Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
24a5a567039204360a31cac8214c7d99.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24a5a567039204360a31cac8214c7d99.exe
Resource
win10v2004-20231215-en
General
-
Target
24a5a567039204360a31cac8214c7d99.exe
-
Size
145KB
-
MD5
24a5a567039204360a31cac8214c7d99
-
SHA1
867fdd6fc42580ef3faa25714d36b9bb21bda8cd
-
SHA256
bb3b04fe7337556e33d37e6c62cd8714007925b8d048b90f7adccf9ed6a59fc7
-
SHA512
4c53d54ee20b90ddff314c5e7880f9512c253f6e3092edf39fe37f4a5812b9256bf38e47d1bb3feb72035c3fcc081063a703d29dfe2c0e01c91c0a8b1f341d2f
-
SSDEEP
3072:GrA32GFqyhjvl5i23xU/BAECWoG0fWuXsTXIILdB1fz:53PFZBU/BAGUs7LdB5
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ijfboafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iiffen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ipqnahgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icljbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibojncfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ibojncfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Idofhfmm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 24a5a567039204360a31cac8214c7d99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 24a5a567039204360a31cac8214c7d99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imdnklfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idofhfmm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiffen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imbaemhc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipqnahgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipckgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imbaemhc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijfboafl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imdnklfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ipckgh32.exe -
Executes dropped EXE 10 IoCs
pid Process 1940 Iiffen32.exe 836 Imbaemhc.exe 1260 Ipqnahgf.exe 908 Icljbg32.exe 2636 Ibojncfj.exe 3608 Ijfboafl.exe 4744 Imdnklfp.exe 4836 Ipckgh32.exe 952 Idofhfmm.exe 3920 Ifmcdblq.exe -
Drops file in System32 directory 30 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Icljbg32.exe Ipqnahgf.exe File created C:\Windows\SysWOW64\Ikjmhmfd.dll Imdnklfp.exe File created C:\Windows\SysWOW64\Cdcbljie.dll Iiffen32.exe File opened for modification C:\Windows\SysWOW64\Ipckgh32.exe Imdnklfp.exe File created C:\Windows\SysWOW64\Idofhfmm.exe Ipckgh32.exe File opened for modification C:\Windows\SysWOW64\Ijfboafl.exe Ibojncfj.exe File created C:\Windows\SysWOW64\Imbaemhc.exe Iiffen32.exe File created C:\Windows\SysWOW64\Iiffen32.exe 24a5a567039204360a31cac8214c7d99.exe File opened for modification C:\Windows\SysWOW64\Ipqnahgf.exe Imbaemhc.exe File created C:\Windows\SysWOW64\Fojkiimn.dll Icljbg32.exe File created C:\Windows\SysWOW64\Imdnklfp.exe Ijfboafl.exe File opened for modification C:\Windows\SysWOW64\Idofhfmm.exe Ipckgh32.exe File opened for modification C:\Windows\SysWOW64\Iiffen32.exe 24a5a567039204360a31cac8214c7d99.exe File created C:\Windows\SysWOW64\Gkillp32.dll 24a5a567039204360a31cac8214c7d99.exe File opened for modification C:\Windows\SysWOW64\Ibojncfj.exe Icljbg32.exe File created C:\Windows\SysWOW64\Ijfboafl.exe Ibojncfj.exe File created C:\Windows\SysWOW64\Phogofep.dll Ibojncfj.exe File created C:\Windows\SysWOW64\Ekmihm32.dll Ijfboafl.exe File created C:\Windows\SysWOW64\Ipckgh32.exe Imdnklfp.exe File created C:\Windows\SysWOW64\Eddbig32.dll Ipckgh32.exe File opened for modification C:\Windows\SysWOW64\Ifmcdblq.exe Idofhfmm.exe File created C:\Windows\SysWOW64\Ipqnahgf.exe Imbaemhc.exe File created C:\Windows\SysWOW64\Icljbg32.exe Ipqnahgf.exe File created C:\Windows\SysWOW64\Dendnoah.dll Ipqnahgf.exe File opened for modification C:\Windows\SysWOW64\Imdnklfp.exe Ijfboafl.exe File opened for modification C:\Windows\SysWOW64\Imbaemhc.exe Iiffen32.exe File created C:\Windows\SysWOW64\Mlilmlna.dll Imbaemhc.exe File created C:\Windows\SysWOW64\Ibojncfj.exe Icljbg32.exe File created C:\Windows\SysWOW64\Ifmcdblq.exe Idofhfmm.exe File created C:\Windows\SysWOW64\Hiaohfpc.dll Idofhfmm.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 6296 5752 WerFault.exe 62 -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" 24a5a567039204360a31cac8214c7d99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Imbaemhc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ipqnahgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dendnoah.dll" Ipqnahgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 24a5a567039204360a31cac8214c7d99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdcbljie.dll" Iiffen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phogofep.dll" Ibojncfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkillp32.dll" 24a5a567039204360a31cac8214c7d99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iiffen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iiffen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ibojncfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekmihm32.dll" Ijfboafl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Imdnklfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 24a5a567039204360a31cac8214c7d99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ijfboafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eddbig32.dll" Ipckgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Idofhfmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ijfboafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Imdnklfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 24a5a567039204360a31cac8214c7d99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hiaohfpc.dll" Idofhfmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 24a5a567039204360a31cac8214c7d99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ipqnahgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikjmhmfd.dll" Imdnklfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ipckgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ipckgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Idofhfmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlilmlna.dll" Imbaemhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Imbaemhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fojkiimn.dll" Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ibojncfj.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 800 wrote to memory of 1940 800 24a5a567039204360a31cac8214c7d99.exe 15 PID 800 wrote to memory of 1940 800 24a5a567039204360a31cac8214c7d99.exe 15 PID 800 wrote to memory of 1940 800 24a5a567039204360a31cac8214c7d99.exe 15 PID 1940 wrote to memory of 836 1940 Iiffen32.exe 158 PID 1940 wrote to memory of 836 1940 Iiffen32.exe 158 PID 1940 wrote to memory of 836 1940 Iiffen32.exe 158 PID 836 wrote to memory of 1260 836 Imbaemhc.exe 157 PID 836 wrote to memory of 1260 836 Imbaemhc.exe 157 PID 836 wrote to memory of 1260 836 Imbaemhc.exe 157 PID 1260 wrote to memory of 908 1260 Ipqnahgf.exe 156 PID 1260 wrote to memory of 908 1260 Ipqnahgf.exe 156 PID 1260 wrote to memory of 908 1260 Ipqnahgf.exe 156 PID 908 wrote to memory of 2636 908 Icljbg32.exe 155 PID 908 wrote to memory of 2636 908 Icljbg32.exe 155 PID 908 wrote to memory of 2636 908 Icljbg32.exe 155 PID 2636 wrote to memory of 3608 2636 Ibojncfj.exe 154 PID 2636 wrote to memory of 3608 2636 Ibojncfj.exe 154 PID 2636 wrote to memory of 3608 2636 Ibojncfj.exe 154 PID 3608 wrote to memory of 4744 3608 Ijfboafl.exe 153 PID 3608 wrote to memory of 4744 3608 Ijfboafl.exe 153 PID 3608 wrote to memory of 4744 3608 Ijfboafl.exe 153 PID 4744 wrote to memory of 4836 4744 Imdnklfp.exe 152 PID 4744 wrote to memory of 4836 4744 Imdnklfp.exe 152 PID 4744 wrote to memory of 4836 4744 Imdnklfp.exe 152 PID 4836 wrote to memory of 952 4836 Ipckgh32.exe 151 PID 4836 wrote to memory of 952 4836 Ipckgh32.exe 151 PID 4836 wrote to memory of 952 4836 Ipckgh32.exe 151 PID 952 wrote to memory of 3920 952 Idofhfmm.exe 150 PID 952 wrote to memory of 3920 952 Idofhfmm.exe 150 PID 952 wrote to memory of 3920 952 Idofhfmm.exe 150
Processes
-
C:\Windows\SysWOW64\Iiffen32.exeC:\Windows\system32\Iiffen32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\Imbaemhc.exeC:\Windows\system32\Imbaemhc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:836
-
-
C:\Windows\SysWOW64\Idacmfkj.exeC:\Windows\system32\Idacmfkj.exe1⤵PID:3844
-
C:\Windows\SysWOW64\Ijkljp32.exeC:\Windows\system32\Ijkljp32.exe2⤵PID:3816
-
-
C:\Windows\SysWOW64\Jaimbj32.exeC:\Windows\system32\Jaimbj32.exe1⤵PID:1524
-
C:\Windows\SysWOW64\Jdhine32.exeC:\Windows\system32\Jdhine32.exe2⤵PID:400
-
-
C:\Windows\SysWOW64\Jigollag.exeC:\Windows\system32\Jigollag.exe1⤵PID:232
-
C:\Windows\SysWOW64\Jangmibi.exeC:\Windows\system32\Jangmibi.exe2⤵PID:2992
-
-
C:\Windows\SysWOW64\Jiikak32.exeC:\Windows\system32\Jiikak32.exe1⤵PID:2888
-
C:\Windows\SysWOW64\Kaqcbi32.exeC:\Windows\system32\Kaqcbi32.exe2⤵PID:4620
-
-
C:\Windows\SysWOW64\Kilhgk32.exeC:\Windows\system32\Kilhgk32.exe1⤵PID:1844
-
C:\Windows\SysWOW64\Kacphh32.exeC:\Windows\system32\Kacphh32.exe2⤵PID:3044
-
-
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe1⤵PID:2212
-
C:\Windows\SysWOW64\Kkkdan32.exeC:\Windows\system32\Kkkdan32.exe2⤵PID:2640
-
C:\Windows\SysWOW64\Kaemnhla.exeC:\Windows\system32\Kaemnhla.exe3⤵PID:2024
-
-
-
C:\Windows\SysWOW64\Kdcijcke.exeC:\Windows\system32\Kdcijcke.exe1⤵PID:4832
-
C:\Windows\SysWOW64\Kgbefoji.exeC:\Windows\system32\Kgbefoji.exe2⤵PID:4596
-
C:\Windows\SysWOW64\Kipabjil.exeC:\Windows\system32\Kipabjil.exe3⤵PID:4152
-
-
-
C:\Windows\SysWOW64\Kpjjod32.exeC:\Windows\system32\Kpjjod32.exe1⤵PID:5140
-
C:\Windows\SysWOW64\Kcifkp32.exeC:\Windows\system32\Kcifkp32.exe2⤵PID:5188
-
-
C:\Windows\SysWOW64\Lmqgnhmp.exeC:\Windows\system32\Lmqgnhmp.exe1⤵PID:5452
-
C:\Windows\SysWOW64\Lpocjdld.exeC:\Windows\system32\Lpocjdld.exe2⤵PID:5492
-
-
C:\Windows\SysWOW64\Laopdgcg.exeC:\Windows\system32\Laopdgcg.exe1⤵PID:5656
-
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe2⤵PID:5712
-
-
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe1⤵PID:5756
-
C:\Windows\SysWOW64\Lkgdml32.exeC:\Windows\system32\Lkgdml32.exe2⤵PID:5796
-
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe3⤵PID:5836
-
-
-
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe1⤵PID:5876
-
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe2⤵PID:5916
-
-
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe1⤵PID:5968
-
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe2⤵PID:6004
-
-
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe1⤵PID:6048
-
C:\Windows\SysWOW64\Laciofpa.exeC:\Windows\system32\Laciofpa.exe2⤵PID:6092
-
-
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe1⤵PID:6132
-
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe2⤵PID:5168
-
-
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe1⤵PID:5348
-
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe2⤵PID:5448
-
-
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe1⤵PID:5524
-
C:\Windows\SysWOW64\Lddbqa32.exeC:\Windows\system32\Lddbqa32.exe2⤵PID:5608
-
-
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe1⤵PID:5692
-
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe2⤵PID:5696
-
-
C:\Windows\SysWOW64\Mjqjih32.exeC:\Windows\system32\Mjqjih32.exe1⤵PID:5820
-
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe2⤵PID:5908
-
-
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe1⤵PID:5992
-
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe2⤵PID:6100
-
C:\Windows\SysWOW64\Mgekbljc.exeC:\Windows\system32\Mgekbljc.exe3⤵PID:5240
-
C:\Windows\SysWOW64\Mpmokb32.exeC:\Windows\system32\Mpmokb32.exe4⤵PID:5420
-
-
-
-
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe1⤵PID:5540
-
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe2⤵PID:5700
-
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe3⤵PID:5824
-
-
-
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe1⤵PID:6076
-
C:\Windows\SysWOW64\Mdkhapfj.exeC:\Windows\system32\Mdkhapfj.exe2⤵PID:5272
-
C:\Windows\SysWOW64\Mcnhmm32.exeC:\Windows\system32\Mcnhmm32.exe3⤵PID:5484
-
-
-
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe1⤵PID:5736
-
C:\Windows\SysWOW64\Mncmjfmk.exeC:\Windows\system32\Mncmjfmk.exe2⤵PID:5900
-
-
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe1⤵PID:5596
-
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe2⤵PID:5884
-
-
C:\Windows\SysWOW64\Mnfipekh.exeC:\Windows\system32\Mnfipekh.exe1⤵PID:5856
-
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe2⤵PID:5744
-
-
C:\Windows\SysWOW64\Mcbahlip.exeC:\Windows\system32\Mcbahlip.exe1⤵PID:6184
-
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe2⤵PID:6224
-
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe3⤵PID:6276
-
-
-
C:\Windows\SysWOW64\Nqfbaq32.exeC:\Windows\system32\Nqfbaq32.exe1⤵PID:6356
-
C:\Windows\SysWOW64\Ndbnboqb.exeC:\Windows\system32\Ndbnboqb.exe2⤵PID:6392
-
-
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe1⤵PID:6440
-
C:\Windows\SysWOW64\Nklfoi32.exeC:\Windows\system32\Nklfoi32.exe2⤵PID:6488
-
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe3⤵PID:6536
-
-
-
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe1⤵PID:6620
-
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe2⤵PID:6668
-
-
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe1⤵PID:6712
-
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe2⤵PID:6744
-
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe3⤵PID:6800
-
-
-
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe1⤵PID:6880
-
C:\Windows\SysWOW64\Nkqpjidj.exeC:\Windows\system32\Nkqpjidj.exe2⤵PID:6932
-
-
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe1⤵PID:6976
-
C:\Windows\SysWOW64\Nbkhfc32.exeC:\Windows\system32\Nbkhfc32.exe2⤵PID:7020
-
-
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe1⤵PID:7064
-
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe2⤵PID:7104
-
-
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe1⤵PID:7148
-
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe2⤵PID:5752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5752 -s 4203⤵
- Program crash
PID:6296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5752 -ip 57521⤵PID:6268
-
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe1⤵PID:6844
-
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe1⤵PID:6576
-
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe1⤵PID:6316
-
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe1⤵PID:5356
-
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe1⤵PID:6128
-
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe1⤵PID:5264
-
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe1⤵PID:5956
-
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe1⤵PID:5220
-
C:\Windows\SysWOW64\Liggbi32.exeC:\Windows\system32\Liggbi32.exe1⤵PID:5616
-
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe1⤵PID:5568
-
C:\Windows\SysWOW64\Ldkojb32.exeC:\Windows\system32\Ldkojb32.exe1⤵PID:5528
-
C:\Windows\SysWOW64\Kkbkamnl.exeC:\Windows\system32\Kkbkamnl.exe1⤵PID:5412
-
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe1⤵PID:5364
-
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe1⤵PID:5324
-
C:\Windows\SysWOW64\Kajfig32.exeC:\Windows\system32\Kajfig32.exe1⤵PID:5284
-
C:\Windows\SysWOW64\Kkpnlm32.exeC:\Windows\system32\Kkpnlm32.exe1⤵PID:5232
-
C:\Windows\SysWOW64\Kmlnbi32.exeC:\Windows\system32\Kmlnbi32.exe1⤵PID:1780
-
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe1⤵PID:1540
-
C:\Windows\SysWOW64\Kkihknfg.exeC:\Windows\system32\Kkihknfg.exe1⤵PID:1368
-
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe1⤵PID:3440
-
C:\Windows\SysWOW64\Kpccnefa.exeC:\Windows\system32\Kpccnefa.exe1⤵PID:928
-
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe1⤵PID:4960
-
C:\Windows\SysWOW64\Jbocea32.exeC:\Windows\system32\Jbocea32.exe1⤵PID:3932
-
C:\Windows\SysWOW64\Jpaghf32.exeC:\Windows\system32\Jpaghf32.exe1⤵PID:2080
-
C:\Windows\SysWOW64\Jkdnpo32.exeC:\Windows\system32\Jkdnpo32.exe1⤵PID:2972
-
C:\Windows\SysWOW64\Jdjfcecp.exeC:\Windows\system32\Jdjfcecp.exe1⤵PID:1460
-
C:\Windows\SysWOW64\Jaljgidl.exeC:\Windows\system32\Jaljgidl.exe1⤵PID:3484
-
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe1⤵PID:2296
-
C:\Windows\SysWOW64\Jjbako32.exeC:\Windows\system32\Jjbako32.exe1⤵PID:3988
-
C:\Windows\SysWOW64\Jbkjjblm.exeC:\Windows\system32\Jbkjjblm.exe1⤵PID:1600
-
C:\Windows\SysWOW64\Jibeql32.exeC:\Windows\system32\Jibeql32.exe1⤵PID:3764
-
C:\Windows\SysWOW64\Jfdida32.exeC:\Windows\system32\Jfdida32.exe1⤵PID:1732
-
C:\Windows\SysWOW64\Jdemhe32.exeC:\Windows\system32\Jdemhe32.exe1⤵PID:3544
-
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe1⤵PID:2960
-
C:\Windows\SysWOW64\Jmkdlkph.exeC:\Windows\system32\Jmkdlkph.exe1⤵PID:4436
-
C:\Windows\SysWOW64\Jjmhppqd.exeC:\Windows\system32\Jjmhppqd.exe1⤵PID:3648
-
C:\Windows\SysWOW64\Jfaloa32.exeC:\Windows\system32\Jfaloa32.exe1⤵PID:4924
-
C:\Windows\SysWOW64\Jdcpcf32.exeC:\Windows\system32\Jdcpcf32.exe1⤵PID:4332
-
C:\Windows\SysWOW64\Jpgdbg32.exeC:\Windows\system32\Jpgdbg32.exe1⤵PID:1356
-
C:\Windows\SysWOW64\Imihfl32.exeC:\Windows\system32\Imihfl32.exe1⤵PID:1508
-
C:\Windows\SysWOW64\Ipegmg32.exeC:\Windows\system32\Ipegmg32.exe1⤵PID:3864
-
C:\Windows\SysWOW64\Imgkql32.exeC:\Windows\system32\Imgkql32.exe1⤵PID:3944
-
C:\Windows\SysWOW64\Ijhodq32.exeC:\Windows\system32\Ijhodq32.exe1⤵PID:3900
-
C:\Windows\SysWOW64\Ifmcdblq.exeC:\Windows\system32\Ifmcdblq.exe1⤵
- Executes dropped EXE
PID:3920
-
C:\Windows\SysWOW64\Idofhfmm.exeC:\Windows\system32\Idofhfmm.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:952
-
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4836
-
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4744
-
C:\Windows\SysWOW64\Ijfboafl.exeC:\Windows\system32\Ijfboafl.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608
-
C:\Windows\SysWOW64\Ibojncfj.exeC:\Windows\system32\Ibojncfj.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636
-
C:\Windows\SysWOW64\Icljbg32.exeC:\Windows\system32\Icljbg32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:908
-
C:\Windows\SysWOW64\Ipqnahgf.exeC:\Windows\system32\Ipqnahgf.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1260
-
C:\Users\Admin\AppData\Local\Temp\24a5a567039204360a31cac8214c7d99.exe"C:\Users\Admin\AppData\Local\Temp\24a5a567039204360a31cac8214c7d99.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5aa403be879952ccd04c46215f667ad50
SHA1a1a194962c97d63523086a266affe6c8bbd6a33d
SHA256930cb893315820e8394472a3f13cdafd539bd23d91c3e2ffd592211af93c2cb3
SHA51224b54d745ede0cd6e6ce3e79df86ce8cc2afd02fefd459ef8f7d39a792760c58f2901072285b217936216ace4f6e0dcea5711719191cee4e20b7acd9948028a2
-
Filesize
145KB
MD590d9bcab94c0ff7adf412f3b659f4e8c
SHA194212347a98e4c423926ced0dc1f94a0efd9c950
SHA25623c185eb0e5560efe2238ac249a8988415dded2041efe8d3a017dfac119ec211
SHA512a50289ea435feb73b68a10cdb1acdb6ef0331ac7029919e2fb5b35df9a0beda056f26b059357ba215902efef2a4a9ff2e738ea4f6d8da08676d51112b9412a11
-
Filesize
145KB
MD5ebf6e548d367d35022105da9848e1401
SHA182190f4decef4500dcc45e868780a2bdf7dadd44
SHA256984f08fa2c42e2fcad44a8dda973ad035e9791a36c8a4ee56d150ab9fec92c8e
SHA512ccc82fb05509032d403a0f3e3bdd84eb2ccf8f464b9daa5dd22a9c23820e5d6a1921cfde1b1febe66cb6b79df5df3a80fc95ce2d1cf261c8123c7b661127a93a
-
Filesize
145KB
MD5737db58c30c2481d7f243c7d2f4f1fca
SHA1eb2debacd95d67442df1f8131f244ced656d58af
SHA256a83b36df65bdd0b49a38c0b8959c123bc0824a35ad1deb0b3441d8bff8b2ceed
SHA5120c627870c2f5fb2ba3ec1411d2a7034ac0644b9e146724f6a7e386f6b2a6aff903ad09059fe67b0aa302346d720a426a869547917d729ad01bf6df44966e81a2
-
Filesize
145KB
MD54c68f6940b0086eaba8b2b222bb4b8a8
SHA1f9d0f3edb188fbf9cfb33b7fbc319363c22fc158
SHA25678ecaba40ca07f4927ca306573878f1aa9429f33edeca2826d953551744ceeef
SHA512e6b034590e01ab1ae089dc4c97cb5f1a793178a1d26fc6e06b274a4c21c1e66c24b081d0a6bc49bdcc0d8128361966629e5f99006c86e0a1799b59c7cb7a4063
-
Filesize
145KB
MD5f73398ac116f066939ca6d97ad6e14c2
SHA1974a210702042689351578cec8313577f2e5f6cc
SHA2568f538c938a2fe9e8d576f711de463615972aa54f2ecda60176940693c2e08881
SHA5125be7fe1a597d7d0982e8e9d42b72ccf2684a02442b5784f9cf3d064d931f7ad2841250192c97a12072c80933feac05564e029d54e16fa29690b8b2f552772fa2
-
Filesize
145KB
MD55b50ac14d1807ffd02513ea1ac5a5cd4
SHA163c791aec8f0b3752513101c74eb662b0dfcee7e
SHA256bb5ad5afa83aeb7552322bbf6d47d531afe217f04827556e506340e315f5ccb3
SHA51200e95d30b3cd943e5278199b7faa9e81c151cc12afe50596e5d6f60a8132cd853e7905dd902b6d2fd94fd6200ac772e0cdebf3a17ef537c2d92648dffe419b4d
-
Filesize
145KB
MD55337e5d94c67036fbfac9bfd7d1ee591
SHA1f3792a7034b0b203be74da926428b6cff0ecc253
SHA256a911585fbc2b2e8c24f7d2a4b1c200f32d7cbe8650d8d98d7cb510211b5732a1
SHA5128f1580de30b80ca042a10f98d5e8c8075672de595f57861a8a53aae55cac11534f7ebfc1236f7fa15f8d2d3c6aaf57709a3b1fa27b6f3df91a0264e9602884e7
-
Filesize
145KB
MD53d450efa3e2d08ba349b04669b37942c
SHA1274ee45074daa56ce63a6de24e41ceb0339a7538
SHA2564fef2a37ed5bd3830933b845d752a0f37de4fb700aa9a57ca184e7391ba035cb
SHA512c20472b6e8a5bdd94ebc64d8f8f5f7cb4317b1edc4bea2359fae1d9d1a301b2493a2bd169e9a61db8aec00c19dd96daa87099ce9d46e469deccbfccfe32cc790
-
Filesize
145KB
MD5b6f2a902a8bd3adf751c4a5fa943584c
SHA1ea0a6178883ba8c5217d5bf0af69a1e222079d9d
SHA2565d511091a123f1c190c5fd0922ac49839a8b7ff44469a4800dbf78057f72d3db
SHA512d8b2f2d94c6b113a28b804662e2c39fcf113c5211437fb6623f8156da43d8391c00528e2a5facf478c1d02e7fbd10ff4f7cb9eb75fab07d0b5f2ff676da77f4f
-
Filesize
145KB
MD58ead824e14aad6e53f861fd517cae466
SHA1c62f272e00a6ab20322c32901f84243cdaad9ff7
SHA256877a77201a60e13f6df4e96fe5fe77815de70dc11c356975c746ba6d7115d308
SHA5129837d7d1417506930dcc89b8150543bc167245b6156eb1ff987e78f39f9a6784234d6e6922ab51bc4488a7b6425dc8fc17aa85b0a91d03e07f7904d50912d97b
-
Filesize
145KB
MD5ed9f92240f5f683bfd34ad766efa94e0
SHA163b4d1d54d9a6983415c0891a0608c089c5a7073
SHA256029c58e85a07ee687ab12530819bcdc74e5cf66d8e1b165e6df47a2c8975cc7e
SHA51267869b7890d2b381ce31ccfbdee0f3a371e948d36f4e6e083c2c5ee29a4fec53cbf9a8c48439d705ab2711e8ee17877664cd713e4e3c4db9d2019312ea44d7f3
-
Filesize
145KB
MD500382b2d8893fdb47439ec8158385d69
SHA1f0e5cee05da4d99725e42a914707a0d051771bc1
SHA2565ee82e018591b0f08d970df864223ca56bcc6a9d2200cf892dce605659b14638
SHA512be7ddddc03a972e3876ccfae68b70d078b964ec807033212625a3057a44fd753d20e42adb93013f75f9fe986c1a983379044236fc3227369ff14df4b6c86a3c4
-
Filesize
145KB
MD51cc4df0adffe52ba4587932df91c7a33
SHA17aa3effc9f76283f319113d72dcc7e66d1754e25
SHA256e6ef5672a9f433f629abd1994fd3bd39435f3f3113a0248735c81dd214c5f11d
SHA512e4f01712de1a1ab43d1b64ac54ca0418a69ede7df22e8563b87683f482b203b0557e9981c9430e56806e12b37e31f98c295532a26a3c8cbb94f18bf2a2980097
-
Filesize
95KB
MD5b9d9ff1d996bfccc4bec91a73358d966
SHA1ff3a067dcea26485897f1e9c8e58331b18fe5efb
SHA2567de0041f1259f2c6ec1f77eac9b585fbad6542a926b572a35ab971b95ca524f4
SHA5127154b4cfe53c1b10a2a030bc92fadb6161f45b50f1a53a1f2501f5ec112f1662d79e6d490cb712f3f3f9eb604c7ec99e4043e92aeb2d00875aa632310a0ecdd2
-
Filesize
145KB
MD5b78546722325aebee8e7d54538d0822d
SHA1f138d8d11713dfd9f3e3207e369c95c5467d5355
SHA256cc33c49b2ed81c7929d3b3bb4476bd17d91f3ae7e942e9c18dcbcfbd43b6b8b0
SHA512d87e18258038447f51c1e5f1bfaab1b1de3ad9a73ba213d5724d4ed144a46acdb53a487e93b1f7c04517c3be3915a1400d4f07aba7f93ed5d98bb105328b6220
-
Filesize
145KB
MD5b0ffb68d213e27038879bc5b0982171b
SHA1a1c17f16d39b170e971602da7cc579ecbeeda4e5
SHA25624a3836bba6cb20ee611c1aa7db6a1e48fd6e179de2852d50daf41001b9882a0
SHA5125a64ed043e55da33a5f94a160a4fcf492a4762d36022caec6673b8a95b7039617a416403405861abaae4b4f473d21e58d280b4bf140e1352e38d4df127028614
-
Filesize
145KB
MD54d4b324c930ab88c9dbf8d8caa1e553e
SHA1633d7d83ddc0f470b3136a88929ff71ee6ed633f
SHA2561c667ca8250dd0d38334de195dea4e75596df3e312d8faf77caaec5dab2230a2
SHA5123c8bd8acafa143b71af63f2083a1937506523f0472d6bf85902f2963ec9ec117e0fd8ad542de1218191fd97e35a57dd796102d1106efe1d7e61674b46e3da871
-
Filesize
92KB
MD5d9f18c6cfc7dcdfba0a5b07e15a821ce
SHA1d3bb0afef47cfeeb448cb9e5c73e9165633258cc
SHA2563523cdf6e04e2dc59f5eec287f4ddb2e6dc3488d4b26849e3b89bd2c1ffb2f07
SHA512c367fbd3e897fbdafb1de39124e151cf353aea0380d265ac0e26930cd0fc6fa5fef2ba51b622e0e17bf92dde5b710953b3a838f27b9c1b9458575b5131907bd9