Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
73c2a8838d9f4a62fad6ca8d3d32c836.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73c2a8838d9f4a62fad6ca8d3d32c836.exe
Resource
win10v2004-20231222-en
General
-
Target
73c2a8838d9f4a62fad6ca8d3d32c836.exe
-
Size
333KB
-
MD5
73c2a8838d9f4a62fad6ca8d3d32c836
-
SHA1
32135d6da31d5dde5abfb6c22345abd3aa554061
-
SHA256
8155c64edff365ea62634cfca656173ce867eaddda1c7dfe51db7327737e1cf1
-
SHA512
9f127d2b829c855bef9a01fed0d7e1d6828133f461eaa3e6768f96902a91f0f9f2ef6991eb2792d95d65ed278ba2f692f7408ca5c120a46c783715f7e2b625de
-
SSDEEP
6144:VWlkOHlo+F7B9sd1UQXMbQRjkod6U912429sd1UQXMbQRjkod6U:VwkOHi+JQkA1GQk
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nddkgonp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpappc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nklfoi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkbkamnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcdegnep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mciobn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkpgck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkjjij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liggbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndbnboqb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfdida32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lilanioo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njljefql.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpepcedo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kphmie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lijdhiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbapjafe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdhbec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njcpee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiikak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcpllo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpmfddnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdcijcke.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcklgm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbocea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpmfddnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laopdgcg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laciofpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkpgck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lddbqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liggbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngcgcjnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncihikcg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jplmmfmi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaqcbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgneampk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lilanioo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcdegnep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmnaakne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmpngk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcmofolg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpaifalo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kagichjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjhqjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldaeka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmgdgjek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kibnhjgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liekmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnjjdgee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkgmcjld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmbklj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laalifad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnocof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbkjjblm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnlfigcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkkdan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdiklqhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpdelajl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgbefoji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkbkamnl.exe -
Executes dropped EXE 64 IoCs
pid Process 3064 Jdcpcf32.exe 4348 Jfaloa32.exe 3660 Jmkdlkph.exe 3968 Jpjqhgol.exe 3628 Jbhmdbnp.exe 4772 Jfdida32.exe 2076 Jmnaakne.exe 4404 Jplmmfmi.exe 2980 Jbkjjblm.exe 548 Jjbako32.exe 1996 Jmpngk32.exe 2784 Jaljgidl.exe 4092 Jdjfcecp.exe 1908 Jbmfoa32.exe 3204 Jkdnpo32.exe 1684 Jmbklj32.exe 644 Jangmibi.exe 2024 Jbocea32.exe 1576 Jiikak32.exe 1520 Kaqcbi32.exe 2020 Kbapjafe.exe 3996 Kkihknfg.exe 740 Kmgdgjek.exe 2992 Kpepcedo.exe 3616 Kbdmpqcb.exe 656 Kkkdan32.exe 2320 Kphmie32.exe 2920 Kdcijcke.exe 4992 Kgbefoji.exe 2304 Kknafn32.exe 4336 Kagichjo.exe 2296 Kdffocib.exe 4272 Kgdbkohf.exe 2376 Kibnhjgj.exe 456 Kpmfddnf.exe 4600 Kdhbec32.exe 4948 Kkbkamnl.exe 1944 Liekmj32.exe 1396 Lcmofolg.exe 756 Lgikfn32.exe 5012 Liggbi32.exe 4364 Laopdgcg.exe 2696 Lpappc32.exe 3396 Ldmlpbbj.exe 1196 Lcpllo32.exe 1928 Lkgdml32.exe 4832 Lijdhiaa.exe 5000 Laalifad.exe 1676 Lpcmec32.exe 4452 Lcbiao32.exe 2484 Lgneampk.exe 1004 Lkiqbl32.exe 1404 Lilanioo.exe 4864 Laciofpa.exe 2588 Ldaeka32.exe 748 Lcdegnep.exe 4412 Lklnhlfb.exe 4668 Lnjjdgee.exe 1904 Laefdf32.exe 4016 Lddbqa32.exe 5028 Lgbnmm32.exe 1712 Mjqjih32.exe 4260 Mnlfigcc.exe 808 Mahbje32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kphmie32.exe Kkkdan32.exe File created C:\Windows\SysWOW64\Gcgqhjop.dll Lgikfn32.exe File created C:\Windows\SysWOW64\Lidmdfdo.dll Lpcmec32.exe File opened for modification C:\Windows\SysWOW64\Lgneampk.exe Lcbiao32.exe File opened for modification C:\Windows\SysWOW64\Mkepnjng.exe Mcnhmm32.exe File opened for modification C:\Windows\SysWOW64\Mdpalp32.exe Mpdelajl.exe File created C:\Windows\SysWOW64\Kmgdgjek.exe Kkihknfg.exe File created C:\Windows\SysWOW64\Kpmfddnf.exe Kibnhjgj.exe File created C:\Windows\SysWOW64\Lnjjdgee.exe Lklnhlfb.exe File created C:\Windows\SysWOW64\Mkepnjng.exe Mcnhmm32.exe File created C:\Windows\SysWOW64\Hnfmbf32.dll Mdpalp32.exe File opened for modification C:\Windows\SysWOW64\Nacbfdao.exe Njljefql.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Nggqoj32.exe File created C:\Windows\SysWOW64\Akihmf32.dll Kagichjo.exe File created C:\Windows\SysWOW64\Jiikak32.exe Jbocea32.exe File opened for modification C:\Windows\SysWOW64\Kdffocib.exe Kagichjo.exe File created C:\Windows\SysWOW64\Offdjb32.dll Liekmj32.exe File created C:\Windows\SysWOW64\Lkgdml32.exe Lcpllo32.exe File opened for modification C:\Windows\SysWOW64\Jbkjjblm.exe Jplmmfmi.exe File created C:\Windows\SysWOW64\Mdiklqhm.exe Majopeii.exe File created C:\Windows\SysWOW64\Mgnnhk32.exe Mdpalp32.exe File created C:\Windows\SysWOW64\Kkkdan32.exe Kbdmpqcb.exe File created C:\Windows\SysWOW64\Mkeebhjc.dll Kkkdan32.exe File created C:\Windows\SysWOW64\Laalifad.exe Lijdhiaa.exe File opened for modification C:\Windows\SysWOW64\Mpdelajl.exe Mkgmcjld.exe File opened for modification C:\Windows\SysWOW64\Nnmopdep.exe Njacpf32.exe File created C:\Windows\SysWOW64\Kkihknfg.exe Kbapjafe.exe File opened for modification C:\Windows\SysWOW64\Kphmie32.exe Kkkdan32.exe File created C:\Windows\SysWOW64\Lpappc32.exe Laopdgcg.exe File opened for modification C:\Windows\SysWOW64\Nddkgonp.exe Nqiogp32.exe File opened for modification C:\Windows\SysWOW64\Njacpf32.exe Ngcgcjnc.exe File created C:\Windows\SysWOW64\Jbhmdbnp.exe Jpjqhgol.exe File created C:\Windows\SysWOW64\Ndidbn32.exe Nqmhbpba.exe File opened for modification C:\Windows\SysWOW64\Kmgdgjek.exe Kkihknfg.exe File opened for modification C:\Windows\SysWOW64\Kagichjo.exe Kknafn32.exe File created C:\Windows\SysWOW64\Ogijli32.dll Lkgdml32.exe File created C:\Windows\SysWOW64\Jlnpomfk.dll Nqiogp32.exe File created C:\Windows\SysWOW64\Jkdnpo32.exe Jbmfoa32.exe File created C:\Windows\SysWOW64\Mjhqjg32.exe Mkepnjng.exe File created C:\Windows\SysWOW64\Ndbnboqb.exe Nacbfdao.exe File opened for modification C:\Windows\SysWOW64\Nceonl32.exe Ndbnboqb.exe File created C:\Windows\SysWOW64\Njcpee32.exe Ngedij32.exe File opened for modification C:\Windows\SysWOW64\Mamleegg.exe Mnapdf32.exe File created C:\Windows\SysWOW64\Mghpbg32.dll Kbdmpqcb.exe File created C:\Windows\SysWOW64\Epmjjbbj.dll Mdiklqhm.exe File opened for modification C:\Windows\SysWOW64\Maohkd32.exe Mjhqjg32.exe File opened for modification C:\Windows\SysWOW64\Njogjfoj.exe Nklfoi32.exe File opened for modification C:\Windows\SysWOW64\Jpjqhgol.exe Jmkdlkph.exe File opened for modification C:\Windows\SysWOW64\Mpolqa32.exe Mamleegg.exe File opened for modification C:\Windows\SysWOW64\Jmpngk32.exe Jjbako32.exe File created C:\Windows\SysWOW64\Jmpngk32.exe Jjbako32.exe File created C:\Windows\SysWOW64\Lgbnmm32.exe Lddbqa32.exe File created C:\Windows\SysWOW64\Mahbje32.exe Mnlfigcc.exe File created C:\Windows\SysWOW64\Aajjaf32.dll Jdcpcf32.exe File opened for modification C:\Windows\SysWOW64\Mglack32.exe Mdmegp32.exe File created C:\Windows\SysWOW64\Addjcmqn.dll Ndidbn32.exe File opened for modification C:\Windows\SysWOW64\Mkpgck32.exe Mciobn32.exe File created C:\Windows\SysWOW64\Lijdhiaa.exe Lkgdml32.exe File opened for modification C:\Windows\SysWOW64\Mnlfigcc.exe Mjqjih32.exe File created C:\Windows\SysWOW64\Flfmin32.dll Mahbje32.exe File opened for modification C:\Windows\SysWOW64\Ngedij32.exe Ncihikcg.exe File created C:\Windows\SysWOW64\Jfaloa32.exe Jdcpcf32.exe File created C:\Windows\SysWOW64\Jbkjjblm.exe Jplmmfmi.exe File opened for modification C:\Windows\SysWOW64\Ldmlpbbj.exe Lpappc32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5920 5832 WerFault.exe 137 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfdida32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jmpngk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpepcedo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkbkamnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibhblqpo.dll" Mnlfigcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgiacnii.dll" 73c2a8838d9f4a62fad6ca8d3d32c836.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jaljgidl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnjjdgee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgbnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjqjih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndninjfg.dll" Jmkdlkph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbapjafe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lpappc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bheenp32.dll" Lcdegnep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcklgm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nacbfdao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nklfoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cqncfneo.dll" Kkihknfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdcijcke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogdimilg.dll" Kpmfddnf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Laciofpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkckjila.dll" Nqklmpdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pellipfm.dll" Liggbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpaifalo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojmmkpmf.dll" Kpepcedo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Milgab32.dll" Kdcijcke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnjdmn32.dll" Kibnhjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Laopdgcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mecaoggc.dll" Lddbqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Maohkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njljefql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njogjfoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jmnaakne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjbako32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpmfddnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebaqkk32.dll" Lnjjdgee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egqcbapl.dll" Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmkdlkph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbocea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkkdan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mamleegg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkdnpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lijdhiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcnhmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaehlf32.dll" Mdmegp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndbnboqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibimpp32.dll" Jplmmfmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjbako32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jangmibi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcpllo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmbnpm32.dll" Ngcgcjnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkgdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcbiao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lklnhlfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpolqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdcpcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpjqhgol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbocea32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3064 1660 73c2a8838d9f4a62fad6ca8d3d32c836.exe 84 PID 1660 wrote to memory of 3064 1660 73c2a8838d9f4a62fad6ca8d3d32c836.exe 84 PID 1660 wrote to memory of 3064 1660 73c2a8838d9f4a62fad6ca8d3d32c836.exe 84 PID 3064 wrote to memory of 4348 3064 Jdcpcf32.exe 86 PID 3064 wrote to memory of 4348 3064 Jdcpcf32.exe 86 PID 3064 wrote to memory of 4348 3064 Jdcpcf32.exe 86 PID 4348 wrote to memory of 3660 4348 Jfaloa32.exe 85 PID 4348 wrote to memory of 3660 4348 Jfaloa32.exe 85 PID 4348 wrote to memory of 3660 4348 Jfaloa32.exe 85 PID 3660 wrote to memory of 3968 3660 Jmkdlkph.exe 87 PID 3660 wrote to memory of 3968 3660 Jmkdlkph.exe 87 PID 3660 wrote to memory of 3968 3660 Jmkdlkph.exe 87 PID 3968 wrote to memory of 3628 3968 Jpjqhgol.exe 198 PID 3968 wrote to memory of 3628 3968 Jpjqhgol.exe 198 PID 3968 wrote to memory of 3628 3968 Jpjqhgol.exe 198 PID 3628 wrote to memory of 4772 3628 Jbhmdbnp.exe 197 PID 3628 wrote to memory of 4772 3628 Jbhmdbnp.exe 197 PID 3628 wrote to memory of 4772 3628 Jbhmdbnp.exe 197 PID 4772 wrote to memory of 2076 4772 Jfdida32.exe 88 PID 4772 wrote to memory of 2076 4772 Jfdida32.exe 88 PID 4772 wrote to memory of 2076 4772 Jfdida32.exe 88 PID 2076 wrote to memory of 4404 2076 Jmnaakne.exe 196 PID 2076 wrote to memory of 4404 2076 Jmnaakne.exe 196 PID 2076 wrote to memory of 4404 2076 Jmnaakne.exe 196 PID 4404 wrote to memory of 2980 4404 Jplmmfmi.exe 90 PID 4404 wrote to memory of 2980 4404 Jplmmfmi.exe 90 PID 4404 wrote to memory of 2980 4404 Jplmmfmi.exe 90 PID 2980 wrote to memory of 548 2980 Jbkjjblm.exe 195 PID 2980 wrote to memory of 548 2980 Jbkjjblm.exe 195 PID 2980 wrote to memory of 548 2980 Jbkjjblm.exe 195 PID 548 wrote to memory of 1996 548 Jjbako32.exe 194 PID 548 wrote to memory of 1996 548 Jjbako32.exe 194 PID 548 wrote to memory of 1996 548 Jjbako32.exe 194 PID 1996 wrote to memory of 2784 1996 Jmpngk32.exe 193 PID 1996 wrote to memory of 2784 1996 Jmpngk32.exe 193 PID 1996 wrote to memory of 2784 1996 Jmpngk32.exe 193 PID 2784 wrote to memory of 4092 2784 Jaljgidl.exe 91 PID 2784 wrote to memory of 4092 2784 Jaljgidl.exe 91 PID 2784 wrote to memory of 4092 2784 Jaljgidl.exe 91 PID 4092 wrote to memory of 1908 4092 Jdjfcecp.exe 92 PID 4092 wrote to memory of 1908 4092 Jdjfcecp.exe 92 PID 4092 wrote to memory of 1908 4092 Jdjfcecp.exe 92 PID 1908 wrote to memory of 3204 1908 Jbmfoa32.exe 192 PID 1908 wrote to memory of 3204 1908 Jbmfoa32.exe 192 PID 1908 wrote to memory of 3204 1908 Jbmfoa32.exe 192 PID 3204 wrote to memory of 1684 3204 Jkdnpo32.exe 191 PID 3204 wrote to memory of 1684 3204 Jkdnpo32.exe 191 PID 3204 wrote to memory of 1684 3204 Jkdnpo32.exe 191 PID 1684 wrote to memory of 644 1684 Jmbklj32.exe 93 PID 1684 wrote to memory of 644 1684 Jmbklj32.exe 93 PID 1684 wrote to memory of 644 1684 Jmbklj32.exe 93 PID 644 wrote to memory of 2024 644 Jangmibi.exe 94 PID 644 wrote to memory of 2024 644 Jangmibi.exe 94 PID 644 wrote to memory of 2024 644 Jangmibi.exe 94 PID 2024 wrote to memory of 1576 2024 Jbocea32.exe 190 PID 2024 wrote to memory of 1576 2024 Jbocea32.exe 190 PID 2024 wrote to memory of 1576 2024 Jbocea32.exe 190 PID 1576 wrote to memory of 1520 1576 Jiikak32.exe 95 PID 1576 wrote to memory of 1520 1576 Jiikak32.exe 95 PID 1576 wrote to memory of 1520 1576 Jiikak32.exe 95 PID 1520 wrote to memory of 2020 1520 Kaqcbi32.exe 189 PID 1520 wrote to memory of 2020 1520 Kaqcbi32.exe 189 PID 1520 wrote to memory of 2020 1520 Kaqcbi32.exe 189 PID 2020 wrote to memory of 3996 2020 Kbapjafe.exe 188
Processes
-
C:\Users\Admin\AppData\Local\Temp\73c2a8838d9f4a62fad6ca8d3d32c836.exe"C:\Users\Admin\AppData\Local\Temp\73c2a8838d9f4a62fad6ca8d3d32c836.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\Jdcpcf32.exeC:\Windows\system32\Jdcpcf32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Jfaloa32.exeC:\Windows\system32\Jfaloa32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348
-
-
-
C:\Windows\SysWOW64\Jmkdlkph.exeC:\Windows\system32\Jmkdlkph.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\Jpjqhgol.exeC:\Windows\system32\Jpjqhgol.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\Jbhmdbnp.exeC:\Windows\system32\Jbhmdbnp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628
-
-
-
C:\Windows\SysWOW64\Jmnaakne.exeC:\Windows\system32\Jmnaakne.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4404
-
-
C:\Windows\SysWOW64\Jbkjjblm.exeC:\Windows\system32\Jbkjjblm.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Jjbako32.exeC:\Windows\system32\Jjbako32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:548
-
-
C:\Windows\SysWOW64\Jdjfcecp.exeC:\Windows\system32\Jdjfcecp.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Jkdnpo32.exeC:\Windows\system32\Jkdnpo32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3204
-
-
-
C:\Windows\SysWOW64\Jangmibi.exeC:\Windows\system32\Jangmibi.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\Jbocea32.exeC:\Windows\system32\Jbocea32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\Jiikak32.exeC:\Windows\system32\Jiikak32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576
-
-
-
C:\Windows\SysWOW64\Kaqcbi32.exeC:\Windows\system32\Kaqcbi32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2020
-
-
C:\Windows\SysWOW64\Kibnhjgj.exeC:\Windows\system32\Kibnhjgj.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2376 -
C:\Windows\SysWOW64\Kpmfddnf.exeC:\Windows\system32\Kpmfddnf.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:456
-
-
C:\Windows\SysWOW64\Kdhbec32.exeC:\Windows\system32\Kdhbec32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\Kkbkamnl.exeC:\Windows\system32\Kkbkamnl.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\Lcmofolg.exeC:\Windows\system32\Lcmofolg.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1396
-
-
-
-
C:\Windows\SysWOW64\Laopdgcg.exeC:\Windows\system32\Laopdgcg.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4364 -
C:\Windows\SysWOW64\Lpappc32.exeC:\Windows\system32\Lpappc32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2696
-
-
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1196 -
C:\Windows\SysWOW64\Lkgdml32.exeC:\Windows\system32\Lkgdml32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1928
-
-
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Laciofpa.exeC:\Windows\system32\Laciofpa.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4864
-
-
C:\Windows\SysWOW64\Ldaeka32.exeC:\Windows\system32\Ldaeka32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:748
-
-
C:\Windows\SysWOW64\Lklnhlfb.exeC:\Windows\system32\Lklnhlfb.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4412 -
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4668
-
-
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe1⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\Lddbqa32.exeC:\Windows\system32\Lddbqa32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4016
-
-
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4260 -
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:808
-
-
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1968 -
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3592
-
-
C:\Windows\SysWOW64\Mkpgck32.exeC:\Windows\system32\Mkpgck32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4488 -
C:\Windows\SysWOW64\Mnocof32.exeC:\Windows\system32\Mnocof32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2724
-
-
C:\Windows\SysWOW64\Majopeii.exeC:\Windows\system32\Majopeii.exe1⤵
- Drops file in System32 directory
PID:4596 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2144
-
-
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1228 -
C:\Windows\SysWOW64\Mkbchk32.exeC:\Windows\system32\Mkbchk32.exe2⤵PID:2100
-
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe3⤵
- Drops file in System32 directory
PID:1644
-
-
-
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe1⤵
- Modifies registry class
PID:3644 -
C:\Windows\SysWOW64\Mcnhmm32.exeC:\Windows\system32\Mcnhmm32.exe2⤵
- Drops file in System32 directory
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe3⤵
- Drops file in System32 directory
- Modifies registry class
PID:3400
-
-
-
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe1⤵
- Drops file in System32 directory
- Modifies registry class
PID:3268
-
C:\Windows\SysWOW64\Maohkd32.exeC:\Windows\system32\Maohkd32.exe1⤵
- Modifies registry class
PID:3560 -
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2932
-
-
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe1⤵
- Drops file in System32 directory
- Modifies registry class
PID:592 -
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe2⤵PID:4868
-
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:400
-
-
-
-
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe1⤵
- Drops file in System32 directory
PID:3472 -
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe2⤵
- Modifies registry class
PID:1964
-
-
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:64 -
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4140 -
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe3⤵
- Drops file in System32 directory
- Modifies registry class
PID:4836
-
-
-
C:\Windows\SysWOW64\Ndbnboqb.exeC:\Windows\system32\Ndbnboqb.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5140 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe2⤵PID:5184
-
-
C:\Windows\SysWOW64\Nklfoi32.exeC:\Windows\system32\Nklfoi32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5224 -
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe2⤵
- Modifies registry class
PID:5272 -
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe3⤵
- Drops file in System32 directory
PID:5316 -
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5360
-
-
-
-
C:\Windows\SysWOW64\Ngcgcjnc.exeC:\Windows\system32\Ngcgcjnc.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5400 -
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe2⤵
- Drops file in System32 directory
PID:5444 -
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5484
-
-
-
C:\Windows\SysWOW64\Nqklmpdd.exeC:\Windows\system32\Nqklmpdd.exe1⤵
- Modifies registry class
PID:5520 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5564
-
-
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe1⤵
- Drops file in System32 directory
PID:5608 -
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5648 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe3⤵
- Drops file in System32 directory
PID:5696
-
-
-
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe1⤵
- Drops file in System32 directory
- Modifies registry class
PID:5732 -
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe2⤵
- Drops file in System32 directory
PID:5788 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe3⤵PID:5832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5832 -s 4004⤵
- Program crash
PID:5920
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5832 -ip 58321⤵PID:5892
-
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2192
-
C:\Windows\SysWOW64\Mjqjih32.exeC:\Windows\system32\Mjqjih32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1712
-
C:\Windows\SysWOW64\Lgbnmm32.exeC:\Windows\system32\Lgbnmm32.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:5028
-
C:\Windows\SysWOW64\Lkiqbl32.exeC:\Windows\system32\Lkiqbl32.exe1⤵
- Executes dropped EXE
PID:1004
-
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2484
-
C:\Windows\SysWOW64\Lcbiao32.exeC:\Windows\system32\Lcbiao32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4452
-
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1676
-
C:\Windows\SysWOW64\Laalifad.exeC:\Windows\system32\Laalifad.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5000
-
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4832
-
C:\Windows\SysWOW64\Ldmlpbbj.exeC:\Windows\system32\Ldmlpbbj.exe1⤵
- Executes dropped EXE
PID:3396
-
C:\Windows\SysWOW64\Liggbi32.exeC:\Windows\system32\Liggbi32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5012
-
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:756
-
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe1⤵
- Executes dropped EXE
PID:4272
-
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe1⤵
- Executes dropped EXE
PID:2296
-
C:\Windows\SysWOW64\Kagichjo.exeC:\Windows\system32\Kagichjo.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4336
-
C:\Windows\SysWOW64\Kknafn32.exeC:\Windows\system32\Kknafn32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2304
-
C:\Windows\SysWOW64\Kgbefoji.exeC:\Windows\system32\Kgbefoji.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4992
-
C:\Windows\SysWOW64\Kdcijcke.exeC:\Windows\system32\Kdcijcke.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2920
-
C:\Windows\SysWOW64\Kphmie32.exeC:\Windows\system32\Kphmie32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2320
-
C:\Windows\SysWOW64\Kkkdan32.exeC:\Windows\system32\Kkkdan32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:656
-
C:\Windows\SysWOW64\Kbdmpqcb.exeC:\Windows\system32\Kbdmpqcb.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3616
-
C:\Windows\SysWOW64\Kpepcedo.exeC:\Windows\system32\Kpepcedo.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2992
-
C:\Windows\SysWOW64\Kmgdgjek.exeC:\Windows\system32\Kmgdgjek.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:740
-
C:\Windows\SysWOW64\Kkihknfg.exeC:\Windows\system32\Kkihknfg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3996
-
C:\Windows\SysWOW64\Jmbklj32.exeC:\Windows\system32\Jmbklj32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684
-
C:\Windows\SysWOW64\Jaljgidl.exeC:\Windows\system32\Jaljgidl.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784
-
C:\Windows\SysWOW64\Jmpngk32.exeC:\Windows\system32\Jmpngk32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1996
-
C:\Windows\SysWOW64\Jfdida32.exeC:\Windows\system32\Jfdida32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD5346b3afe135a2dfad5d1a67718341398
SHA1ca61ec735c113d9547153f2c38d7560ac97a1d5d
SHA2562ab3b7662b30ebe68b088a34ee82d1fa881cc580ee619c0a2ee54a1f273993f4
SHA5129606a9f743fa649c5ff790246466fcadd4a53900625e64e6421f9077f2fed4b242333ba877e6410c20c0ebc4a8f6fc2e2b362426a63e24bb19854a878e301afc
-
Filesize
333KB
MD54e0730c859f7aa419075de4e4f4c8e78
SHA11ab6b07051b74c6702ed1da0ca1833fa5600dd9e
SHA256110c5e4f8edcd7c91f8c94aba9f99eeca525077f93de3dcb875697d16ac9b2ef
SHA512515ef8ea67bd97e164158a8e975a6e19dcb31e2cd89625ec185e485a4c768e2cbc34630a1a5df0fe3154575847f98df94286b04e0bcfacea7d3bb3bd71025e33
-
Filesize
118KB
MD59eb357d2b450b8e1937afdd4213e7618
SHA15f75befe0cf18eae1f332fa56d933122a4028c62
SHA256cad16a3dfb5b4456fccc6052618abb5460e60e8c468c4768309b04d34718d768
SHA512b155835bd1379ae8568038174cb0c22225f9168698b024116bafb2ccd5fdf79b66d1f1c80f0d672c508097c3ddb68b4f67cad8bf35250be8cbab7661244598fb
-
Filesize
333KB
MD55837200d1aaf6759210024c3ec0674e5
SHA1846ff3c06f9833c17acdc19919d4ab9764b4e69b
SHA256b51dfc378eb3a4af2a2de1687b0d93d968a0aca55f6af4b29cc5fa9ab4d69131
SHA512d278635f5bdf9c52022ad6a8c94263c370893d8f87cfae5a09de9a39d9a3aa9fa21f8180804299755e55def58f7e396653d41d129235067401d7b13449af58f8
-
Filesize
141KB
MD56352169643e8c66f1f198f0de3643715
SHA1f08a6c6084f858137043fce81e5049f6fd9d4911
SHA2561166240f07d17be653256cb3566f34002682533820b90e602cdce14fdddaea1e
SHA512c2259eec0b4fb369b9d0e3209738167bc397ae05cb66672ff9734441d9f15dbb7855acee7dffe34dbaedbc173a3998848538c6e3633fdadb880e5511c8d1fd3d
-
Filesize
333KB
MD5fa8aa6592e9b9ee4cde37e4ef4b42e7e
SHA1b31a2621a542e6210b8026c850031e2a58c4c9dc
SHA256eb25f2bafa6c8730d80040a28148c2d43cc6546d48c6e1d4b15a725ace54354d
SHA5123aa1777c4105ce10d29c4cd1161df2a9504af085df94c6b44f5f8450d7e8aff6bf070ae0dbe3880837495b1e634339984bbbc4e62e8b097ccb3bd05461eeb242
-
Filesize
116KB
MD55d9e373c12d20108d0085bf6ffc8a8f6
SHA1ce340e59b66c04bdf72571637edc41d379c011c2
SHA256595059158be4595336358f458033565772cf62667c2939c8dfcd9b665935d2cf
SHA5121a1072121f55463583dca39d4e633c15c0e92407802fad3b33b5391f1adc5b33957cd6e5c826954034abce90fe870f6a21d44ef73b1224fe9115ce33f1813631
-
Filesize
333KB
MD5049c067a90d5861c0db881899c45fa0a
SHA1039eb983510581fe01159fc7bad59eb94fcc5697
SHA2569d3f250e057a57ca71179ec5e7876cc33576d597ec0fd17a078c8caec3c6572d
SHA512cc5166e219b386e99c43cda8560302c4afcc371095aba9303ad40f8695b6100a66da23ec7cf58db47994e8ad161433f3b27a9f1747feb8ef2193cbd0a5afb29b
-
Filesize
333KB
MD52374340faff0a386f2a9539cf14ddfdc
SHA13d7914f40ccdbff8a96c56fd278a2f1fb9916720
SHA2560a8a0648f9a03f6c9cc6fe90bd9d48a592836dbf9bd626600aa3dd5213beb34b
SHA51218131f0b651721d8df134c07b3fec80fa1dfdb0ca718e8c33c08fa6de06fe5b93695df92e6f01309b7198bfa27604427580ad9bd6bc556e5b426c5061daf2f21
-
Filesize
333KB
MD5c8666ca65e3aca17eff7114a785895ce
SHA101ba55393c410d3a8f80bd802398525d35a9bf6e
SHA2568a91f88739dcde716c2b22b681c21ac4074306ae44b319b36a71dc46aa2af12b
SHA512a8eb0b9facae745a2c0bb56484ae8e33754b5106704bca128a6857997520661f4d8b689c1f951719e82cb5f0c3ca1d26db2dbd47da8bc7967853aa5791e526a2
-
Filesize
265KB
MD58bf86f5d1091a51ed5f103a7bfc1d929
SHA1080c8877b001a1c5f539258c1c7fe73897111aca
SHA256fc06f8908af7ba3477c9c6beb7e7f5fd8ec1c3e8f9bed32694fe59455e46fae5
SHA51251c37a29e006b4a344d685805a91b4a3c5aed6a1677c82df2e8de75f78c2d199db4cdd28fe85e43b2381217ffc17a9e5f5d874643dc963d40e13d70539eb6701
-
Filesize
333KB
MD5b1247bfec40c8cdae8b05eb72bafbc44
SHA11ea0d1247704fe8dced426dbe3dc721723532261
SHA256995312a17f17d2af2191ef1e190ffb09b25a10610abcba0d65b6418f87bb74a4
SHA5126daea5147f7b6091f3a5fdda1a4e3963fe4aba5ca0b531c90ca3b1fffcdad916ebdf74f65eee0e4c24aa58088947c7b2580ad7d66718343724535b96e76179be
-
Filesize
250KB
MD54a5398696b7cfdcebd144006ceed1f86
SHA15b7cac76127d0baa2502bd404d62f90437849dbe
SHA2560b6788720b9698d250809c803d239f7fdd75fab91c89bbe65b009d01568aeef8
SHA512c81499e33d5b885fb44180e6c924bbafe537f844b1177791a5b4f9d7bc5da30d02de5d85abfd27d4f8a69b52f29ab5379fe3478863725b65349f1ec9990f7acd
-
Filesize
333KB
MD5198d7274fcb11313e201f7ae44435735
SHA160036b6e67b1a1e237d1816a7b90e4c1ba9b3bd6
SHA25664e3e9652f92a68d77da30edb9e2bdc0f3b22cc37e267935061c8799eb099405
SHA51270118b424eb51b170e064d47a87af10c4c817390666234a4d24f875dcaf85465f9e6b6310bfb267ba2010bbe7a40114aa797903dc8ab05901b94001d48ca62bb
-
Filesize
333KB
MD561d619bbd34c11fc68eb891f00bb2e7f
SHA1d1f0b0de9e7c27d6e065befd669dde60847cc305
SHA256ccdca4a47230599e71b61c457bd923e825931a066f951b020bbff282ae479808
SHA5120e22e649e5d408d0f80153acd864dafc5c71e31e0939ba477c33a2ed07efd2a4e25b35c7e74d769a8acbf9c1feb55aa5b3bad7263b340b8021cac7aadc0c9dc1
-
Filesize
149KB
MD55a95c95161dc8993817a6f00e9018dd8
SHA1af32b56fc7468282d5c2b1c1a3da87308e061eea
SHA2565395e4f1454625ce9224d866a9213ba2ff4d9b332ad6c95146aedca149decd4e
SHA51213d9c8d4cb1a3a04c2af803458769bb6e7c874e7261a0f45fc311b0c5eb1dc05e6142f599e64e7e03b5b7f7175bc5de37ce06ab4d5d27c2e9b48db36c56fa762
-
Filesize
28KB
MD5cdbdb67d0ae30feeae6e8400f443c469
SHA11269f253218e2d2b9604f9a4e8d179e530094589
SHA256be02b66127911f4d85a12e0e39c777b9062dbcd4f973ee2071496861c8052176
SHA51222dfbd3b1da72d2c03d1ad4333c4a4bff172609d215564156566fa8fe0787c8cbd389bcf86b6af9d5de43a75561c6094e159d6f2e71bc5fbd41e666cf2c53845
-
Filesize
333KB
MD5516c295b89a95478852343f7ec672185
SHA19b6eac7f31d447226fd69a1fa8177efd1fcd994a
SHA2564a682dbb8bb3d77dabcc7c81b73f07dcf482f71ef3aadd88752a2a0b262f3b5f
SHA51279bd4836f0b42fc173db9d7d2b6b4b3334c2909453013720fdd7262824e7271e62fbda3d98319e954c4609b572617147d34fc786655360d707cced7a1bda1cd9
-
Filesize
333KB
MD5de6e314306c6c99500049aeb818e2a15
SHA170e4429bf8495676db0715cadb070067a451d933
SHA2569d26ba2f23ca49b6d568177d0130bbc1ff25bba23496cc0d518b6383f4540923
SHA512ec841d98e5071957e1f147ec47297832fbd19f2a53b11b85006b4cb3f9a986e75538f70414fc4bb54d4eeceb0bce136b153dd709ba60211fe42a41cdb9b5494f
-
Filesize
333KB
MD57291d175501369618e07abd68019b041
SHA1253be4326e5a4f31cbd6456eb43671dfe377745c
SHA25692c49563ba73aa7a0b19ac67d37b3b4eae065bf6c6412da9e030e15ef340eff4
SHA512ff1d436311485ce50f9765238e66d86b2764f5f8da3399259c2ce9835b768ffee63913f93e6e330ebd736eb3ceec1ddfae682c116ea246ae41e293e6cd61c328
-
Filesize
101KB
MD5956dffb1c798a1a2adb65aeb79f2dfb7
SHA17b9f36da9cc7dc277efbc6d0fe5c1015f413c7df
SHA256b6751f0a87b3da23823ffc604f5d0a7a3cb79299a0189b693a26545ce55b601c
SHA512081ac434f3ebf636f53e6f7148ce8ec6ffc7ebcb9163b2bce4ef6537013f78fb42da4cfb47367a276d5cda0eb432b615370f9006822aab818dbe11e75bbab294
-
Filesize
333KB
MD501c0064583dbdcf9c7d3de4773fa7fdf
SHA1e4be7cc5ea4b2ea3ca66cd3a4035e69fb7b6defe
SHA256cb8d656657ad97baf6043474210a4ec36b56f66f5560689931d111d57bdee207
SHA512e294084af01b183de3d3452e968ea1f0633711e01ba64942aa293bb61a69317de033edab6be246c1c8a686176a67953f1dcfe39d02e88e308f7a6bd668081391
-
Filesize
303KB
MD53452c7fd95691e17964983d48315e3a0
SHA19b63bc785c43567b9af8fbe5bee544a461ba33fd
SHA2563e52d19d2d133758c9f593d111d093fb5464c30622d51b7e9086b526ba39f882
SHA51243cce79d6a82093931c4a44d2a7ca322c939285feca265c1e09b2974386aaedc7f75a39c90e086b8465d695f2e843f8d6953d143227c110ae9ba71503fffc5c5
-
Filesize
221KB
MD52bd1d56c7b69c9afbab194d2c839d49f
SHA11e5a4a305441ba33e79a9740204a169ecd02f1a7
SHA2561fc9612d111b62562fb57f38967c9864293dfafc9c3166f02ed129c9e4e21828
SHA512c123d9cb34a54b0c1aceb6d2d5aa4b02bf2e7f97b10d8b1c6ef603f375f75e4cac015826a520139886244fba2dad58b1327bb3d1a6a345dbb5f316d408e5353d
-
Filesize
333KB
MD519ee1c38d354072efa6d47ac2eb5f862
SHA175b196837a0091a247a9963834ac4da1dc742a7b
SHA256b989fba55cf1aa7380a3e5b27d030e6e8539f780ef2ed7e5244994d6756ad4a3
SHA5128ee0c0d5b808cd108bc1ec4be3e1c11bf6faa7523a2d0dd0cbcc8c6ef7d2a3217f554b52bbc678717500a54a64e2aae902fa615fcc1b3bce2c5ad7e5a735b181
-
Filesize
333KB
MD5cec033d89bf64f5b75c76d1d448e4177
SHA1313da429f4729b174ae51968feb8f583b678ba89
SHA2565d7c37222692dd07c03a4dcfd56cf0553cf530b01eeaf2aef0ed33e6408afaf0
SHA51204cec442eefcdb102ec566817cf30f9aa754d5584e9dead9fc531d3e3cab4fc260bc5894498e084c39211db8b083621ab5b47822e4111e8e06fa2f2f8462e5d3
-
Filesize
132KB
MD54c6a509d08899b1a5fb3008fb191a5d3
SHA1e8f47c952b8aafd0f670205379f2e8c7478ed897
SHA2568144b8207e04697a71e051e59dd0c8f2ff21e647e9b355a62eafe6b84b4c137d
SHA5124e0c3308f5a5fd253cee7af4654f80e4b88af99373250f353394f3bf347cefd5ce2055966e92d96c1db299bd6c2e555448a06b3c5d9cb1c189ec7ab314975476
-
Filesize
224KB
MD5ca3f6d246fe960439146d211e2f823b6
SHA1ae3c8899fdebcd074f5df9dad01f2ed799742081
SHA256e7226d17c85c2cb08b07585b269f9954de77b628f9a06384425ae3a84e94b84b
SHA5124e83e956bf4800a964175611316a0fa0a597e6587b17e7c8f1ac503b75f009bd1c1cf43ff058c4fa88ab5587055c12f19e1e986a70541af162ef44155f26bf8a
-
Filesize
333KB
MD531e39fbe5f51b6d9e3b670253271a8b8
SHA1b25080750aff89d3c9b0515712eca64bac11c024
SHA2561b06af16df3968bff6b4ee9daa7cedee5a69ec3ad0b2d5bbdfd316ee938a81a4
SHA51277a739527b73c7f044b2411027e316b322c07237786b82b90da7c738cf392b19612f36594885b735820a75051d1d185ebc1f8b3936acd787dac9ff8d2c1cdcf4
-
Filesize
333KB
MD5c7e4eb79b1e74aacf627994f57eaf4bf
SHA1ffbb5b99a9c8b8d64fbe8daeb9736a2f637a8710
SHA256e262b08a831cb0cae7462f31f35ba2f20546cd0c5468b61ed42907a306f6706f
SHA51279ac9706e76af86a048fd3254cb2c8b50fa10388e837b8e55bc0b758685d4774f24ec2a23d22be4a9eba1614d5ae39d8bc8ba81ecaa53acf77e9c8eafe83a89f
-
Filesize
245KB
MD5b994b7d7aac810283c5ad6fcba547a97
SHA168cb17ede2c3e16fe4987ec43dd3a57b8b04695d
SHA2564826631573b84e44840f5e6e2c30d074df47430424407096ab90c597e7c6de57
SHA51260bab1f9cf342ef195a7daac3bac84cb2ccf201b91754dc9ff530b9a2e68e6e2e2ac2d8a31a6b5e888af003edc8e0a59a28b9087c2c9821632ead31420e902d9
-
Filesize
16KB
MD581dd65f08dc554604ac76385facb7835
SHA12791e9af68077f1abaad3cd407652c825a8011ab
SHA25606eae3a685be3ab10af50776919691507631dd97f1b025522394be7f7e5f6a0d
SHA512a9514332a9c71ac2af67aea80892e12e9a74023bbf0829c297ff3184dcdecc59980ff9914fb155d12b3e0e1ea2a5e07ba4efe06640c35689f5dd29a8088612c7
-
Filesize
333KB
MD51ebac28abf42ee75078ff368e47a325a
SHA1ce3d14c41a2a3c30f3cab965a78adc32089594ad
SHA2568c2e24c6cfbf9a58993d79a15270c188ae2b7f10088ea217d6c61e09ee95edcc
SHA512b3bf3f35a30f31eaa73024561931c77c227d74962ff0b78d3a1a9c55ba15b85e7a315f61b04da279f6ec31a138068cf92ea44a2f01326c29cc46d3fa72339423
-
Filesize
333KB
MD5510149a6848029be458e67805d7d7f1b
SHA13358c144b27a67ae4891148c8a23489aa3fb998b
SHA25605879e0dbb1e0a43dc0e08062cb81c20ee17aa2bf3e253e0eda6731502a80cf1
SHA512b9cee22f35fe1225910b7a641f1be29cfc7f1cd81c7bdb98688912b2c302e47bf3f1d91dc323f41a28fc72acbd20456730ea54aba626cbbce152b4f253a7e151
-
Filesize
333KB
MD59647c7236db554edaa5146ae4dfd11a9
SHA17e20b5d6d6d73363c83530fcc2679cb39d4c0eab
SHA256f19ca379ae0aecde3c5ed7524ced8543f6125bf08b88a7ffa670ee8488a36b98
SHA512eaf28fbc0c624edf637f0970e20957df150f2592ffc469a14969563adab14327c107c141a7509a2bd26e35e9456b09fe44f3c6ce89b84dc191e5e8ff9b3f4a3b
-
Filesize
333KB
MD5d4806707e66d2322fcd4e76c3b271f8d
SHA132eb70007f726162f08260a22fc49d433ee03a19
SHA2562f4efcb8c0082575cac888638cce267d2fcc3a08a8cc03b4d261d17d19199014
SHA5128f9695bf5dc9ef3947668ccbb6edb157c534a0a2f2493c84c4366911a08af92f3a39f046365d725ceeb37cb9d08fc1a9af5bb1bda39cd87bef0445856b583171
-
Filesize
11KB
MD554c3044bdbbabbe5070d01dead8ed409
SHA14ca2e95a6bf12ae941f93c0649d36594c5ddc87d
SHA256277158643ad6af0bef8be9de075f298917bd5f5a56691bcf0e629d9a2de2d5d0
SHA51242ba09e6f72fbb5981ca0a54c17841098e3745f6e43bfadda1d51ae5a69cacb97ea0560c98033b5a90f500e00c5c808174c6e59d54a72e71b006c71d0f526dce
-
Filesize
333KB
MD550eed8afb390fcecd6abf0a730854a3e
SHA1be629ce61bd7e143b8b5e4764ff33323ed202d98
SHA256dfc04a58d8f86e13d86919b2155094b1e58f41e4abd1dd3d75027696605d71d7
SHA5123255b9795c1924f9864be7df781245407831b8403c0c9f416b3fa0f833b6e171db3a07ca5c7046224c257d1884901d8b591fdc9124f4ac1549ed1958c8f18d5d
-
Filesize
54KB
MD50d8ad1b88f8831a5f47969ddb45052dd
SHA1cc09a77622172f223e38f4d9b7cbbbec447d3cca
SHA256c2d4e0776d8d78d7cf03e5e61a63cc3ba7a2ab0a9af6f8b910a2b5e7e629d126
SHA51210e8e832199e9e2273b43f928f307dfe09cfad963df77e0d1919b9ff1c3b7e99f69f70b96e5f5364dc7acb6ed70891b3c7a86a4662a1b1a6ade0ff9994de201a
-
Filesize
333KB
MD52d929aa9e7ac98c4901f3fa131240324
SHA1f308ff1f051f57be122a1e9e522bf96646c53e29
SHA2561c59f69d7554882e38d20e63f23eb88b25ceb91e78ee492a384187e8d9ffcfcd
SHA512e06be59897083ae69ab1b4d65354ea5f9f8205d0dc2215bc5e8c2aed9546659511f571be00b9d9376bdbe4c9d02d28836d4cbbab4bb14daf4e9e3a65b57ac35b
-
Filesize
57KB
MD5ed1fbc00fc3aefba3a0f7b0cea257caa
SHA1b56df2ff337746cec64bc3036c881b246e18c3ba
SHA256f2cb0157513b9f0bfbda56932fc26f543d9fbea8b59c31aaa5c57cb1aa5a0a37
SHA51294c18d4b46f0fcb7758a73bfc32d9fe0f21d6aab7fe9651543c7374f31031d29c25a0d0a8446c8268c56a2e69cc90dc56f0c916860c048068d253f5eb521796f
-
Filesize
333KB
MD56ef0f2160829d816804f82e052020223
SHA1eeb93a8e7dc6dc8d05fc85960a41abaa448e8ce1
SHA2567f61fd00ba16f577b1bc3736cd5bc2daf826c6d283ab6e7382b83594a34465d6
SHA512b4b68b607466508e66d1dd012a1eb2ddc17271609cd5c3d4182d040056a7bc54d127de3c3e4edda9f80ff49b081e144299e5cb9a10de27ce2b39778d5ce85977
-
Filesize
333KB
MD566ace8b532d7498f711b7076617e78bb
SHA1ec7bd76b8ba527e302b67b58f203e05feffb42f1
SHA256c8a11a271316ed5948914c5e8517a87dabdd7f035c9a766b9c659d08ed7f9a82
SHA51267a4339fcfdff2cabfc81011764bdb6142d154c86730350ae7c86290559b9b7ba0c3dc820115c3eaed862be26c07cdf662d8a54609df2b302ab630662db538e3
-
Filesize
333KB
MD583f89408ed4b3d2e0306cb33171c8767
SHA179a79da17ab1df33a701049e136fcae39505cc4b
SHA256382f02006071ab13bfdf2f31d6a62f6a0af168a1a1ef8ee428ecd2547596c475
SHA512cbdff4bb30313c48f809b41db984c9ea1099b15431b9cffbfea29ac9b95eb3509c588f8fae04775445e60ba3fd6a63477bb516ab484b98ab718560acf1aa08c5
-
Filesize
17KB
MD5ef35ddb65291505db98cf65dd1bcf8b4
SHA10161498f9364c6741e3b6aa38bd377f2c820167e
SHA2569c5d13d54fb5f82bae6c1422de7e802986a8ed653f4cfcbf0bf34e9487cfce8d
SHA512aa06e72b8a1a4fb4f1bd8c7e1079840ca33569154f2122b0466a783684deed156b1fae8b543174770e5a6abac1b0521a87c9c5d2c99ea3bdd5d76e7869716a5c
-
Filesize
333KB
MD5453c604a0e80014b9b5c96c095e80e3b
SHA1507616e65b4503e32ea4548e51e263a42f01d928
SHA256918cfdf50445c747da57f53affbcbfb851605ec20ecf302833f0edba5241950d
SHA512a779c2e833f885237dde480794c2f41de2579c3b3c2bbe51138c42c879ac25c3ac9bf617acfac373e3752f878d98fc25918d5f41de970bd012bb61b20d1f3623
-
Filesize
333KB
MD5c7776fb16ae66b4c3cfc9d461127449c
SHA117ff0f6fa35f537dba5ed8f81e94effb78ac3e76
SHA256d5cb4c921e4a657d906caa01b2a12c0c0a3b6364295cf311b9ef0989d5f07256
SHA512dd276051cdb9f2ff3cb19d529456f74668f4e7d837fb12043773e58abc1ea21171fcfe29af57b52acf3ec592713f719e2f996cf604079c5a0f4d044408276220
-
Filesize
333KB
MD5918edb6af1fc490cf003a17264874b6b
SHA1dae8e0d78685bd9c453541ce8cb45c20b5057800
SHA2562975cc12b24355ed478320099f6e6609f59da892c3aea46ab7022079be7e7078
SHA51274640860473a1bf2f1c0e76dc5ace01c28bf6ea13ef437765b89d021be23a1055dcf6b8a0eecdb9b82f4f663b17ce52114c2a23173fd6f7e2baea2649b1e6285
-
Filesize
333KB
MD51f2726a1ed1121ca39253a1b9395655b
SHA17526479bd9ca780a878d5bc82f213dbe1bf0c9bd
SHA256a0cc5b3d85243da534e442d220cf9d83782825d9e0a289f387e85f8bf3935671
SHA51202a1695925686f212aefbfc06091e9e5917f8de7602d15df373d3a207c4d2527a9e8eb8e79713d283a4796ae10245a89c24e53eb8fb8f8efc5d37ea79c836bfd
-
Filesize
333KB
MD5eb08b3078f029e6affd05ab297669a95
SHA16e9895daaa9b2dbc1d4aa8b04ded71dd52821014
SHA256dfffa123c276a7bbcb49dac398296da73fba6a28314b69984eb3bc700dd9e60f
SHA51292d05a17ffd1c19d7001d1cbd80249cf9bf32a081487285aaedae4d692282397538e43ed4caccd9d1b2627e5a32af9de6d0e87d903c71711311e53ec094712d3
-
Filesize
333KB
MD5b2d390073fe435ec4b7756f5bdbabe27
SHA1676d053c580c0ec03d20202dfdd5885dd81aeef7
SHA256f8630e95b3100971f254e0b3f98a3d907e0309895c94c5f5b41568ea55720e7c
SHA512ce27c65ff4565a329e5c411aab06e8f247eb14012bb749da8cb18fe791ae2f0a557cedd7f20eaaa8473c5376dbb218a4be3ea875f15b0b0df32858c424a032ec
-
Filesize
10KB
MD5752c2a2f2e10ebdd04ccfc05d54c1cb7
SHA1ddee3ce03f0cea56822da1a562f3bd066f5543b2
SHA2561a0b64d0f063ad228891e101e51e7bf7966e0e6bdda8678ceb018aecd26cc80d
SHA512c42bf8112bf09ec76b1fcd7cc52c52edef888a1ed372a6222f4a11809cfe143cc2d3c35b77ac8eed8e454587fbcf90d0820ae8215067c3623f88656ffcee002f
-
Filesize
321KB
MD5382a30420c46bd15e964c084231c3695
SHA1113150190f361a3d3c8bf56c3a13fde429e4fb93
SHA2568cc9085b632d609f5944ca3037e573c0f7be9ecf06f1de2b16c4d8afd30ccd87
SHA512338cf9b2c863262b8a37f3a3df0074198156c120a57f3600c4dee639187f5c21f8e1cf814da407d5acb57c67b2357cc4c11c559f8ef7597dbee155aaf7576e46
-
Filesize
64KB
MD59168fbf7777ac9679da4e6343d8231a1
SHA1143800813f47c9ce67424984e1c8ffbec31799a8
SHA2562b70c4139fa6cd646e2b4faeeabd520007fd9ffe8d2c5ddcafde8315d0872f07
SHA5126593acba103419c19f0e6f79db6b74448077fa8e6f5c97b0adb4d5a57a0aa49ce6df7e1fb829fcebb6e46ac53cf02976dae25517e9092b9f235c71232cee31c1
-
Filesize
72KB
MD55418f350df4b2568876bc3337f240fea
SHA1dc59e4cbab76cc0b15cff1488c4841690e83e3b3
SHA2569598d485859ef4b3328b5f11d07cdbd3247dfa4a298cae5102bb1538a2676837
SHA512dcd75194f4bfca127cff81fad0d447dee34e78f51d16bc03623de16dbd792ec96ab0b84ad6a6998f4f258ba12591abc72c570520533606c96a5155b6abaee8e9
-
Filesize
333KB
MD539357f8bf3157b2c0db91ec3631bd041
SHA11d6d5a906d57bf3017670138f791ba1ae76950f1
SHA2563f21547fe563bd07d1ced2d202419ae49e23b3455d47474320de93256da64134
SHA512228d171dc17c9bb852d782a9eef78324ffbb4add791d9010918368d8343f3c3e894d42acf2c2e0259fd4af9ef646baa8dcd1a72af490f8e0a4c18d639cc51513
-
Filesize
333KB
MD5392dddeb066e5d43ff81f7fb76d63e80
SHA1fde86791c4886423804a650f308cac5058300593
SHA25657a0b4bd4746239efa672b8c67aa18c3133198e4e5bcd193561c5533bf791cb0
SHA5127217a4ac2ec52334e5929dac787ee3669a4b6528dc9d4ca7481bac653a24cf69f79f516c15f8a94a70fc1718f977b8c03a5f6852390755a01dd77864c7e91b86
-
Filesize
333KB
MD5c7b2eed11a31c19288d795b0d0325cdd
SHA16c81a5148d8d080ca0c3f35fdf84c7dff5cd59c0
SHA25600490c90bd95489ac343e8695b39c8dc6885482ffd4dab49483147f931e09ca4
SHA512583116a5b06575dd3bbe4f546c33a99bfd08969681e28af7e1d767f935f2a8014f657cf133623306c1716eb5424f104521d658f53456dec6a303dee207ff39c4
-
Filesize
275KB
MD5cca769957cfb7ebff21edb2cccd12b72
SHA19c9074cf0fd3baac37b4794eb54c67e6eff4199e
SHA256a191a18d2ec3ecc77d50cc89424aa4e4bf6cc64438278d612e157397fb05a392
SHA51222a8dc8d25d4c8d14073c4743fcf04c54363f7638ad6e0982645ec1fb7c9a743c4dd131a5034a657255c2b95c87ca72d29d3c6b15f45d3cd58e1ab9e78277fda
-
Filesize
333KB
MD5cae703a1b42485d2e9fbd8820d5fb4b9
SHA1c6da403b1ed2d24c4c8b64cea9c3369ad293af27
SHA2565184bb0637900dee6268336971784a725862d8b64e835955489836ca050bc615
SHA512852809f1449b59b80d670e4893a5ad9df6071c4710bff240e40eca6abbc81ad9f813a03bb134367717b8bc6790597446abb9f0a8b5c42f7b3c7127b18fc46dec