Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
2a248341d4a7abc829dcb233449eeaf0
-
SHA1
fdabe76d5f766b9729db51fd375c7e2d494c14ec
-
SHA256
c83c31a5b1dddfe94e68257c0c51edf9352a4c47bb65e1c4c35aa750115acd80
-
SHA512
081c6647f1b45143825e7a6d1c3a9964cd8786537da299a020d9af94e7bf3a8669651f0f4028bf3ecc1490fbc3529e6cb0252ed473a53f34802ca7a2cd5fb6a2
-
SSDEEP
24576:jQsTeqq5hM5Dgq5h3q5hL6X1q5h3q5hPPh2kkkkK4kXkkkkkkkkhLX3a20R0v50Z:+0I6BbazR0vKLXZb
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pknqoc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aefjii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkceokii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koonge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjjfdfbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abfdpfaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmbgdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enopghee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emanjldl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moipoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibjqaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqbala32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ampaho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bllbaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlikkkhn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcapicdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncmhko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epffbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqkondfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqbeoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjjjgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omnjojpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kocgbend.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbbeml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmbegqjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppolhcnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pafkgphl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eafbmgad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgqgfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iiopca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcclncbh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmojd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbbeml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmpjoloh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amnlme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibjqaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlikkkhn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbdiknlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onapdl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqklkbbi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhffg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aplaoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgdemb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqkondfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihmfco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilkoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcapicdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpjjmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiopca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epffbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnfihkqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkphhgfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dndgfpbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmpjoloh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojcpdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abfdpfaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkcpql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcnlnaom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hnphoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lojmcdgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjaleemj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afhfaddk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emanjldl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihkjno32.exe -
Executes dropped EXE 64 IoCs
pid Process 1200 Pknqoc32.exe 4072 Qklmpalf.exe 2124 Aefjii32.exe 3464 Bnfihkqm.exe 4924 Bllbaa32.exe 4912 Ckhecmcf.exe 2572 Ckmonl32.exe 3968 Dkceokii.exe 1396 Emanjldl.exe 5052 Flkdfh32.exe 1404 Gimqajgh.exe 2036 Hemdlj32.exe 1560 Imkbnf32.exe 4984 Jcoaglhk.exe 4996 Jgmjmjnb.exe 2900 Jokkgl32.exe 212 Kncaec32.exe 2616 Lopmii32.exe 2456 Moipoh32.exe 4956 Omnjojpo.exe 3448 Onapdl32.exe 1268 Ppolhcnm.exe 4348 Amnlme32.exe 1568 Bkphhgfc.exe 4068 Dddllkbf.exe 3236 Dndgfpbo.exe 3572 Ehlhih32.exe 3160 Eqgmmk32.exe 1044 Egcaod32.exe 2528 Fndpmndl.exe 4644 Fqeioiam.exe 3232 Geoapenf.exe 3744 Hnphoj32.exe 3584 Ihkjno32.exe 3640 Ihmfco32.exe 32 Ilkoim32.exe 4052 Iiopca32.exe 3100 Ibjqaf32.exe 2164 Jlbejloe.exe 2252 Jppnpjel.exe 2332 Joekag32.exe 4292 Jlikkkhn.exe 756 Jhplpl32.exe 836 Jahqiaeb.exe 4776 Koonge32.exe 3128 Koajmepf.exe 540 Kocgbend.exe 452 Kcapicdj.exe 2224 Lcclncbh.exe 4700 Lojmcdgl.exe 4856 Lpjjmg32.exe 4436 Llqjbhdc.exe 3268 Llcghg32.exe 1428 Mfkkqmiq.exe 1700 Mjidgkog.exe 2436 Mbdiknlb.exe 4528 Mcdeeq32.exe 856 Mokfja32.exe 3148 Mjpjgj32.exe 4708 Nciopppp.exe 3792 Nqmojd32.exe 1860 Ncmhko32.exe 4340 Nmfmde32.exe 3960 Nbbeml32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dddllkbf.exe Bkphhgfc.exe File created C:\Windows\SysWOW64\Kldgkp32.dll Kocgbend.exe File created C:\Windows\SysWOW64\Nlkppnab.dll Dinael32.exe File created C:\Windows\SysWOW64\Pjhfcm32.dll Qfjjpf32.exe File created C:\Windows\SysWOW64\Lcclncbh.exe Kcapicdj.exe File created C:\Windows\SysWOW64\Bpenhh32.dll Nmfmde32.exe File created C:\Windows\SysWOW64\Pafkgphl.exe Pjjfdfbb.exe File created C:\Windows\SysWOW64\Ljkdeeod.dll Pmbegqjk.exe File opened for modification C:\Windows\SysWOW64\Cmpjoloh.exe Cdhffg32.exe File opened for modification C:\Windows\SysWOW64\Fnhbmgmk.exe Fdpnda32.exe File opened for modification C:\Windows\SysWOW64\Egcaod32.exe Eqgmmk32.exe File created C:\Windows\SysWOW64\Koajmepf.exe Koonge32.exe File opened for modification C:\Windows\SysWOW64\Llcghg32.exe Llqjbhdc.exe File opened for modification C:\Windows\SysWOW64\Nbbeml32.exe Nmfmde32.exe File opened for modification C:\Windows\SysWOW64\Fgqgfl32.exe Fnhbmgmk.exe File opened for modification C:\Windows\SysWOW64\Gclafmej.exe Gnohnffc.exe File created C:\Windows\SysWOW64\Aefjii32.exe Qklmpalf.exe File created C:\Windows\SysWOW64\Ibjqaf32.exe Iiopca32.exe File created C:\Windows\SysWOW64\Dojpmiij.dll Jhplpl32.exe File created C:\Windows\SysWOW64\Dkpjdo32.exe Dgbanq32.exe File opened for modification C:\Windows\SysWOW64\Eqkondfl.exe Eafbmgad.exe File opened for modification C:\Windows\SysWOW64\Bllbaa32.exe Bnfihkqm.exe File created C:\Windows\SysWOW64\Defbaa32.dll Lpjjmg32.exe File created C:\Windows\SysWOW64\Nqmojd32.exe Nciopppp.exe File opened for modification C:\Windows\SysWOW64\Kncaec32.exe Jokkgl32.exe File opened for modification C:\Windows\SysWOW64\Jlbejloe.exe Ibjqaf32.exe File created C:\Windows\SysWOW64\Aimogakj.exe Qikbaaml.exe File opened for modification C:\Windows\SysWOW64\Pknqoc32.exe 2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Jleiba32.dll Jgmjmjnb.exe File opened for modification C:\Windows\SysWOW64\Mfkkqmiq.exe Llcghg32.exe File opened for modification C:\Windows\SysWOW64\Geoapenf.exe Fqeioiam.exe File created C:\Windows\SysWOW64\Lpjjmg32.exe Lojmcdgl.exe File created C:\Windows\SysWOW64\Ebdpoomj.dll Ojcpdg32.exe File created C:\Windows\SysWOW64\Ocnabm32.exe Obnehj32.exe File opened for modification C:\Windows\SysWOW64\Gnohnffc.exe Gcjdam32.exe File created C:\Windows\SysWOW64\Leifdf32.dll Qklmpalf.exe File created C:\Windows\SysWOW64\Bllbaa32.exe Bnfihkqm.exe File opened for modification C:\Windows\SysWOW64\Fqeioiam.exe Fndpmndl.exe File created C:\Windows\SysWOW64\Hjmgbm32.dll Gclafmej.exe File opened for modification C:\Windows\SysWOW64\Ejjaqk32.exe Daollh32.exe File created C:\Windows\SysWOW64\Fgqgfl32.exe Fnhbmgmk.exe File created C:\Windows\SysWOW64\Qklmpalf.exe Pknqoc32.exe File opened for modification C:\Windows\SysWOW64\Aefjii32.exe Qklmpalf.exe File created C:\Windows\SysWOW64\Occmjg32.dll Onapdl32.exe File opened for modification C:\Windows\SysWOW64\Mbdiknlb.exe Mjidgkog.exe File created C:\Windows\SysWOW64\Mcdeeq32.exe Mbdiknlb.exe File opened for modification C:\Windows\SysWOW64\Pmmlla32.exe Pafkgphl.exe File opened for modification C:\Windows\SysWOW64\Pjaleemj.exe Pmmlla32.exe File created C:\Windows\SysWOW64\Lhaiafem.dll Ecbeip32.exe File created C:\Windows\SysWOW64\Cdecba32.dll Ckmonl32.exe File created C:\Windows\SysWOW64\Kibohd32.dll Omnjojpo.exe File opened for modification C:\Windows\SysWOW64\Dndgfpbo.exe Dddllkbf.exe File opened for modification C:\Windows\SysWOW64\Qikbaaml.exe Qpbnhl32.exe File created C:\Windows\SysWOW64\Dggkipii.exe Dkpjdo32.exe File opened for modification C:\Windows\SysWOW64\Nmfmde32.exe Ncmhko32.exe File created C:\Windows\SysWOW64\Qfjjpf32.exe Pmbegqjk.exe File created C:\Windows\SysWOW64\Qikbaaml.exe Qpbnhl32.exe File created C:\Windows\SysWOW64\Jlbejloe.exe Ibjqaf32.exe File opened for modification C:\Windows\SysWOW64\Koajmepf.exe Koonge32.exe File created C:\Windows\SysWOW64\Ampaho32.exe Aplaoj32.exe File created C:\Windows\SysWOW64\Nppbddqg.dll Ckggnp32.exe File opened for modification C:\Windows\SysWOW64\Ckhecmcf.exe Bllbaa32.exe File created C:\Windows\SysWOW64\Kdebopdl.dll Ppolhcnm.exe File created C:\Windows\SysWOW64\Hnphoj32.exe Geoapenf.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4968 5916 WerFault.exe 211 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkphhgfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nppbddqg.dll" Ckggnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dinael32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gadeee32.dll" Fcneeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjjjgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgqgfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmfmde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pafkgphl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgdemb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkcpql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgqjbf32.dll" Lopmii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnphoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iiopca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jhplpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Koonge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djkpla32.dll" Pjaleemj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmggingc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dggkipii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecbeip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eafbmgad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjaphgpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqkplq32.dll" Pqbala32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhkhop32.dll" Adepji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqikob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oklfllgp.dll" 2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Geoapenf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jppnpjel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmggingc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcnlnaom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enopghee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohgohiia.dll" Gcjdam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olekop32.dll" Hnphoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejjaqk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqikob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcjdam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hemdlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onapdl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amnlme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqeioiam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elckbhbj.dll" Lojmcdgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcdeeq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocnabm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdlfjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcpcgc32.dll" Dggkipii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gnohnffc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nciopppp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmbegqjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dodebo32.dll" Cmbgdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eafbmgad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckhecmcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdebopdl.dll" Ppolhcnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppolhcnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jggocdgo.dll" Geoapenf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpecpo32.dll" Koonge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hapfpelh.dll" Koajmepf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kocgbend.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjhfcm32.dll" Qfjjpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flkdfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgmjmjnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kncaec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilkoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkpemq32.dll" Joekag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncmhko32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1200 1456 2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe 92 PID 1456 wrote to memory of 1200 1456 2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe 92 PID 1456 wrote to memory of 1200 1456 2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe 92 PID 1200 wrote to memory of 4072 1200 Pknqoc32.exe 93 PID 1200 wrote to memory of 4072 1200 Pknqoc32.exe 93 PID 1200 wrote to memory of 4072 1200 Pknqoc32.exe 93 PID 4072 wrote to memory of 2124 4072 Qklmpalf.exe 94 PID 4072 wrote to memory of 2124 4072 Qklmpalf.exe 94 PID 4072 wrote to memory of 2124 4072 Qklmpalf.exe 94 PID 2124 wrote to memory of 3464 2124 Aefjii32.exe 95 PID 2124 wrote to memory of 3464 2124 Aefjii32.exe 95 PID 2124 wrote to memory of 3464 2124 Aefjii32.exe 95 PID 3464 wrote to memory of 4924 3464 Bnfihkqm.exe 96 PID 3464 wrote to memory of 4924 3464 Bnfihkqm.exe 96 PID 3464 wrote to memory of 4924 3464 Bnfihkqm.exe 96 PID 4924 wrote to memory of 4912 4924 Bllbaa32.exe 97 PID 4924 wrote to memory of 4912 4924 Bllbaa32.exe 97 PID 4924 wrote to memory of 4912 4924 Bllbaa32.exe 97 PID 4912 wrote to memory of 2572 4912 Ckhecmcf.exe 98 PID 4912 wrote to memory of 2572 4912 Ckhecmcf.exe 98 PID 4912 wrote to memory of 2572 4912 Ckhecmcf.exe 98 PID 2572 wrote to memory of 3968 2572 Ckmonl32.exe 99 PID 2572 wrote to memory of 3968 2572 Ckmonl32.exe 99 PID 2572 wrote to memory of 3968 2572 Ckmonl32.exe 99 PID 3968 wrote to memory of 1396 3968 Dkceokii.exe 100 PID 3968 wrote to memory of 1396 3968 Dkceokii.exe 100 PID 3968 wrote to memory of 1396 3968 Dkceokii.exe 100 PID 1396 wrote to memory of 5052 1396 Emanjldl.exe 101 PID 1396 wrote to memory of 5052 1396 Emanjldl.exe 101 PID 1396 wrote to memory of 5052 1396 Emanjldl.exe 101 PID 5052 wrote to memory of 1404 5052 Flkdfh32.exe 102 PID 5052 wrote to memory of 1404 5052 Flkdfh32.exe 102 PID 5052 wrote to memory of 1404 5052 Flkdfh32.exe 102 PID 1404 wrote to memory of 2036 1404 Gimqajgh.exe 103 PID 1404 wrote to memory of 2036 1404 Gimqajgh.exe 103 PID 1404 wrote to memory of 2036 1404 Gimqajgh.exe 103 PID 2036 wrote to memory of 1560 2036 Hemdlj32.exe 104 PID 2036 wrote to memory of 1560 2036 Hemdlj32.exe 104 PID 2036 wrote to memory of 1560 2036 Hemdlj32.exe 104 PID 1560 wrote to memory of 4984 1560 Imkbnf32.exe 105 PID 1560 wrote to memory of 4984 1560 Imkbnf32.exe 105 PID 1560 wrote to memory of 4984 1560 Imkbnf32.exe 105 PID 4984 wrote to memory of 4996 4984 Jcoaglhk.exe 106 PID 4984 wrote to memory of 4996 4984 Jcoaglhk.exe 106 PID 4984 wrote to memory of 4996 4984 Jcoaglhk.exe 106 PID 4996 wrote to memory of 2900 4996 Jgmjmjnb.exe 107 PID 4996 wrote to memory of 2900 4996 Jgmjmjnb.exe 107 PID 4996 wrote to memory of 2900 4996 Jgmjmjnb.exe 107 PID 2900 wrote to memory of 212 2900 Jokkgl32.exe 108 PID 2900 wrote to memory of 212 2900 Jokkgl32.exe 108 PID 2900 wrote to memory of 212 2900 Jokkgl32.exe 108 PID 212 wrote to memory of 2616 212 Kncaec32.exe 109 PID 212 wrote to memory of 2616 212 Kncaec32.exe 109 PID 212 wrote to memory of 2616 212 Kncaec32.exe 109 PID 2616 wrote to memory of 2456 2616 Lopmii32.exe 110 PID 2616 wrote to memory of 2456 2616 Lopmii32.exe 110 PID 2616 wrote to memory of 2456 2616 Lopmii32.exe 110 PID 2456 wrote to memory of 4956 2456 Moipoh32.exe 111 PID 2456 wrote to memory of 4956 2456 Moipoh32.exe 111 PID 2456 wrote to memory of 4956 2456 Moipoh32.exe 111 PID 4956 wrote to memory of 3448 4956 Omnjojpo.exe 112 PID 4956 wrote to memory of 3448 4956 Omnjojpo.exe 112 PID 4956 wrote to memory of 3448 4956 Omnjojpo.exe 112 PID 3448 wrote to memory of 1268 3448 Onapdl32.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2a248341d4a7abc829dcb233449eeaf0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\Pknqoc32.exeC:\Windows\system32\Pknqoc32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Qklmpalf.exeC:\Windows\system32\Qklmpalf.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\Aefjii32.exeC:\Windows\system32\Aefjii32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Bnfihkqm.exeC:\Windows\system32\Bnfihkqm.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\Bllbaa32.exeC:\Windows\system32\Bllbaa32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\Ckhecmcf.exeC:\Windows\system32\Ckhecmcf.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\Ckmonl32.exeC:\Windows\system32\Ckmonl32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\Dkceokii.exeC:\Windows\system32\Dkceokii.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\Emanjldl.exeC:\Windows\system32\Emanjldl.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\Flkdfh32.exeC:\Windows\system32\Flkdfh32.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\Gimqajgh.exeC:\Windows\system32\Gimqajgh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\Hemdlj32.exeC:\Windows\system32\Hemdlj32.exe13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\Imkbnf32.exeC:\Windows\system32\Imkbnf32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\Jcoaglhk.exeC:\Windows\system32\Jcoaglhk.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\Jgmjmjnb.exeC:\Windows\system32\Jgmjmjnb.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\Jokkgl32.exeC:\Windows\system32\Jokkgl32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Kncaec32.exeC:\Windows\system32\Kncaec32.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\Lopmii32.exeC:\Windows\system32\Lopmii32.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Moipoh32.exeC:\Windows\system32\Moipoh32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Omnjojpo.exeC:\Windows\system32\Omnjojpo.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\Onapdl32.exeC:\Windows\system32\Onapdl32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\Ppolhcnm.exeC:\Windows\system32\Ppolhcnm.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1268 -
C:\Windows\SysWOW64\Amnlme32.exeC:\Windows\system32\Amnlme32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4348 -
C:\Windows\SysWOW64\Bkphhgfc.exeC:\Windows\system32\Bkphhgfc.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1568 -
C:\Windows\SysWOW64\Dddllkbf.exeC:\Windows\system32\Dddllkbf.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4068 -
C:\Windows\SysWOW64\Dndgfpbo.exeC:\Windows\system32\Dndgfpbo.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3236 -
C:\Windows\SysWOW64\Ehlhih32.exeC:\Windows\system32\Ehlhih32.exe28⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\Eqgmmk32.exeC:\Windows\system32\Eqgmmk32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3160 -
C:\Windows\SysWOW64\Egcaod32.exeC:\Windows\system32\Egcaod32.exe30⤵
- Executes dropped EXE
PID:1044 -
C:\Windows\SysWOW64\Fndpmndl.exeC:\Windows\system32\Fndpmndl.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\Fqeioiam.exeC:\Windows\system32\Fqeioiam.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4644 -
C:\Windows\SysWOW64\Geoapenf.exeC:\Windows\system32\Geoapenf.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\Hnphoj32.exeC:\Windows\system32\Hnphoj32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3744 -
C:\Windows\SysWOW64\Ihkjno32.exeC:\Windows\system32\Ihkjno32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\Ihmfco32.exeC:\Windows\system32\Ihmfco32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3640 -
C:\Windows\SysWOW64\Ilkoim32.exeC:\Windows\system32\Ilkoim32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:32 -
C:\Windows\SysWOW64\Iiopca32.exeC:\Windows\system32\Iiopca32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4052 -
C:\Windows\SysWOW64\Ibjqaf32.exeC:\Windows\system32\Ibjqaf32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3100 -
C:\Windows\SysWOW64\Jlbejloe.exeC:\Windows\system32\Jlbejloe.exe40⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\Jppnpjel.exeC:\Windows\system32\Jppnpjel.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Joekag32.exeC:\Windows\system32\Joekag32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Jlikkkhn.exeC:\Windows\system32\Jlikkkhn.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\Jhplpl32.exeC:\Windows\system32\Jhplpl32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:756 -
C:\Windows\SysWOW64\Jahqiaeb.exeC:\Windows\system32\Jahqiaeb.exe45⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\Koonge32.exeC:\Windows\system32\Koonge32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4776 -
C:\Windows\SysWOW64\Koajmepf.exeC:\Windows\system32\Koajmepf.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:3128 -
C:\Windows\SysWOW64\Kocgbend.exeC:\Windows\system32\Kocgbend.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\Kcapicdj.exeC:\Windows\system32\Kcapicdj.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:452 -
C:\Windows\SysWOW64\Lcclncbh.exeC:\Windows\system32\Lcclncbh.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\Lojmcdgl.exeC:\Windows\system32\Lojmcdgl.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4700 -
C:\Windows\SysWOW64\Lpjjmg32.exeC:\Windows\system32\Lpjjmg32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4856 -
C:\Windows\SysWOW64\Llqjbhdc.exeC:\Windows\system32\Llqjbhdc.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4436 -
C:\Windows\SysWOW64\Llcghg32.exeC:\Windows\system32\Llcghg32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3268 -
C:\Windows\SysWOW64\Mfkkqmiq.exeC:\Windows\system32\Mfkkqmiq.exe55⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\Mjidgkog.exeC:\Windows\system32\Mjidgkog.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\Mbdiknlb.exeC:\Windows\system32\Mbdiknlb.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2436 -
C:\Windows\SysWOW64\Mcdeeq32.exeC:\Windows\system32\Mcdeeq32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\Mokfja32.exeC:\Windows\system32\Mokfja32.exe59⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\Mjpjgj32.exeC:\Windows\system32\Mjpjgj32.exe60⤵
- Executes dropped EXE
PID:3148 -
C:\Windows\SysWOW64\Nciopppp.exeC:\Windows\system32\Nciopppp.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4708 -
C:\Windows\SysWOW64\Nqmojd32.exeC:\Windows\system32\Nqmojd32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3792 -
C:\Windows\SysWOW64\Ncmhko32.exeC:\Windows\system32\Ncmhko32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1860 -
C:\Windows\SysWOW64\Nmfmde32.exeC:\Windows\system32\Nmfmde32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4340 -
C:\Windows\SysWOW64\Nbbeml32.exeC:\Windows\system32\Nbbeml32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\Ocgkan32.exeC:\Windows\system32\Ocgkan32.exe66⤵PID:1424
-
C:\Windows\SysWOW64\Oqklkbbi.exeC:\Windows\system32\Oqklkbbi.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:980 -
C:\Windows\SysWOW64\Ojcpdg32.exeC:\Windows\system32\Ojcpdg32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1452 -
C:\Windows\SysWOW64\Obnehj32.exeC:\Windows\system32\Obnehj32.exe69⤵
- Drops file in System32 directory
PID:4432 -
C:\Windows\SysWOW64\Ocnabm32.exeC:\Windows\system32\Ocnabm32.exe70⤵
- Modifies registry class
PID:1276 -
C:\Windows\SysWOW64\Pqbala32.exeC:\Windows\system32\Pqbala32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Pjjfdfbb.exeC:\Windows\system32\Pjjfdfbb.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3340 -
C:\Windows\SysWOW64\Pafkgphl.exeC:\Windows\system32\Pafkgphl.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\Pmmlla32.exeC:\Windows\system32\Pmmlla32.exe74⤵
- Drops file in System32 directory
PID:5056 -
C:\Windows\SysWOW64\Pjaleemj.exeC:\Windows\system32\Pjaleemj.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5164 -
C:\Windows\SysWOW64\Pmbegqjk.exeC:\Windows\system32\Pmbegqjk.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5212 -
C:\Windows\SysWOW64\Qfjjpf32.exeC:\Windows\system32\Qfjjpf32.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:5272 -
C:\Windows\SysWOW64\Qpbnhl32.exeC:\Windows\system32\Qpbnhl32.exe78⤵
- Drops file in System32 directory
PID:5316 -
C:\Windows\SysWOW64\Qikbaaml.exeC:\Windows\system32\Qikbaaml.exe79⤵
- Drops file in System32 directory
PID:5368 -
C:\Windows\SysWOW64\Aimogakj.exeC:\Windows\system32\Aimogakj.exe80⤵PID:5420
-
C:\Windows\SysWOW64\Abfdpfaj.exeC:\Windows\system32\Abfdpfaj.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5464 -
C:\Windows\SysWOW64\Adepji32.exeC:\Windows\system32\Adepji32.exe82⤵
- Modifies registry class
PID:5524 -
C:\Windows\SysWOW64\Aplaoj32.exeC:\Windows\system32\Aplaoj32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5576 -
C:\Windows\SysWOW64\Ampaho32.exeC:\Windows\system32\Ampaho32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5628 -
C:\Windows\SysWOW64\Afhfaddk.exeC:\Windows\system32\Afhfaddk.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5696 -
C:\Windows\SysWOW64\Bdlfjh32.exeC:\Windows\system32\Bdlfjh32.exe86⤵
- Modifies registry class
PID:5772 -
C:\Windows\SysWOW64\Bpcgpihi.exeC:\Windows\system32\Bpcgpihi.exe87⤵PID:5840
-
C:\Windows\SysWOW64\Bmggingc.exeC:\Windows\system32\Bmggingc.exe88⤵
- Modifies registry class
PID:5888 -
C:\Windows\SysWOW64\Bgdemb32.exeC:\Windows\system32\Bgdemb32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5932 -
C:\Windows\SysWOW64\Cdhffg32.exeC:\Windows\system32\Cdhffg32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5980 -
C:\Windows\SysWOW64\Cmpjoloh.exeC:\Windows\system32\Cmpjoloh.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6020 -
C:\Windows\SysWOW64\Cmbgdl32.exeC:\Windows\system32\Cmbgdl32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6060 -
C:\Windows\SysWOW64\Ckggnp32.exeC:\Windows\system32\Ckggnp32.exe93⤵
- Drops file in System32 directory
- Modifies registry class
PID:6100 -
C:\Windows\SysWOW64\Ccblbb32.exeC:\Windows\system32\Ccblbb32.exe94⤵PID:5152
-
C:\Windows\SysWOW64\Dinael32.exeC:\Windows\system32\Dinael32.exe95⤵
- Drops file in System32 directory
- Modifies registry class
PID:3264 -
C:\Windows\SysWOW64\Dgbanq32.exeC:\Windows\system32\Dgbanq32.exe96⤵
- Drops file in System32 directory
PID:5244 -
C:\Windows\SysWOW64\Dkpjdo32.exeC:\Windows\system32\Dkpjdo32.exe97⤵
- Drops file in System32 directory
PID:5404 -
C:\Windows\SysWOW64\Dggkipii.exeC:\Windows\system32\Dggkipii.exe98⤵
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\Dcnlnaom.exeC:\Windows\system32\Dcnlnaom.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5416 -
C:\Windows\SysWOW64\Daollh32.exeC:\Windows\system32\Daollh32.exe100⤵
- Drops file in System32 directory
PID:5340 -
C:\Windows\SysWOW64\Ejjaqk32.exeC:\Windows\system32\Ejjaqk32.exe101⤵
- Modifies registry class
PID:5708 -
C:\Windows\SysWOW64\Ecbeip32.exeC:\Windows\system32\Ecbeip32.exe102⤵
- Drops file in System32 directory
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Epffbd32.exeC:\Windows\system32\Epffbd32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5884 -
C:\Windows\SysWOW64\Eafbmgad.exeC:\Windows\system32\Eafbmgad.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5988 -
C:\Windows\SysWOW64\Eqkondfl.exeC:\Windows\system32\Eqkondfl.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5952 -
C:\Windows\SysWOW64\Enopghee.exeC:\Windows\system32\Enopghee.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6136 -
C:\Windows\SysWOW64\Fkcpql32.exeC:\Windows\system32\Fkcpql32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Fcneeo32.exeC:\Windows\system32\Fcneeo32.exe108⤵
- Modifies registry class
PID:5352 -
C:\Windows\SysWOW64\Fqbeoc32.exeC:\Windows\system32\Fqbeoc32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3624 -
C:\Windows\SysWOW64\Fjjjgh32.exeC:\Windows\system32\Fjjjgh32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5160 -
C:\Windows\SysWOW64\Fdpnda32.exeC:\Windows\system32\Fdpnda32.exe111⤵
- Drops file in System32 directory
PID:5144 -
C:\Windows\SysWOW64\Fnhbmgmk.exeC:\Windows\system32\Fnhbmgmk.exe112⤵
- Drops file in System32 directory
PID:5836 -
C:\Windows\SysWOW64\Fgqgfl32.exeC:\Windows\system32\Fgqgfl32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5940 -
C:\Windows\SysWOW64\Fqikob32.exeC:\Windows\system32\Fqikob32.exe114⤵
- Modifies registry class
PID:5832 -
C:\Windows\SysWOW64\Gjaphgpl.exeC:\Windows\system32\Gjaphgpl.exe115⤵
- Modifies registry class
PID:5848 -
C:\Windows\SysWOW64\Gcjdam32.exeC:\Windows\system32\Gcjdam32.exe116⤵
- Drops file in System32 directory
- Modifies registry class
PID:5868 -
C:\Windows\SysWOW64\Gnohnffc.exeC:\Windows\system32\Gnohnffc.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\Gclafmej.exeC:\Windows\system32\Gclafmej.exe118⤵
- Drops file in System32 directory
PID:5900 -
C:\Windows\SysWOW64\Gbmadd32.exeC:\Windows\system32\Gbmadd32.exe119⤵PID:5916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5916 -s 228120⤵
- Program crash
PID:4968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 5916 -ip 59161⤵PID:4896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5e63a0b40d10969e3e95e272693256735
SHA1b07c5bc8decd2f9793a3fceb7be3f3fd3b85dd3f
SHA2560ac47180c9d8f43211e54809b0ef55261cda41899dc4e8759412322c9d38c645
SHA5126bba0e8fa9e6624d29964fa2bb2090858669e26c1d2d3ddb2a588ee15d992e576abd6bfc9ee77d78aee346c128f85e870c31555f484ad8f99f2e9193697071ef
-
Filesize
2.2MB
MD5a0100e36df58c8bc78f46d21c979663b
SHA148e78d4d63a1a8f541f933c9ba9caa678c55c5fb
SHA2562f00fb18dc71b116681ab5f2872d1a9203c95da865836529f6df9e59511f0220
SHA512861dc769d2c8c232d569721347ea1c4d3029db385c21e85ebf89c98772d2e9538fac5539d7b6590323bc2f229aaacce2c9b0ebc5b465a36f79c68eaf1848a013
-
Filesize
2.2MB
MD5d8873fd1a674c09699d8a522645ad2a5
SHA10f67c630682b40f82ec1c530f40cc01b81deeb45
SHA25671cd7344f5dd653fd7e4d3dfc8c86860a34d07f129d2931834ff34188677a9b0
SHA51253c606cb04c394fd801b618fd4be270b02d93e47713349206dc01a0592705d37dc5728fb103f46746363e47316515201b73dd7fcbdd1050931ed88bd5eaf04f1
-
Filesize
2.2MB
MD5b7f79def93682325b83595c6bf788145
SHA1f738f6a9561c52092cb6227bbeba529044f8f11a
SHA25657f14d55a8bbf8b2f46cce5c6c358c973e27fccdfcbbf88a5d538eb6ccc5edb4
SHA512a8aab472bbb30566e6662a52f5fafc28fb13e096f614700e64abb80132c43ac3fa7f6d8009902197f160fa90e63931ca4a75bf76368cc81e1410989a1cd08c52
-
Filesize
2.2MB
MD5aab82501b7e798500170a921bcddc1cd
SHA142d3cb61ebaa1635daea961e69d87287f8054b00
SHA256a3473946e0c9de9ff3ede51ceca150e8702956ba1bb919ef19cdf533ad4667b9
SHA512c8731952e8921f9185b323b7def871a048923514d90aed89e3116a0eeb3e5f7a6744e9bd12eec8618b29de4febb2b6d760ed2f150e0f7909897cec57f4f662d9
-
Filesize
2.2MB
MD5b9b5d590b1595955b21da6481cbc0134
SHA1b7bda83cc2692847a291cf7a130da53eef5b2763
SHA256591716a817c565664eac46a204984ec0ff5c3c74d5fb8f179ff4332b22c84df7
SHA512ad56afbcfc2e4fb6ad4d12fa1615998c91bbb377f99c9aafee85bbf7047c3389fb9d6f26d830d1987e27d7bd391c3335aaf6f9e9a5313294b9e00f62b887ee6c
-
Filesize
2.2MB
MD528a9d859ea2f220cd3eba80a4895fdb1
SHA13ff3b3d5f646de5fcbc28de94fc4fec4eb680dd6
SHA2567da33fa5d1ab9465ea8b016cf4417e51d829617541ce33f982473902daa77325
SHA512403693413b0b8fbfbdb4b18604a4b1445089dbeca2cf803904613d1ead6c646417118ac6ee1989315cba33821da33c7a7b8fdd9d30fdeddc7a58031df6cb201c
-
Filesize
2.2MB
MD58eb687cc3f6bec60a0f46f13981bad03
SHA14e06f89541cf31a270eb9fe67a348e9d129e4cb4
SHA2568096110f1237ffab88dd9035385e67a8b9dd7fb2c36644a49f8bc53f312b4cba
SHA5122064fa2674ff2db8a6cbf33127dc3129e2079325e90a6f52b4512acebd06657f28e1a128c7997a52a5efaea990078be196548fbc1f3b38614948286053509972
-
Filesize
2.2MB
MD5bd54cf348df8b444cd7cfe67b4fd768d
SHA18d6b2cd171cba4f44e4f52d9ff92e7273c4f87a1
SHA25622ed4712d3efa005b98d0b7fea1dece6ac29c7e4814d1ce25edd9178ecc4d9fb
SHA5128f2e7e9af46f4764aa9c5250efd19b097df506e782afbf16a800c974acdd835568f395b774eb5dedade41528843cc64060b630eddc65307374d95f4ead4362e1
-
Filesize
2.2MB
MD554dd140810e29967aa28906ae046df3a
SHA1560df197011f55b2e58ef3678f2f89b518b6f847
SHA2560950645482f8e95dbf1540f6e15b1020b19af182dc3b9ba3e3400f24c2be6846
SHA5125455683a15bc43541a42265b18922cb35fbbbf23f91647dc6a2c947539dc8f01c1700c44c3ed5d66a8c294c9abb80681d940124384d27938c0baf69fee34b7a4
-
Filesize
2.2MB
MD5be536db5e90370df5c2be7bc946357d7
SHA14e629f164b56e2da31f1bf368909581815336579
SHA2560e255df23cfe0d4912ffc1afee4a6d7740deed08296309c19e4fcda03b1e2da5
SHA5127f9976b3bf40d7c394cc79965b47ec0a8c59b21133695162bae64f53d1496d958d4bd04e1986ca0a31f4e0d8fdedad176b12d18a2f9a717523c836947f3a992e
-
Filesize
2.2MB
MD50e4f76a787b4192c389f6925d63864f7
SHA1ab06f24ff78b9090f268badaca16aaf46009b7a0
SHA256745c181a933dc3fa29878c58df2a4c8114ebcd3b2e56fb0112c211edcd29084e
SHA512586e61488ec328d458538e083ed6e507059c32a2083efdb79d9b689c11536dcd1475e5a385146156c6f82ab915b34c4f93615a19490f72887cafd0a0b29bd651
-
Filesize
2.2MB
MD50c2538a1aac06291472f15c3a34d8e0b
SHA1d69b9257d67d6b4e955094e712f8ab1a432606a0
SHA25617be44a6b4a4bab6da13ce49bfcddb1e1e76f30509d5437703d7a7bdf858c8aa
SHA512b213e4b3fe4796d33f8161ca917fa4390b18dae2e022684a63f90056140d73db60e2f92fdce97624883f1135de68e61f5826e1dfafcde2352a362cadb0794e76
-
Filesize
2.2MB
MD55b82dd5e49f65f6d486de01d5303ebb7
SHA1103f7e041e0c8d7812e82b84e3bf9dfdc8c98d82
SHA25668a836c7c0b71c80174056d1723801a44856b900265b68d22097f90aa771da3a
SHA5125403ba79e2d3a7c73c3351d9e7adeacecd0fd6552aa98bf21b349ac98b94d16b45a0617edc5a5f8f34be9cd96446b146e4f3005652401b73d07444ddda1c9b39
-
Filesize
2.2MB
MD5390dd561c8ae56ee16611cf5d9095a87
SHA137d27114393cb18f70217e24abe63288d63b17fb
SHA2567daec66fd739a275f2793e586e84760041762327ea95e5118259f744729efa05
SHA512ca0e84327018162b2f46af8ce4d8a0183a0fbbbd3b4480e3bef31c8e0bfcdb125d5b5525344d4260d5390331cce846e8c1bc392b0a9e31e9ab2965d2b811369f
-
Filesize
2.2MB
MD501e009fc39a2ffba1a226946d7e819a7
SHA193da99a55420ca68e9975756bf187709877d218f
SHA256131dcc97e2fe5e36920925e7077ca781dbb49274b929ea68e387a75ffa32f373
SHA512f066f9391d647cc49594c50b821d8fa0957db643f27e7a8b18adcff39f4df9996049e3ec4694ab26fe0d63f99ea73f2ea9f982518a299d6a6803ef389ccd3618
-
Filesize
2.2MB
MD57b95c54ac41cc8ef0f8b93898b6380f8
SHA12acc85435c311570380a5b22046a1a80d9552393
SHA256f33af45df9721ffed2f976cc41c6de1a13f54adc0ee1119e141052e48a20ce5e
SHA5127a4238d355d0c7e5d7e1c99c731e787ddd44ae0174054953576a32f9996ce544a5fc8971ecf0c71c5b135124f1e159a36edd609c79e9ffd9562ab17852352728
-
Filesize
2.2MB
MD59943b4756140ffb2f8dd3eb001c645f7
SHA1cf1dbbc2e9399cde0c49c2b161669d557e121b95
SHA2563f2f1cd58884060d5b21a6bcaf7d43c51f106cc4aece4f54f51cf7607a3e99ee
SHA512bf6617450a844e6e91f2ebfe687113fe2acf36d2e35e0b28f0ab8b865f6c8b88a509caf42986073b6d5f5f155e6105343c6c72cf36aef2bc344ff6b2f96310ae
-
Filesize
1.9MB
MD53f8d5d21278ac0b28c0e35fc13979a8c
SHA1c86f765805fde958cce0df6adfa452d4cd92d1e1
SHA256d9489619eab09e499dc673d9c13811e6e54cfc8fb87266bed62aadf17011bbc0
SHA51243dddf99a28bdb3532e5face44f400a6d97c34b91659b41027d9157f8bc779f4fa0314b1aaf484fcd8dd37a64dbfdfc0da7440a6b3d806e1441d6488bf86ddbb
-
Filesize
2.2MB
MD5e403f2ceca6fe9579e9bbc024fbf594d
SHA15b0f732d213919e84daad2812ec5cf3a7efa3b55
SHA25670a975a26bc2a3aa5bad9415c963118ab3453e6cf5cec9aad4e60a0b9be25bd8
SHA512a9dde21890ba80af9d6ee42a3451a6d9f66b282c01c64b45c579499f3e0a877ff42263fdbbe75eb40ea30754738226cae816159806e5c5abce86aa6e42795291
-
Filesize
2.2MB
MD5f127836f4099405323a3bcebe2047fa7
SHA1bfd180fb72eac01733c88d9f5965e35416765cab
SHA256dffb3038fafaffaa2abdd1e3897d1a309589230a5302715785d66f672b608eb0
SHA512b842bc0badc8d5bf44be41d71b0b47b741f463ad11974be76a47ca9ac8cdcc1bb54aca9e9d7fd77e0bca82bf764c917400558d1ab6c4d1035e1973e4afca2a38
-
Filesize
2.2MB
MD589a1eed0c199a73e84d51178862a6a8c
SHA12e3e4996ce894de1c845a0d43b8033038f6f0b44
SHA256f0a7093c3d8d16360a9c153e5912da98a66f47d70ac060ea52432a04552b54ff
SHA512ba5844a34668abb69764b55eb6d0bd9e6d970638bf8f97e2c0594204734fcb20c4cefb25c558ace215141a22eddd9c26f54845a8ded8a86c7eb67b121d498b2b
-
Filesize
2.2MB
MD5023c1687eae09453f319b8c2d55cb6ce
SHA175d6e30fe35abe786f76a9ce40e1033c7f43e2f3
SHA2566ad11e9908386974c4222f31d2e3c71a6d95b108ba969521063e71ce24c6ef88
SHA5124af7133d6c4afe7e7b83adb554401dde42a3db3b20ab70943a0833d31049d06f27253a3ab4862b23a5b3dbb672c517d32a19bdde3e70879ecb5c7835cd24ccc1
-
Filesize
2.2MB
MD58ccb2ba64deebfabe405f064777faf60
SHA122ccd809b3f055964416290d46892723fde2f9be
SHA256fc6f498894d8c82306c6973a1d384a6e1aecd71842eaebd141dfee37fe3c87d4
SHA5125d663d9e12169c1e1ded1b88a4d5d6e84b227d3587c929c649b2a9ce211b79421d67db5dd368a4234e5578aa28b1602333e3fd8699555bedae7b25a597b0ae79
-
Filesize
2.2MB
MD5e4b888b7a08c0b78bf7c966144cbe17f
SHA1be1263e988fc66b503876eb12cb4979e41ece3f0
SHA2569e6917c0f974cd28f316225065af0079bfa4e0531c9077326559a3960c559c96
SHA5127d45cb50f434f98e07b08e22c0ab2cd03044a7a4b494da2aecac1df80b52fd414279b7ead100e15a8ccdcf24e755dace9fca2ab8e5a0b857e0e181b6dcd30c55
-
Filesize
1.8MB
MD5c13858321df51f7448915fc727b8e2c7
SHA1ef2fdfb7068f1c5b99d47e8e27489531933251f4
SHA256505411154f67568fb57b3a80934211254efd9b62f4d6fd2595919b87a221147f
SHA51225b22876d5983980d8b6c808654d1a6606496bf2602f342a3b34b1adc3935f3f28a91049881c30549246962f85806c03cb3a760c7f7462d81273929f5a56aff8
-
Filesize
2.2MB
MD5e5a18d5d9a001922ab056878917cbcee
SHA1b954600a780d88ae8a259fef9674302456559874
SHA25697c7e2da664cbd45c781cccd3d846426ae672d52f35de564191a6827868b95e4
SHA5126370668987cab2fcb295213f338b7bc69ea55599db6b4d5550902dc04d0f6c0425c177b393afb35d859cc43ba39fa1a5bc9ffe6f783e60154544f7ab968dde65
-
Filesize
2.2MB
MD5f8e5e60eec8bec2601befff5c9f15f5b
SHA1c27585705a7729f2a3a28998a7ba3972f6cf7599
SHA25612b098ce6b42ade0408f818e4b006d00b88fd5f6258a60f006cd492802508883
SHA512f2cbfa9f9155bd84bc6d8a46b823b6cd3c6850a3c90b040a46a00a6b3c7dd03bb8f7de49eb87f8b1c235682565900543ef7fd59cd4fb168ac8fbb81bf455ef4e
-
Filesize
2.2MB
MD570f290cd6d32d6e910dec8f7195fd96d
SHA10a31e73f0106228d87fc6a14b3590d3f7735836f
SHA25606e390e601addedd5b4f25f78580f3eb41833b344e8aa41fa110aa518016f613
SHA512ac27325e6972474b2df654b63f6a9264b70c3f86234ff7a0ba920d9202c9d955e379c4f060a72bc7f4506c75bb4a7e55e57c21e70f18fa00db7575e4716afb20
-
Filesize
2.2MB
MD54b4e29bf6199cc623509aedd68a72f17
SHA11090d2a1d749f12ccb7d5c1830912863dd112267
SHA256b60273fedbfe7cc43a9ee2ea220353598efc36e56294385b41cdcfa00d31c98f
SHA512112d710f2cd0734b980afbc7ce62e0fd1134d8a7dc415a2a1d05d35ef1e935b761e60193eaf6086e6ce5095192f216a622cdfba7eab09b2453993c9a1893f1ba
-
Filesize
2.2MB
MD5ff4988593b63c180738dfc486c43f00b
SHA120b28cd6c070486a0d4c230acd08d076b9bb0ae9
SHA256a5dd1e27760a0f6a2b1cb1f20ed924941f4a3206b6bca789837d28da0bc3106c
SHA512f2259f9bab99d8107fcfa3246243ce9b4912d45a185443664fde3eadfb343a44ee6ec1b591ea49aff5e3133b944c1696e6d83414ecae69e55f7f573ee1f7762a
-
Filesize
2.1MB
MD5a616512f454e82ba8cbf9986dac91e81
SHA1ddcce102759cada2ecafa131f467fb0b82247ba5
SHA25661c24f21bfb3f65ae0b5e3281c1810bb24d17b5e7b4f7af0590873abf0111704
SHA5123154c2a001d6d1c7cd1a0904c2ad9b01dd2be519dda45c89c236707d9e0af8c5b7245a3905f753574b87a3c0eec81cecd74d4667214cd5889b47310dc694b2b8
-
Filesize
2.2MB
MD57c7e033d6cd65b811583ebbb28c98d30
SHA17ade6dd1f8be097962594007de3fc90663e844ac
SHA25604ddeb2e64aec172833156ea82b5fd61705a24a26050fc6400cd47cbcfb518bb
SHA51236522084163e773900abf1056ad4d2550290c213fc1b353df94dcad94f5a48e41df4918f43094b826c304ab06def621e975da7eddf14875c6c3c2a23ac9f89bd
-
Filesize
2.2MB
MD577a26349c9ef760abe264380c919fdd4
SHA1b6102a5bc47ed0d63e0946138be94c6442b998ab
SHA256ddb70c15b7c8d89ca53759ce66649ae922fb1aab6dd7f6bcf1478dbcc467ae9d
SHA5125d211b40665d53ff5b3cf7979e2abe24a3d01de23e7594add0d74da0efc93fe3d2974a279d7f1574b60a38cc48cf30666cf750dfa0eaa12a87f1996667169f7d
-
Filesize
2.2MB
MD577f46d03251ab73552c07d48dbe3aa63
SHA1d41cfd252a8f585df174ebda9186c772c95ad9c0
SHA256ed03ff1ab6f76da3c3d35289f9e8fa0be84ebfba9f4223cd2e5fd46f147e27e4
SHA5129d9cdaba278f5e7e1411ed910c3b856a1befa8014f3ece0e5a4701fb8690c59c209b2e192f04c4c611f6b3c4dde0569e49252e341c10a99059521daf02e1be9c
-
Filesize
2.2MB
MD515e405cbaea60cc3ff0d43bdf1840ca4
SHA1dc3640408723396755e9d8323e9c504073757ac9
SHA2569e1020c3ebaeb614ba21efccc7192e99c8093fc9b5375418ab90600f6ac913e4
SHA512b9306bf96f3ae5d659a8b4173db6e5e145a12d88134629498ce5afe502bf3b15baf1cde0e66520810b67fbf89464cb5a52d8cbcff48d29cbecefa1be95292d29
-
Filesize
2.2MB
MD589ba69a1fdd47c6fd56c658ee2e2e35e
SHA10f3300582caed09d48405b701e79459b1eaf3f3f
SHA25659a075366e446377889679ff4b9f0da911dde1cdda65ef3b1b739988b1b35d1f
SHA512dc97c3269d49a383b23ecfe3abbdac97c037724afbb7d33e1ea2b40ea26d402757ce530f81c63c6ca27742fceb6bbb53a8dd371762280a34c0e439c23c804620
-
Filesize
2.2MB
MD562a106b9a391be893dc97f303b17c512
SHA1f81b397b5b336ac6529f5cbcca8e543a3a5d97f3
SHA2569e8cc1c95783c82c962e1ebceb3a382ad42a215e201db64a7579e7fab598145a
SHA51286e1c7c44fd8cb6fa6e7ef823d8046b260871433041c474ec91825008b28b4b102485e2cef6f17e976691569dfcb60916f937c37ba5056f3d6e0e802cf1bd4c1
-
Filesize
2.2MB
MD5b926c6e032f7d73f3fe4ddb4b0183c7e
SHA1b333b26639461cbbd48a6df4ae6e382e7c69e3ba
SHA25602829840ad1fe2f02c5e0e3440addd0ba47c736ea168521223999deeb4256a95
SHA5126dff7d910edc48909b4ed5e46ba81c24a46af8090213df311c235344bea7e8bb34cbb95eeac32cd5eec4416e59147a6e138a37a776757968c24ee451c3fe9975
-
Filesize
2.2MB
MD5fb3fbc904f193f5be425f62280c38d2e
SHA1036a113829612f1f6bf7d677505d867078aaba2d
SHA2564ab7deee9fdb38195c1119bfde3e67d7594ecbc2dc4da8caf96cddae4966f2bd
SHA51249c763e7bbad127488b56fe5986be6feafcbbc4e1af6abf5340655c67b6b15f1dbf66c92717709327aeb8b7c8656b57828c65f39f123b8102ff2362931b32ccc
-
Filesize
2.2MB
MD556b90ce838882195fe263aef8644b024
SHA1c54c5873fe951f7ecbec1e44d63dd7d7b6bdee61
SHA2567fff874f6cddd0ff78f572954e878d274beea49643c2fe48e574769eea21c823
SHA5120c41c1ed955325cad6674153c845a78de9e3c4e6a01032b41e2e36090a8155f8ffce4451482192a7879776d6bda2dba4cc434c6cf2543e42a5b4ebcdb9fd833f
-
Filesize
2.2MB
MD58c51a727f09a1a50a967a56115a03c8a
SHA1cacebe080f04a1f491365b166e672fb6143ba331
SHA256bd543033d63d889def0fd78d839d9c465a8b4eeb1220b35d3b47f9bcab80973b
SHA512890eff0079677cf22280ea54cd9009d0fd3cfa2d6438ae16a9d2387ca0e0355c7dd513ec1675a94c7ec737e48a354d94b0012d8d5eb77eaae06c89906987d7fc
-
Filesize
2.2MB
MD50841741644b3a10c5f439b193fa7516b
SHA18272126ad1a9d6e9e1e372d241230f2998e4aee8
SHA256ce5a990bf4877556dfcaab6889c68d4fb9b91652e8dba06c210a7e0e9fab9c1c
SHA51211b52a126fec7937b8dba00323a578af9c8bb6182a6f384e776f90b48b587ed91990e1206a3b24ef9c38c0b6458396c9f3bdea6b296706625b4eb47bc10035e8
-
Filesize
2.2MB
MD59e036a0f4a3e12734e860edc5aff63ff
SHA1357a771d618683643a29eab4abec54930ce36d63
SHA256a1739e9c14771bfb8fb985b5d36d4a08b4bcf4138c3052754d5b115b3ea86a68
SHA5127f6480e5bdc4cbe32e321f5b45e84a21b2aa7c1351094e8a9d83ab724eeda9e7cc83f9c5ccf1d2e048b15ed3096a60bd09b4d059f1cc239395c2a04456e4ba33
-
Filesize
2.2MB
MD5750c09dc770388aad871d9699a377605
SHA11b82e0fe9e1674377923018efe8f3b69baa171d5
SHA2561fa8ebcbd94bf68a0059d18d217f17b8a8de7cb0cb8eb2f3947dcdb8523da8de
SHA5120c53b12d36f9dd6211e6b482cd5c936ba73fd85fdf667986c062f11351251a46db709fb87aa06dab99aa8561c078c4e4c8fa6a70156ff5d481523b3bb79be0cb
-
Filesize
2.2MB
MD559d956c44bf00ae0c35c0cb29b98e39a
SHA1306afbb83afc77e7701eb40bf938f39ae87fc458
SHA2569ec9f8d54dcef3d4ee0fa96758c0461e1373e0659bc4d136a4aa251ef3f4c066
SHA5127f956b4ed737106c2ef49409ca1c42e6e323e7a2702fa82bf81f9a44e9a23be3d76f307b70769ea43792138cd50289a950295484b247f957acd07b650139c8e9
-
Filesize
2.2MB
MD5e5ee13b34cd7df7e4d29dd711f159be3
SHA1a9c1715090ce94dd8fc2a8b84b1593666740e122
SHA256a0bef099e4f4c56ef368620ca107b356373efc1d4b09824a924dd9479290311f
SHA512a405195e70d1fdcf7d1f47e7709a72346dd658081f9409388d6ba0f26d1021c5087a45a5ecfe63f0185ab7320a88a59adac2b6f84c6024f7fed34b6f1875e67e
-
Filesize
2.2MB
MD502fd2bf91d25f9154ec7d4e2764fb1fe
SHA11fc0848357953319586daf4e3ab090f7aaf41a97
SHA256d4a4054de444e40ab200c988ae61a1f67a3561004bfe53e4a5b7c88682d9d326
SHA512884a06b0ad9e4065daf4fece8e29c8f58a7aa404083c8a62133773e578a3ff6f8ff225648ba5dbaeda20ddce1f800ec5b21c217131634e1d140957c33fc41bb8
-
Filesize
2.2MB
MD5bd414c6a5dc238b5195a20d17e542fa7
SHA14d8dcd744f573f784e9fa563b83285b344eddda1
SHA256ca9ed320c0e27ae60d6e63e951c6ccc1e2ce583a7f0dde6a8c7ce8826f410c48
SHA512007b4a8b4eb9890736ae7d555078fe4f3091d1f5fc53d3ce16e42582bcb09a9151ea8ac61fa6295b327c581f0f1e104ed9a223274f93ae197a0fc71ba99e8dd0
-
Filesize
2.2MB
MD5450bb78bd8bb03a3b5ff6afef4cd08da
SHA1f1c8cefd6b339b747e5b91fb8465f16fc3aa72b9
SHA2560c446922a26055602ac2fa8585be818edfafd844a61d2aa51a75f4cc638c734d
SHA512ad9f44457959b274e788c5add2f0e5aeca2f8e8679e51333963c1bd12021547de15848e495442bfa579d208dfaba7200318e9ccb64741c84e3b8ddfacde3fabe
-
Filesize
1.4MB
MD55bd1eccb0527b17bf75c38979849bec4
SHA11458f22740712861914e767d6f94a9e6f3f340fc
SHA2568fc0e09df8ab80e6f3c96583f024cb1e1d83d77ce4489cc7e869720fb1a077a2
SHA512ba0b55b0df87bcca3c902e3681ee86c41a55dfb340e4f4907e99f23136d6e25e64b23b305d071b9d7f8340015fbfaaf348a71c2e925e07944cc74fe86782f627
-
Filesize
2.2MB
MD50247e8d73db68fefb6117e59d14c6909
SHA1b07e25cb1e2bc03c4fd37d784f17a2bcdf5372e7
SHA256d120184417d8417ca626d760018bf826b1796e87a5e5c3cbaca112b860c7ebdb
SHA512077139e3ac31188ed3a193e85ec9d686ff9b1edc1ba3d89e2c1e59b72c9ce340a96bd5e93dce9796d3b54b2323263708179fc10fe31643d5b58211bea1127900
-
Filesize
2.2MB
MD539a4dbd6fd867efba66f2408783107b2
SHA1ab78ddf1c9786dd5920208135baec32db644e4e7
SHA256c9ee7c20338360bf9ba3428e715490d7b4b0c490f6d69a9e10e2cefb3cbc6146
SHA5129b0ef0ae5add0d58f23e7d94f20e45b27d7ba641da6ca95e9ebedaf4c049ff23ac7917d04339d7ffeb56d607a5eef97ee54e2c5590d74dda2e7d6b5152cb5632
-
Filesize
2.2MB
MD5b70a1ea232a627fc6119aeeee7a253c0
SHA142a7adda931db6fd157e5fe1e411871a455bb123
SHA25602c36b6c8cbbb3e79e4fdc24fac48ba0e98075891e4408dfe10080bc50bf566b
SHA512707394a8d9aef46d991021088d78513885cc57e6d472a763c24fffdc397dc9d103d9e3c09af54c7abfefdc333c1676aedac50f020ad9e594b07f1cf2f0b5a60e