3e9691ba0db39d647ea4116db24caf9cef8a3e2567a27683cf2415ab8a2d644daaf23a7c7927f1c74264ec88e88d3ee70091c02fe212629

  • C:\Users\Admin\zeuut.exe

    Filesize

    124KB

    MD5

    91768ccb32c089397100535438453daf

    SHA1

    447492e99ad2f54ca6f21babadf720ed0fa7ea70

    SHA256

    ea63bc301dd4a14ca9b92fd29e19a7752bece557f88da5a6d1e9106697473be4

    SHA512

    d9062326c6172f64a3e9691ba0db39d647ea4116db24caf9cef8a3e2567a27683cf2415ab8a2d644daaf23a7c7927f1c74264ec88e88d3ee70091c02fe212629

  • \Users\Admin\blbor.exe

    Filesize

    124KB

    MD5

    d9409304bfd8c52d95265f255d3fecfe

    SHA1

    87526ea358a690bff19ba98acf9163e7f02edb92

    SHA256

    1058297c8c1a09d745d57a76a35df3bd6311242f481c716b6091fe1ad7adbaa1

    SHA512

    b72a6609eea78705c1baa90741a79a7d7600c7209f9d05a48a8ebbedddb24891a3a84526606a8ff708e1db410960d050ed0c4ed66d6207cbbfc70b4af012c571

  • \Users\Admin\blbor.exe

    Filesize

    124KB

    MD5

    d9409304bfd8c52d95265f255d3fecfe

    SHA1

    87526ea358a690bff19ba98acf9163e7f02edb92

    SHA256

    1058297c8c1a09d745d57a76a35df3bd6311242f481c716b6091fe1ad7adbaa1

    SHA512

    b72a6609eea78705c1baa90741a79a7d7600c7209f9d05a48a8ebbedddb24891a3a84526606a8ff708e1db410960d050ed0c4ed66d6207cbbfc70b4af012c571

  • \Users\Admin\buuqeu.exe

    Filesize

    124KB

    MD5

    f01a940ae8c1e1f12cd50cf0befb940b

    SHA1

    5b8fca17ebf007aaa6c48388b7be3427b7a79767

    SHA256

    ba9c39914e1cf1df4a5e4ac9a608adad00c81681db049987708051801f5ab243

    SHA512

    3c2064dddca0f47600746dda445688333af524ae75e930b8aff24d29fdf435edd667d1f0ad652f40ce2c92d23bc01f407f4e6b8a91d12510520f71abc9bb0981

  • \Users\Admin\buuqeu.exe

    Filesize

    124KB

    MD5

    f01a940ae8c1e1f12cd50cf0befb940b

    SHA1

    5b8fca17ebf007aaa6c48388b7be3427b7a79767

    SHA256

    ba9c39914e1cf1df4a5e4ac9a608adad00c81681db049987708051801f5ab243

    SHA512

    3c2064dddca0f47600746dda445688333af524ae75e930b8aff24d29fdf435edd667d1f0ad652f40ce2c92d23bc01f407f4e6b8a91d12510520f71abc9bb0981

  • \Users\Admin\dabij.exe

    Filesize

    124KB

    MD5

    d24610784d262ec9df17fd1733890c08

    SHA1

    a13bb1bf4424e30b38cdd664847e732505d92bc2

    SHA256

    7f9e011c2d83d9f93abb102c571dc0fcd1764d0b73439bbc827e62c9c666e6c2

    SHA512

    e7d6f9f07b43d33772dd1ca02ac5ec4e37d78c95a3a1654e76c2d0c3ee2c804f09fa97778574351528ec3dfad5dbb4336541957b5581dc4fe19764789bf8ef4a

  • \Users\Admin\dabij.exe

    Filesize

    124KB

    MD5

    d24610784d262ec9df17fd1733890c08

    SHA1

    a13bb1bf4424e30b38cdd664847e732505d92bc2

    SHA256

    7f9e011c2d83d9f93abb102c571dc0fcd1764d0b73439bbc827e62c9c666e6c2

    SHA512

    e7d6f9f07b43d33772dd1ca02ac5ec4e37d78c95a3a1654e76c2d0c3ee2c804f09fa97778574351528ec3dfad5dbb4336541957b5581dc4fe19764789bf8ef4a

  • \Users\Admin\gxnic.exe

    Filesize

    124KB

    MD5

    5cc7c95901a409eb5e1130798a054aeb

    SHA1

    8f9fa639bd69c3176e6ff69f04dbcf9f3314110f

    SHA256

    868790ea17a1a1ef1e6e2953a5e3113aba2d121a45c89ba5ef82e7df7c018b12

    SHA512

    83a3678b8278de45ffb9e4bb8b41f2910710f9d2252274f3eff3fe24cd73f59ff680ba3b5f4cd9954aee7bfa996fd9f98b76f6d80408df5f0af0f9a51424c4db

  • \Users\Admin\gxnic.exe

    Filesize

    124KB

    MD5

    5cc7c95901a409eb5e1130798a054aeb

    SHA1

    8f9fa639bd69c3176e6ff69f04dbcf9f3314110f

    SHA256

    868790ea17a1a1ef1e6e2953a5e3113aba2d121a45c89ba5ef82e7df7c018b12

    SHA512

    83a3678b8278de45ffb9e4bb8b41f2910710f9d2252274f3eff3fe24cd73f59ff680ba3b5f4cd9954aee7bfa996fd9f98b76f6d80408df5f0af0f9a51424c4db

  • \Users\Admin\htgem.exe

    Filesize

    124KB

    MD5

    babfa5766b171931363cc1328c450416

    SHA1

    3f5e3558d4faab62661e84f6b61bc0339ab48f3d

    SHA256

    625b1b65d2b213427b59ae99c9bcadaf50b9a134510b180c0d2dc093289e7a97

    SHA512

    0f31eef906bc6e027c41ad6b9c97b107c6e7a81c4ab33c9ef5c4da911f8da66d933b6ffed2aacfe0b4c7560b2c961732875e33862a72e34459f2232ac294dc62

  • \Users\Admin\htgem.exe

    Filesize

    124KB

    MD5

    babfa5766b171931363cc1328c450416

    SHA1

    3f5e3558d4faab62661e84f6b61bc0339ab48f3d

    SHA256

    625b1b65d2b213427b59ae99c9bcadaf50b9a134510b180c0d2dc093289e7a97

    SHA512

    0f31eef906bc6e027c41ad6b9c97b107c6e7a81c4ab33c9ef5c4da911f8da66d933b6ffed2aacfe0b4c7560b2c961732875e33862a72e34459f2232ac294dc62

  • \Users\Admin\miaju.exe

    Filesize

    124KB

    MD5

    d1bb4e93606ff1249ecda9ce8c4b4bb6

    SHA1

    42d7fab8aac93b45bedb7c2230128934133bec5e

    SHA256

    9d6f2a3364e9ff92fa981196b0e067a22d3b1d51bfcdfa887e2d2e947eb6ea4d

    SHA512

    f91ceed702fe15d054d55d24db05da9b9173a9287a2aa09fc6c47f55c330d759e34dbe468026615d04e16629708bed598ed3e5902f128ddaee12aa258d8b6cb3

  • \Users\Admin\miaju.exe

    Filesize

    124KB

    MD5

    d1bb4e93606ff1249ecda9ce8c4b4bb6

    SHA1

    42d7fab8aac93b45bedb7c2230128934133bec5e

    SHA256

    9d6f2a3364e9ff92fa981196b0e067a22d3b1d51bfcdfa887e2d2e947eb6ea4d

    SHA512

    f91ceed702fe15d054d55d24db05da9b9173a9287a2aa09fc6c47f55c330d759e34dbe468026615d04e16629708bed598ed3e5902f128ddaee12aa258d8b6cb3

  • \Users\Admin\neaxau.exe

    Filesize

    124KB

    MD5

    5c0459f11df839d77faf5ce170e6dfc0

    SHA1

    520167902b9609fac7e9900ead000a3cdac094f5

    SHA256

    3887124049697a2db434d756e7a9b512e67d3c6e65c7ac7bf2634f8663e585a3

    SHA512

    d70f72e36d34c26e8c657c919bc06c5c3e5577f8f6e22b5295c51f0b6b51c8966728affda626cd7b48193758a9ac0c16521aa5246cd588a797db2e82e66c5b88

  • \Users\Admin\neaxau.exe

    Filesize

    124KB

    MD5

    5c0459f11df839d77faf5ce170e6dfc0

    SHA1

    520167902b9609fac7e9900ead000a3cdac094f5

    SHA256

    3887124049697a2db434d756e7a9b512e67d3c6e65c7ac7bf2634f8663e585a3

    SHA512

    d70f72e36d34c26e8c657c919bc06c5c3e5577f8f6e22b5295c51f0b6b51c8966728affda626cd7b48193758a9ac0c16521aa5246cd588a797db2e82e66c5b88

  • \Users\Admin\paexeug.exe

    Filesize

    124KB

    MD5

    34e872004eab99f5d21b8e2ac43807a2

    SHA1

    cf687d57fca84dcd33a98116753290ab561407dc

    SHA256

    e27e2b6d9628137a90046ae0525ab0c06bc9122d2abfed701ee94a4724c6de58

    SHA512

    d2452d99a2be28ce20cf96150b06947f1c45dfafe4031928e92444df2fa2d4e7cdae1e302cac0fcf12722397c2282591823c17ab9ef6ec9873ec9483d87281fd

  • \Users\Admin\paexeug.exe

    Filesize

    124KB

    MD5

    34e872004eab99f5d21b8e2ac43807a2

    SHA1

    cf687d57fca84dcd33a98116753290ab561407dc

    SHA256

    e27e2b6d9628137a90046ae0525ab0c06bc9122d2abfed701ee94a4724c6de58

    SHA512

    d2452d99a2be28ce20cf96150b06947f1c45dfafe4031928e92444df2fa2d4e7cdae1e302cac0fcf12722397c2282591823c17ab9ef6ec9873ec9483d87281fd

  • \Users\Admin\reyeg.exe

    Filesize

    124KB

    MD5

    4a38a0361295f69c06fa2aab4bfe3bbc

    SHA1

    120a07703b52c788ca25ec70c3d2e1d937537f07

    SHA256

    f2a29915fe264685af798f8afec3db3252ea26b2bb7e353a7b119f2d7e61f4d5

    SHA512

    c250c7697a47327a3a94acf6ed613cb2e1bfc445941794a6dbb901d772e0c104f2bad9123df06175e9915e6d61f9fc71c27f806fff5068d3a0b21172d4de8085

  • \Users\Admin\reyeg.exe

    Filesize

    124KB

    MD5

    4a38a0361295f69c06fa2aab4bfe3bbc

    SHA1

    120a07703b52c788ca25ec70c3d2e1d937537f07

    SHA256

    f2a29915fe264685af798f8afec3db3252ea26b2bb7e353a7b119f2d7e61f4d5

    SHA512

    c250c7697a47327a3a94acf6ed613cb2e1bfc445941794a6dbb901d772e0c104f2bad9123df06175e9915e6d61f9fc71c27f806fff5068d3a0b21172d4de8085

  • \Users\Admin\rxleil.exe

    Filesize

    124KB

    MD5

    cec639b77bb61a4316c99978a5dbc80a

    SHA1

    73282f74b803da7beb1743538ce4bb7774d6d766

    SHA256

    21e5bd7f1c2dd10b474e5ea2d1dd80eab932e50bbb15d953956fea0526e46c91

    SHA512

    a6681193f3fda58c43a7980d138806e807454aa4c5a197cdbdd27c13a383cfa7470c600bad30c9f53197d0dfc45c6d0ae172177c55156e3c653a2b8833983eac

  • \Users\Admin\rxleil.exe

    Filesize

    124KB

    MD5

    cec639b77bb61a4316c99978a5dbc80a

    SHA1

    73282f74b803da7beb1743538ce4bb7774d6d766

    SHA256

    21e5bd7f1c2dd10b474e5ea2d1dd80eab932e50bbb15d953956fea0526e46c91

    SHA512

    a6681193f3fda58c43a7980d138806e807454aa4c5a197cdbdd27c13a383cfa7470c600bad30c9f53197d0dfc45c6d0ae172177c55156e3c653a2b8833983eac

  • \Users\Admin\seoura.exe

    Filesize

    124KB

    MD5

    065ff8fed0cd4dee8c54dda114b25942

    SHA1

    ddf212e4d571aa68715f879a736e12f06ed42ba4

    SHA256

    5c9e540a659e41bdcb3c995f044612d22497491671f1b1df9f396dd68b8af09b

    SHA512

    7973f5cb6fbc82f1db79be9ce151ad8563b9b599a2a6f6ff319ec193c043e34430c30b31266bde026fa3f437d62f1868a15b78dd93bf3946c5a0f527b3f60bfb

  • \Users\Admin\seoura.exe

    Filesize

    124KB

    MD5

    065ff8fed0cd4dee8c54dda114b25942

    SHA1

    ddf212e4d571aa68715f879a736e12f06ed42ba4

    SHA256

    5c9e540a659e41bdcb3c995f044612d22497491671f1b1df9f396dd68b8af09b

    SHA512

    7973f5cb6fbc82f1db79be9ce151ad8563b9b599a2a6f6ff319ec193c043e34430c30b31266bde026fa3f437d62f1868a15b78dd93bf3946c5a0f527b3f60bfb

  • \Users\Admin\sueik.exe

    Filesize

    124KB

    MD5

    f427c00d9e6cd07bc2e301cab27226ff

    SHA1

    bc16cf091e8614ebc11663f1b0e12a05a5af54be

    SHA256

    2dce37ac7d7d6b81bf240a04baab75e71a9f885491a1d6bba4e64358bcce03b4

    SHA512

    ccc4350c1fadc5341c8e821fb3386ed8672718443b0365b291065735550d21839df695b45e45a752ee65939d06ab9a1b41411ab52f153351293e55101d2747a2

  • \Users\Admin\sueik.exe

    Filesize

    124KB

    MD5

    f427c00d9e6cd07bc2e301cab27226ff

    SHA1

    bc16cf091e8614ebc11663f1b0e12a05a5af54be

    SHA256

    2dce37ac7d7d6b81bf240a04baab75e71a9f885491a1d6bba4e64358bcce03b4

    SHA512

    ccc4350c1fadc5341c8e821fb3386ed8672718443b0365b291065735550d21839df695b45e45a752ee65939d06ab9a1b41411ab52f153351293e55101d2747a2

  • \Users\Admin\wuituas.exe

    Filesize

    124KB

    MD5

    b9dd61e62f03be29e918dfbac33096e3

    SHA1

    5a025e12bbf6b979b978983ec00e3cc342f83d9d

    SHA256

    952ad8796ae853be6f2dfe6f3c66c6ba8c843c2b05201f4a7854237eaded302b

    SHA512

    d58601dbc11492d60151d4a9d8dd7c101052fd1f420038c1cc6307db0cebd7dc35955038100347e6a68843fcdea0dc6df827df69bcc323c592aed9ed31d22dfe

  • \Users\Admin\wuituas.exe

    Filesize

    124KB

    MD5

    b9dd61e62f03be29e918dfbac33096e3

    SHA1

    5a025e12bbf6b979b978983ec00e3cc342f83d9d

    SHA256

    952ad8796ae853be6f2dfe6f3c66c6ba8c843c2b05201f4a7854237eaded302b

    SHA512

    d58601dbc11492d60151d4a9d8dd7c101052fd1f420038c1cc6307db0cebd7dc35955038100347e6a68843fcdea0dc6df827df69bcc323c592aed9ed31d22dfe

  • \Users\Admin\xiecak.exe

    Filesize

    124KB

    MD5

    c63458f2d267cfe4ee3edf3e1fbef6f2

    SHA1

    d9cdb1f8fd09984c00c190d1dc72bb126668e665

    SHA256

    1f114a843290b78142534b424f78f0d948e5c1eab3cdee3c6f0f822f3dcf13b7

    SHA512

    5714dd32f389ae7fa68441fc85fcd92056338da7db046ac39063695a715c7d407536912ce04bf5d9acde6a7ee51b931f0aedf76b77bd165a65172b85e28a6a59

  • \Users\Admin\xiecak.exe

    Filesize

    124KB

    MD5

    c63458f2d267cfe4ee3edf3e1fbef6f2

    SHA1

    d9cdb1f8fd09984c00c190d1dc72bb126668e665

    SHA256

    1f114a843290b78142534b424f78f0d948e5c1eab3cdee3c6f0f822f3dcf13b7

    SHA512

    5714dd32f389ae7fa68441fc85fcd92056338da7db046ac39063695a715c7d407536912ce04bf5d9acde6a7ee51b931f0aedf76b77bd165a65172b85e28a6a59

  • \Users\Admin\xoaub.exe

    Filesize

    124KB

    MD5

    aaccf49a5af082a33873c939668664ae

    SHA1

    6b68595d1e5ab1b52b835cfabc3d2402b30b0c42

    SHA256

    fda0f17170e985afa1f7ff76031ec1d445371a33e2c01989bb02b61bc0ebf23f

    SHA512

    5cfc6f535ea13922c876daa2b748a648dd107bf3cb286883bd7abec6cb1351914aa58c959481b502bf49d70a6943f96e5fb22210317e4d1891eb09de93abc2cd

  • \Users\Admin\xoaub.exe

    Filesize

    124KB

    MD5

    aaccf49a5af082a33873c939668664ae

    SHA1

    6b68595d1e5ab1b52b835cfabc3d2402b30b0c42

    SHA256

    fda0f17170e985afa1f7ff76031ec1d445371a33e2c01989bb02b61bc0ebf23f

    SHA512

    5cfc6f535ea13922c876daa2b748a648dd107bf3cb286883bd7abec6cb1351914aa58c959481b502bf49d70a6943f96e5fb22210317e4d1891eb09de93abc2cd

  • \Users\Admin\zeuut.exe

    Filesize

    124KB

    MD5

    91768ccb32c089397100535438453daf

    SHA1

    447492e99ad2f54ca6f21babadf720ed0fa7ea70

    SHA256

    ea63bc301dd4a14ca9b92fd29e19a7752bece557f88da5a6d1e9106697473be4

    SHA512

    d9062326c6172f64a3e9691ba0db39d647ea4116db24caf9cef8a3e2567a27683cf2415ab8a2d644daaf23a7c7927f1c74264ec88e88d3ee70091c02fe212629

  • \Users\Admin\zeuut.exe

    Filesize

    124KB

    MD5

    91768ccb32c089397100535438453daf

    SHA1

    447492e99ad2f54ca6f21babadf720ed0fa7ea70

    SHA256

    ea63bc301dd4a14ca9b92fd29e19a7752bece557f88da5a6d1e9106697473be4

    SHA512

    d9062326c6172f64a3e9691ba0db39d647ea4116db24caf9cef8a3e2567a27683cf2415ab8a2d644daaf23a7c7927f1c74264ec88e88d3ee70091c02fe212629

  • memory/296-99-0x0000000000000000-mapping.dmp

  • memory/300-163-0x0000000000000000-mapping.dmp

  • memory/316-155-0x0000000000000000-mapping.dmp

  • memory/536-179-0x0000000000000000-mapping.dmp

  • memory/652-131-0x0000000000000000-mapping.dmp

  • memory/776-91-0x0000000000000000-mapping.dmp

  • memory/900-197-0x0000000000000000-mapping.dmp

  • memory/1020-83-0x0000000000000000-mapping.dmp

  • memory/1108-189-0x0000000000000000-mapping.dmp

  • memory/1192-56-0x0000000074FD1000-0x0000000074FD3000-memory.dmp

    Filesize

    8KB

  • memory/1392-67-0x0000000000000000-mapping.dmp

  • memory/1432-115-0x0000000000000000-mapping.dmp

  • memory/1440-107-0x0000000000000000-mapping.dmp

  • memory/1444-139-0x0000000000000000-mapping.dmp

  • memory/1608-123-0x0000000000000000-mapping.dmp

  • memory/1652-193-0x0000000000000000-mapping.dmp

  • memory/1656-75-0x0000000000000000-mapping.dmp

  • memory/1792-147-0x0000000000000000-mapping.dmp

  • memory/1844-171-0x0000000000000000-mapping.dmp

  • memory/1948-185-0x0000000000000000-mapping.dmp

  • memory/1968-201-0x0000000000000000-mapping.dmp

  • memory/2044-59-0x0000000000000000-mapping.dmp

  • memory/2092-205-0x0000000000000000-mapping.dmp