Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
514aec31edaff5d6678052a815e3cc1e_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
514aec31edaff5d6678052a815e3cc1e_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
514aec31edaff5d6678052a815e3cc1e_JC.exe
-
Size
141KB
-
MD5
514aec31edaff5d6678052a815e3cc1e
-
SHA1
ea08753ab9ddec763fccf549a81c3289dda92ea8
-
SHA256
02c975960f62176c17304f49b21774bb4918733d8b3891387f30890a7242e0a3
-
SHA512
067b7a6f51b5cbd78619e7f639e90aa51198a8c75d115ab3772cf00796be22161852ab08edf4d68958378cc1214b04a25d0c2130910444f631b37727f14a23e8
-
SSDEEP
3072:n87qtlSRsSXyz5ffffqvFz2wQ9bGCmBJFWpoPSkGFj/p7sW0l:n5yaCvFz2N9bGCKJFtE/JK
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coegoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fneggdhg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqmmmmph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfiddm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caojpaij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjjkaabc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofkgcobj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Panhbfep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pccahbmn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahaceo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnafno32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nceefd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omnjojpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofmdio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahaceo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fneggdhg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpelhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocaebc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfiddm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bphgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caageq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnipbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlpfhe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmfkhmdi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omnjojpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnifekmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onmfimga.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnfiplog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnipbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlpfhe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bphgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boihcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gflhoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfaemp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnfiplog.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdhkcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhblllfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cggimh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gejopl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmfkhmdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfqlfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nceefd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpelhd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpgind32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njjdho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onmfimga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hipmfjee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnifekmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpqldc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnmopk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apmhiq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhphmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofkgcobj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnkbkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coegoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffnknafg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpnfge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljeafb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfaemp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjjkaabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apmhiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhphmj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmdcfidg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfgipd32.exe -
Executes dropped EXE 64 IoCs
pid Process 3048 Eppjfgcp.exe 2324 Fneggdhg.exe 2816 Ffnknafg.exe 1968 Fnipbc32.exe 2220 Ffceip32.exe 2328 Flpmagqi.exe 4964 Gpnfge32.exe 1820 Gejopl32.exe 1136 Gmdcfidg.exe 1432 Gflhoo32.exe 904 Gpelhd32.exe 1996 Gpgind32.exe 2264 Hipmfjee.exe 4164 Hlpfhe32.exe 1192 Hpnoncim.exe 4952 Hpqldc32.exe 3920 Hpchib32.exe 3076 Iliinc32.exe 380 Kcbfcigf.exe 2272 Llodgnja.exe 4960 Lfgipd32.exe 1904 Lqmmmmph.exe 4092 Ljeafb32.exe 3756 Lcnfohmi.exe 2160 Mmfkhmdi.exe 4124 Mjjkaabc.exe 1452 Mfqlfb32.exe 3232 Mcelpggq.exe 3940 Mcgiefen.exe 3252 Mjcngpjh.exe 4596 Nnafno32.exe 3332 Ngjkfd32.exe 1056 Njjdho32.exe 1008 Nfaemp32.exe 768 Nceefd32.exe 744 Omnjojpo.exe 4980 Onmfimga.exe 388 Ojdgnn32.exe 1028 Ofkgcobj.exe 4448 Ofmdio32.exe 3892 Ocaebc32.exe 2336 Pnfiplog.exe 2880 Pccahbmn.exe 2288 Pnifekmd.exe 1420 Pnkbkk32.exe 704 Pdhkcb32.exe 4456 Pnmopk32.exe 448 Pfiddm32.exe 3496 Panhbfep.exe 1332 Qhjmdp32.exe 4316 Aogbfi32.exe 2884 Adcjop32.exe 4928 Ahaceo32.exe 1224 Apmhiq32.exe 2500 Bphgeo32.exe 1316 Boihcf32.exe 820 Bhblllfo.exe 4748 Cggimh32.exe 1544 Caojpaij.exe 1464 Caageq32.exe 1172 Coegoe32.exe 1404 Cklhcfle.exe 4728 Dhphmj32.exe 4540 Dnmaea32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bkncfepb.dll Mmfkhmdi.exe File opened for modification C:\Windows\SysWOW64\Ocaebc32.exe Ofmdio32.exe File created C:\Windows\SysWOW64\Pnifekmd.exe Pccahbmn.exe File opened for modification C:\Windows\SysWOW64\Bphgeo32.exe Apmhiq32.exe File created C:\Windows\SysWOW64\Dkbnla32.dll Boihcf32.exe File created C:\Windows\SysWOW64\Fpejkd32.dll Gejopl32.exe File opened for modification C:\Windows\SysWOW64\Hpnoncim.exe Hlpfhe32.exe File opened for modification C:\Windows\SysWOW64\Mmfkhmdi.exe Lcnfohmi.exe File opened for modification C:\Windows\SysWOW64\Ojdgnn32.exe Onmfimga.exe File created C:\Windows\SysWOW64\Ofkgcobj.exe Ojdgnn32.exe File created C:\Windows\SysWOW64\Pnmopk32.exe Pdhkcb32.exe File created C:\Windows\SysWOW64\Ahbohd32.dll Flpmagqi.exe File created C:\Windows\SysWOW64\Gmdcfidg.exe Gejopl32.exe File created C:\Windows\SysWOW64\Dibkjmof.dll Gflhoo32.exe File opened for modification C:\Windows\SysWOW64\Hpqldc32.exe Hpnoncim.exe File created C:\Windows\SysWOW64\Ngjkfd32.exe Nnafno32.exe File opened for modification C:\Windows\SysWOW64\Nfaemp32.exe Njjdho32.exe File created C:\Windows\SysWOW64\Pccahbmn.exe Pnfiplog.exe File opened for modification C:\Windows\SysWOW64\Gpelhd32.exe Gflhoo32.exe File opened for modification C:\Windows\SysWOW64\Hlpfhe32.exe Hipmfjee.exe File created C:\Windows\SysWOW64\Llodgnja.exe Kcbfcigf.exe File created C:\Windows\SysWOW64\Gpkpbaea.dll Mfqlfb32.exe File opened for modification C:\Windows\SysWOW64\Njjdho32.exe Ngjkfd32.exe File opened for modification C:\Windows\SysWOW64\Adcjop32.exe Aogbfi32.exe File opened for modification C:\Windows\SysWOW64\Cggimh32.exe Bhblllfo.exe File created C:\Windows\SysWOW64\Cklhcfle.exe Coegoe32.exe File created C:\Windows\SysWOW64\Fneggdhg.exe Eppjfgcp.exe File opened for modification C:\Windows\SysWOW64\Ngjkfd32.exe Nnafno32.exe File created C:\Windows\SysWOW64\Dicdcemd.dll Nnafno32.exe File opened for modification C:\Windows\SysWOW64\Pnfiplog.exe Ocaebc32.exe File created C:\Windows\SysWOW64\Bhblllfo.exe Boihcf32.exe File created C:\Windows\SysWOW64\Mcdibc32.dll Caojpaij.exe File opened for modification C:\Windows\SysWOW64\Coegoe32.exe Caageq32.exe File created C:\Windows\SysWOW64\Ekppjn32.dll Cklhcfle.exe File created C:\Windows\SysWOW64\Pigbqakg.dll 514aec31edaff5d6678052a815e3cc1e_JC.exe File created C:\Windows\SysWOW64\Flpmagqi.exe Ffceip32.exe File created C:\Windows\SysWOW64\Dgmchiim.dll Gpnfge32.exe File opened for modification C:\Windows\SysWOW64\Caojpaij.exe Cggimh32.exe File opened for modification C:\Windows\SysWOW64\Fneggdhg.exe Eppjfgcp.exe File created C:\Windows\SysWOW64\Gpnfge32.exe Flpmagqi.exe File opened for modification C:\Windows\SysWOW64\Gpgind32.exe Gpelhd32.exe File created C:\Windows\SysWOW64\Afeknhab.dll Hlpfhe32.exe File created C:\Windows\SysWOW64\Jhpicj32.dll Nceefd32.exe File opened for modification C:\Windows\SysWOW64\Bhblllfo.exe Boihcf32.exe File created C:\Windows\SysWOW64\Dkqaoe32.exe Dnmaea32.exe File opened for modification C:\Windows\SysWOW64\Ffnknafg.exe Fneggdhg.exe File created C:\Windows\SysWOW64\Bjdlfi32.dll Fnipbc32.exe File created C:\Windows\SysWOW64\Gaagdbfm.dll Ofkgcobj.exe File created C:\Windows\SysWOW64\Pnkbkk32.exe Pnifekmd.exe File created C:\Windows\SysWOW64\Ilgonc32.dll Pnifekmd.exe File created C:\Windows\SysWOW64\Aogbfi32.exe Qhjmdp32.exe File opened for modification C:\Windows\SysWOW64\Lqmmmmph.exe Lfgipd32.exe File created C:\Windows\SysWOW64\Pfiddm32.exe Pnmopk32.exe File opened for modification C:\Windows\SysWOW64\Aogbfi32.exe Qhjmdp32.exe File created C:\Windows\SysWOW64\Dpaagldf.dll Fneggdhg.exe File created C:\Windows\SysWOW64\Pbegml32.dll Hpnoncim.exe File created C:\Windows\SysWOW64\Nfaemp32.exe Njjdho32.exe File opened for modification C:\Windows\SysWOW64\Cklhcfle.exe Coegoe32.exe File created C:\Windows\SysWOW64\Eeccjdie.dll Iliinc32.exe File created C:\Windows\SysWOW64\Mmfkhmdi.exe Lcnfohmi.exe File opened for modification C:\Windows\SysWOW64\Mcgiefen.exe Mcelpggq.exe File created C:\Windows\SysWOW64\Ogakfe32.dll Pdhkcb32.exe File created C:\Windows\SysWOW64\Liabph32.dll Kcbfcigf.exe File opened for modification C:\Windows\SysWOW64\Gejopl32.exe Gpnfge32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2844 4656 WerFault.exe 147 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhnjoi32.dll" Ffnknafg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdmlme32.dll" Mcelpggq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nceefd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnmaea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhpicj32.dll" Nceefd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkbnla32.dll" Boihcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Caageq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Biafno32.dll" Coegoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flpmagqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpnfge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmophg32.dll" Hpchib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iliinc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfqlfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgemej32.dll" Ngjkfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocaebc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhblllfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gflhoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gflhoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjjkaabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjcngpjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogakfe32.dll" Pdhkcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pnmopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgeaknci.dll" Ahaceo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjdlfi32.dll" Fnipbc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljeafb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhdbgapf.dll" Pnfiplog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eehmok32.dll" Panhbfep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcgmgn32.dll" Pnkbkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffnknafg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahbohd32.dll" Flpmagqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gpnfge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpgind32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqhfnd32.dll" Hpqldc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjjkaabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gadiippo.dll" Ofmdio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aogbfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcbfcigf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilgonc32.dll" Pnifekmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahaceo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfaemp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gmdcfidg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmdcfidg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpqldc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llodgnja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojnkocdc.dll" Mjjkaabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpkpbaea.dll" Mfqlfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obqhpfck.dll" Mcgiefen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qhjmdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcdibc32.dll" Caojpaij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oclknk32.dll" Ffceip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njjdho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmbjqfjb.dll" Nfaemp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Panhbfep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Caojpaij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 514aec31edaff5d6678052a815e3cc1e_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iophfi32.dll" Gpgind32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lqmmmmph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fidhnlin.dll" Pccahbmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfiddm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adcjop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bphgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anoipp32.dll" Lfgipd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnafno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocaebc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3048 4268 514aec31edaff5d6678052a815e3cc1e_JC.exe 83 PID 4268 wrote to memory of 3048 4268 514aec31edaff5d6678052a815e3cc1e_JC.exe 83 PID 4268 wrote to memory of 3048 4268 514aec31edaff5d6678052a815e3cc1e_JC.exe 83 PID 3048 wrote to memory of 2324 3048 Eppjfgcp.exe 84 PID 3048 wrote to memory of 2324 3048 Eppjfgcp.exe 84 PID 3048 wrote to memory of 2324 3048 Eppjfgcp.exe 84 PID 2324 wrote to memory of 2816 2324 Fneggdhg.exe 85 PID 2324 wrote to memory of 2816 2324 Fneggdhg.exe 85 PID 2324 wrote to memory of 2816 2324 Fneggdhg.exe 85 PID 2816 wrote to memory of 1968 2816 Ffnknafg.exe 86 PID 2816 wrote to memory of 1968 2816 Ffnknafg.exe 86 PID 2816 wrote to memory of 1968 2816 Ffnknafg.exe 86 PID 1968 wrote to memory of 2220 1968 Fnipbc32.exe 87 PID 1968 wrote to memory of 2220 1968 Fnipbc32.exe 87 PID 1968 wrote to memory of 2220 1968 Fnipbc32.exe 87 PID 2220 wrote to memory of 2328 2220 Ffceip32.exe 88 PID 2220 wrote to memory of 2328 2220 Ffceip32.exe 88 PID 2220 wrote to memory of 2328 2220 Ffceip32.exe 88 PID 2328 wrote to memory of 4964 2328 Flpmagqi.exe 89 PID 2328 wrote to memory of 4964 2328 Flpmagqi.exe 89 PID 2328 wrote to memory of 4964 2328 Flpmagqi.exe 89 PID 4964 wrote to memory of 1820 4964 Gpnfge32.exe 90 PID 4964 wrote to memory of 1820 4964 Gpnfge32.exe 90 PID 4964 wrote to memory of 1820 4964 Gpnfge32.exe 90 PID 1820 wrote to memory of 1136 1820 Gejopl32.exe 91 PID 1820 wrote to memory of 1136 1820 Gejopl32.exe 91 PID 1820 wrote to memory of 1136 1820 Gejopl32.exe 91 PID 1136 wrote to memory of 1432 1136 Gmdcfidg.exe 92 PID 1136 wrote to memory of 1432 1136 Gmdcfidg.exe 92 PID 1136 wrote to memory of 1432 1136 Gmdcfidg.exe 92 PID 1432 wrote to memory of 904 1432 Gflhoo32.exe 93 PID 1432 wrote to memory of 904 1432 Gflhoo32.exe 93 PID 1432 wrote to memory of 904 1432 Gflhoo32.exe 93 PID 904 wrote to memory of 1996 904 Gpelhd32.exe 94 PID 904 wrote to memory of 1996 904 Gpelhd32.exe 94 PID 904 wrote to memory of 1996 904 Gpelhd32.exe 94 PID 1996 wrote to memory of 2264 1996 Gpgind32.exe 95 PID 1996 wrote to memory of 2264 1996 Gpgind32.exe 95 PID 1996 wrote to memory of 2264 1996 Gpgind32.exe 95 PID 2264 wrote to memory of 4164 2264 Hipmfjee.exe 96 PID 2264 wrote to memory of 4164 2264 Hipmfjee.exe 96 PID 2264 wrote to memory of 4164 2264 Hipmfjee.exe 96 PID 4164 wrote to memory of 1192 4164 Hlpfhe32.exe 97 PID 4164 wrote to memory of 1192 4164 Hlpfhe32.exe 97 PID 4164 wrote to memory of 1192 4164 Hlpfhe32.exe 97 PID 1192 wrote to memory of 4952 1192 Hpnoncim.exe 98 PID 1192 wrote to memory of 4952 1192 Hpnoncim.exe 98 PID 1192 wrote to memory of 4952 1192 Hpnoncim.exe 98 PID 4952 wrote to memory of 3920 4952 Hpqldc32.exe 99 PID 4952 wrote to memory of 3920 4952 Hpqldc32.exe 99 PID 4952 wrote to memory of 3920 4952 Hpqldc32.exe 99 PID 3920 wrote to memory of 3076 3920 Hpchib32.exe 100 PID 3920 wrote to memory of 3076 3920 Hpchib32.exe 100 PID 3920 wrote to memory of 3076 3920 Hpchib32.exe 100 PID 3076 wrote to memory of 380 3076 Iliinc32.exe 101 PID 3076 wrote to memory of 380 3076 Iliinc32.exe 101 PID 3076 wrote to memory of 380 3076 Iliinc32.exe 101 PID 380 wrote to memory of 2272 380 Kcbfcigf.exe 102 PID 380 wrote to memory of 2272 380 Kcbfcigf.exe 102 PID 380 wrote to memory of 2272 380 Kcbfcigf.exe 102 PID 2272 wrote to memory of 4960 2272 Llodgnja.exe 103 PID 2272 wrote to memory of 4960 2272 Llodgnja.exe 103 PID 2272 wrote to memory of 4960 2272 Llodgnja.exe 103 PID 4960 wrote to memory of 1904 4960 Lfgipd32.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\514aec31edaff5d6678052a815e3cc1e_JC.exe"C:\Users\Admin\AppData\Local\Temp\514aec31edaff5d6678052a815e3cc1e_JC.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\Eppjfgcp.exeC:\Windows\system32\Eppjfgcp.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Fneggdhg.exeC:\Windows\system32\Fneggdhg.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\Ffnknafg.exeC:\Windows\system32\Ffnknafg.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Fnipbc32.exeC:\Windows\system32\Fnipbc32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\Ffceip32.exeC:\Windows\system32\Ffceip32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Flpmagqi.exeC:\Windows\system32\Flpmagqi.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Gpnfge32.exeC:\Windows\system32\Gpnfge32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\Gejopl32.exeC:\Windows\system32\Gejopl32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\Gmdcfidg.exeC:\Windows\system32\Gmdcfidg.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\Gflhoo32.exeC:\Windows\system32\Gflhoo32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\Gpelhd32.exeC:\Windows\system32\Gpelhd32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\Gpgind32.exeC:\Windows\system32\Gpgind32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\Hipmfjee.exeC:\Windows\system32\Hipmfjee.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Hlpfhe32.exeC:\Windows\system32\Hlpfhe32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\Hpnoncim.exeC:\Windows\system32\Hpnoncim.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\Hpqldc32.exeC:\Windows\system32\Hpqldc32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\Hpchib32.exeC:\Windows\system32\Hpchib32.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\Iliinc32.exeC:\Windows\system32\Iliinc32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\Kcbfcigf.exeC:\Windows\system32\Kcbfcigf.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\Llodgnja.exeC:\Windows\system32\Llodgnja.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\Lfgipd32.exeC:\Windows\system32\Lfgipd32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Lqmmmmph.exeC:\Windows\system32\Lqmmmmph.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1904 -
C:\Windows\SysWOW64\Ljeafb32.exeC:\Windows\system32\Ljeafb32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lcnfohmi.exeC:\Windows\system32\Lcnfohmi.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3756 -
C:\Windows\SysWOW64\Mmfkhmdi.exeC:\Windows\system32\Mmfkhmdi.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\Mjjkaabc.exeC:\Windows\system32\Mjjkaabc.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4124
-
-
-
C:\Windows\SysWOW64\Mfqlfb32.exeC:\Windows\system32\Mfqlfb32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1452 -
C:\Windows\SysWOW64\Mcelpggq.exeC:\Windows\system32\Mcelpggq.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\Mcgiefen.exeC:\Windows\system32\Mcgiefen.exe3⤵
- Executes dropped EXE
- Modifies registry class
PID:3940 -
C:\Windows\SysWOW64\Mjcngpjh.exeC:\Windows\system32\Mjcngpjh.exe4⤵
- Executes dropped EXE
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\Nnafno32.exeC:\Windows\system32\Nnafno32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4596 -
C:\Windows\SysWOW64\Ngjkfd32.exeC:\Windows\system32\Ngjkfd32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3332 -
C:\Windows\SysWOW64\Njjdho32.exeC:\Windows\system32\Njjdho32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Nfaemp32.exeC:\Windows\system32\Nfaemp32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1008 -
C:\Windows\SysWOW64\Nceefd32.exeC:\Windows\system32\Nceefd32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:768 -
C:\Windows\SysWOW64\Omnjojpo.exeC:\Windows\system32\Omnjojpo.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\Onmfimga.exeC:\Windows\system32\Onmfimga.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4980 -
C:\Windows\SysWOW64\Ojdgnn32.exeC:\Windows\system32\Ojdgnn32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:388 -
C:\Windows\SysWOW64\Ofkgcobj.exeC:\Windows\system32\Ofkgcobj.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1028 -
C:\Windows\SysWOW64\Ofmdio32.exeC:\Windows\system32\Ofmdio32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\Ocaebc32.exeC:\Windows\system32\Ocaebc32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3892 -
C:\Windows\SysWOW64\Pnfiplog.exeC:\Windows\system32\Pnfiplog.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2336 -
C:\Windows\SysWOW64\Pccahbmn.exeC:\Windows\system32\Pccahbmn.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Pnifekmd.exeC:\Windows\system32\Pnifekmd.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Pnkbkk32.exeC:\Windows\system32\Pnkbkk32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1420 -
C:\Windows\SysWOW64\Pdhkcb32.exeC:\Windows\system32\Pdhkcb32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:704 -
C:\Windows\SysWOW64\Pnmopk32.exeC:\Windows\system32\Pnmopk32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4456 -
C:\Windows\SysWOW64\Pfiddm32.exeC:\Windows\system32\Pfiddm32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:448 -
C:\Windows\SysWOW64\Panhbfep.exeC:\Windows\system32\Panhbfep.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3496 -
C:\Windows\SysWOW64\Qhjmdp32.exeC:\Windows\system32\Qhjmdp32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1332 -
C:\Windows\SysWOW64\Aogbfi32.exeC:\Windows\system32\Aogbfi32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4316 -
C:\Windows\SysWOW64\Adcjop32.exeC:\Windows\system32\Adcjop32.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Ahaceo32.exeC:\Windows\system32\Ahaceo32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4928 -
C:\Windows\SysWOW64\Apmhiq32.exeC:\Windows\system32\Apmhiq32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\Bphgeo32.exeC:\Windows\system32\Bphgeo32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2500 -
C:\Windows\SysWOW64\Boihcf32.exeC:\Windows\system32\Boihcf32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1316 -
C:\Windows\SysWOW64\Bhblllfo.exeC:\Windows\system32\Bhblllfo.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:820 -
C:\Windows\SysWOW64\Cggimh32.exeC:\Windows\system32\Cggimh32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4748 -
C:\Windows\SysWOW64\Caojpaij.exeC:\Windows\system32\Caojpaij.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1544 -
C:\Windows\SysWOW64\Caageq32.exeC:\Windows\system32\Caageq32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1464 -
C:\Windows\SysWOW64\Coegoe32.exeC:\Windows\system32\Coegoe32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1172 -
C:\Windows\SysWOW64\Cklhcfle.exeC:\Windows\system32\Cklhcfle.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1404 -
C:\Windows\SysWOW64\Dhphmj32.exeC:\Windows\system32\Dhphmj32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\Dnmaea32.exeC:\Windows\system32\Dnmaea32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4540 -
C:\Windows\SysWOW64\Dkqaoe32.exeC:\Windows\system32\Dkqaoe32.exe39⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 41640⤵
- Program crash
PID:2844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4656 -ip 46561⤵PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD550393f914ae7fe92676afcb40d77d0b4
SHA110d592a7678e4d108eaf50570f3050bc2b49c09b
SHA25643629c8a7daf34516a2ef24ac220846d2a7f40ded9d744412d0c0dfd5009e28c
SHA512b5fd37bb78cc59f17e7f893ea392d7792349d81e25254065008c1ce175cc0749838982d14f5c2971358b9d816a2bf54ffe187dc880078bf8a379f9de8f3309c4
-
Filesize
141KB
MD565aaf1706787c3f865fcec4a3603657a
SHA1f340e9e6f47b90b8d73dcc40957a9d88282a204e
SHA256f9442e519f921a8c307231de0c5948fa9bed3ce7ca040ec147016c1a7c30a5db
SHA512405d3fcd79ab15ec6e3a22d268c8023b0edb4e59ef3348b4b32349df1af86a1127f15da3786e4f4b28fb1df72774b8a21f60c3ae0f222581f2ffd7bbd5f67eef
-
Filesize
141KB
MD571d6791ae1f874f30421530815c90249
SHA1c4b4a6f8f75270bad4423b7a7ade96185f4a4e81
SHA2569eda66149b22564684a3b2f14a08987abe1dcfc8feb8326db293a6fdbf898a3b
SHA512001c190dacf90fa84f5b7912daf4448acb56a5ac01ce01be1396c81315f8847afe6b39ce5a2a757b724e42d25ee2845b7dcfca3128384d25e70f21e641452456
-
Filesize
141KB
MD5aac11c3760d8251ffbd24242d878088c
SHA1bbebe7e2881e961e7f364c46121d8237d2832f8e
SHA256d5fa87c1ac8642f526f148554917862065e5800f2a7ba68ae25aff5ad9a8ed82
SHA5124d0e68ae69912bd763a874fda20c22cad9c2d3ee9d0653f4e0e94044212c5624ca25d1981e0f7dd8c99f0d1bcb99234c94d364bb1aa935a685f25f8eef99e0a8
-
Filesize
141KB
MD53b5f748a748a339f260d8b6f57a8085b
SHA16f13fb4ea4d4631d0c6934382e2ad4333ee60398
SHA256661bed188c979b2308fd92e0701cfb8b2df5815291b4e53f7ebb1577f32e3d3c
SHA512fe2464c5d2c362f36fe8c3bd454542e31b6963551716c8650954890d831c87433fe4eced86892c953582fed24089821b8f768753a569018c6181780abc8ef321
-
Filesize
141KB
MD54aeb62562bcd2dad8ac5d00e4217d8af
SHA1a6f1e4bf9a891206345c480edd737af527ea5ecf
SHA256dad85b939451b860894943d2915df24bbbd35e68204920ff393fdfab0cb5fc4c
SHA512a26b1891f71201f7cce7ea149bc3fb7dd061497d084c967b946f14d0681c9566d8937d9d28ae1cec0bf2ff0993ff30f1104b47854ef8006cf0ce7164ee85caf7
-
Filesize
141KB
MD54aeb62562bcd2dad8ac5d00e4217d8af
SHA1a6f1e4bf9a891206345c480edd737af527ea5ecf
SHA256dad85b939451b860894943d2915df24bbbd35e68204920ff393fdfab0cb5fc4c
SHA512a26b1891f71201f7cce7ea149bc3fb7dd061497d084c967b946f14d0681c9566d8937d9d28ae1cec0bf2ff0993ff30f1104b47854ef8006cf0ce7164ee85caf7
-
Filesize
141KB
MD5683005c7e4f429a82743afe0ca0068fe
SHA1b7c06aa1f8ed4bb6856c91d7f960d4ced6991689
SHA2560880e6a2c06f59aeb983b909d16214781151191419a22d82e9fa961682cd8942
SHA51214a3727503fdc03e63188643112d9046029c5356156ad3e1b606fbd947d5b893b3bf2f60886043810a999b6b45ea2b988cc9a0960a5dc602f1ba3a2ceeb084b7
-
Filesize
141KB
MD5683005c7e4f429a82743afe0ca0068fe
SHA1b7c06aa1f8ed4bb6856c91d7f960d4ced6991689
SHA2560880e6a2c06f59aeb983b909d16214781151191419a22d82e9fa961682cd8942
SHA51214a3727503fdc03e63188643112d9046029c5356156ad3e1b606fbd947d5b893b3bf2f60886043810a999b6b45ea2b988cc9a0960a5dc602f1ba3a2ceeb084b7
-
Filesize
141KB
MD5d22e90970f31e2cf359f7abaf5b042f6
SHA1b3f4da2ea74c503f48fbff9901fc2b7c8af11eae
SHA256ae78570d0f4652f236e1adcb59c8f2644b455279baeb824693cef8c52232604b
SHA512c4363f90fdc5a3193f5136252b668788356fd6d443e2ed22611073be176c80c68354ad449e7d8358dbd84c79a121445cadc045fc604508ff4c2f8f51bff99bef
-
Filesize
141KB
MD5d22e90970f31e2cf359f7abaf5b042f6
SHA1b3f4da2ea74c503f48fbff9901fc2b7c8af11eae
SHA256ae78570d0f4652f236e1adcb59c8f2644b455279baeb824693cef8c52232604b
SHA512c4363f90fdc5a3193f5136252b668788356fd6d443e2ed22611073be176c80c68354ad449e7d8358dbd84c79a121445cadc045fc604508ff4c2f8f51bff99bef
-
Filesize
141KB
MD5044a589de43bb05c77e1bf6d17cc0c90
SHA18ae563040ab862e2ea3989bdb6b89296e51713ee
SHA256a0ef3da46f86cc382a34dece0ace56a230041cd7f2cece06016deb5e677febda
SHA512684e28a04bf171967b410acaf138b763f85a2384683ef237873288c1793a4c29243c5060643db7d261c826fb70655ce70cc563e6f30cd402ce45679235a65efa
-
Filesize
141KB
MD5044a589de43bb05c77e1bf6d17cc0c90
SHA18ae563040ab862e2ea3989bdb6b89296e51713ee
SHA256a0ef3da46f86cc382a34dece0ace56a230041cd7f2cece06016deb5e677febda
SHA512684e28a04bf171967b410acaf138b763f85a2384683ef237873288c1793a4c29243c5060643db7d261c826fb70655ce70cc563e6f30cd402ce45679235a65efa
-
Filesize
141KB
MD5e57c399a6608cb02be31ad22ec51e4aa
SHA1d8caf0b94ea559b7d6740ba93b6bcd6b2f11dfb4
SHA256f281750e2e0033793fb9bd4aee56c9ee144c88ad9203f494a10268036d44d9f9
SHA5129698826ef3438f6ed09b6e84fcfe0c3ec73a02411f635144eeef267cf769d13ac8cb715360f3c54868bccc94af64ba6313ff68e9b4bf9b57845fa85eb5d0c494
-
Filesize
141KB
MD5e57c399a6608cb02be31ad22ec51e4aa
SHA1d8caf0b94ea559b7d6740ba93b6bcd6b2f11dfb4
SHA256f281750e2e0033793fb9bd4aee56c9ee144c88ad9203f494a10268036d44d9f9
SHA5129698826ef3438f6ed09b6e84fcfe0c3ec73a02411f635144eeef267cf769d13ac8cb715360f3c54868bccc94af64ba6313ff68e9b4bf9b57845fa85eb5d0c494
-
Filesize
141KB
MD5f603fbe5c8c0fe18b66edd1d62c7019d
SHA1314a68b953ec89ec45c296aa551ea7a2c01bbb79
SHA25615f3a935ada9f3ed6bc6ec6212bc3b9e8bae23391810acb4f4287ddb3a0ba67f
SHA5120cb81ebd4e623fbcea0d3c784fc45822c2faba8da476fd64821cda3535c5addbcc8df9a54a77de48c8bdf0f4662a360a2f6e79e4b1025b702193191bf16d42c9
-
Filesize
141KB
MD5f603fbe5c8c0fe18b66edd1d62c7019d
SHA1314a68b953ec89ec45c296aa551ea7a2c01bbb79
SHA25615f3a935ada9f3ed6bc6ec6212bc3b9e8bae23391810acb4f4287ddb3a0ba67f
SHA5120cb81ebd4e623fbcea0d3c784fc45822c2faba8da476fd64821cda3535c5addbcc8df9a54a77de48c8bdf0f4662a360a2f6e79e4b1025b702193191bf16d42c9
-
Filesize
141KB
MD55dc12bf588bb1abd10a5226b30756f23
SHA160482549f687df2753028a0d62cf72e3d51405e7
SHA256ccb1875ddca03e49db322abe5332e7bbe6e3b1d30592bf43bf7591db55a7b2c1
SHA512802dbc7d234322c9b9fcacfa1cce5f7e8e3d64dcac156ef5db0dbf9b239856695f3444bcaaae582c2532aa1122fd4d0724896fdcdeb09f917f115a83ebd0dbec
-
Filesize
141KB
MD55dc12bf588bb1abd10a5226b30756f23
SHA160482549f687df2753028a0d62cf72e3d51405e7
SHA256ccb1875ddca03e49db322abe5332e7bbe6e3b1d30592bf43bf7591db55a7b2c1
SHA512802dbc7d234322c9b9fcacfa1cce5f7e8e3d64dcac156ef5db0dbf9b239856695f3444bcaaae582c2532aa1122fd4d0724896fdcdeb09f917f115a83ebd0dbec
-
Filesize
141KB
MD57c66165282dfada42030539215ba3f31
SHA11a6949c29d08c33485c66c86fd1884381b096e69
SHA2569082f892ab95a79bf6f4b465bb0e89729a8f92283b21d39a5d6f0673c434afaf
SHA512cf86ab4ba0ed7523e7b3dbacf632e4f92277474ca0c9fe562f3d4b7afa93e237491f57a6b43a7295b740f451c214c229c86329c85a4d17377a6213359b04b7a7
-
Filesize
141KB
MD57c66165282dfada42030539215ba3f31
SHA11a6949c29d08c33485c66c86fd1884381b096e69
SHA2569082f892ab95a79bf6f4b465bb0e89729a8f92283b21d39a5d6f0673c434afaf
SHA512cf86ab4ba0ed7523e7b3dbacf632e4f92277474ca0c9fe562f3d4b7afa93e237491f57a6b43a7295b740f451c214c229c86329c85a4d17377a6213359b04b7a7
-
Filesize
141KB
MD5db6c1ade595a79df18c9de9d30c32c4c
SHA16e9e509ff737b15da16376513f163f5cdbda4a62
SHA256efeedb20b085288a6ddc1529ea161bc7c074e52c3b4070a0cb07dfc41eb4cc4d
SHA5123eda99c6572f0e761180591fd3f4a7f0e4aebc86d53e6b04489af14c042b85b050c0afbc889c242187a0cf7b3d432713675c18b01a29d391f550182f2c574385
-
Filesize
141KB
MD5db6c1ade595a79df18c9de9d30c32c4c
SHA16e9e509ff737b15da16376513f163f5cdbda4a62
SHA256efeedb20b085288a6ddc1529ea161bc7c074e52c3b4070a0cb07dfc41eb4cc4d
SHA5123eda99c6572f0e761180591fd3f4a7f0e4aebc86d53e6b04489af14c042b85b050c0afbc889c242187a0cf7b3d432713675c18b01a29d391f550182f2c574385
-
Filesize
141KB
MD57a7d99e7c7123b7c57070566f8041357
SHA1d0934b7d73945bb7d53a65cd0ecbe670a0d877e3
SHA256edffa3a5590f2e204ab44bc076b6f7bdb9a2f08d514038339de4e4155066b247
SHA512c2319f47cfc09f559c9ce4d297001eca57b10a9c964cbc52bb8f504501688a2a95a242ee01ebe32537e4e4c38804a2e224bbe17207d6989552408445e90c5080
-
Filesize
141KB
MD57a7d99e7c7123b7c57070566f8041357
SHA1d0934b7d73945bb7d53a65cd0ecbe670a0d877e3
SHA256edffa3a5590f2e204ab44bc076b6f7bdb9a2f08d514038339de4e4155066b247
SHA512c2319f47cfc09f559c9ce4d297001eca57b10a9c964cbc52bb8f504501688a2a95a242ee01ebe32537e4e4c38804a2e224bbe17207d6989552408445e90c5080
-
Filesize
141KB
MD5fa75897daefe291587f195def7e21846
SHA1bc5aca102b3b5b6dd7afbfd0883b639ae2f2f76d
SHA2567a9395ff2cddbc4bdbb455af1ad88ce4a01a8bb695f2ad85ddd48a04ab13808b
SHA512c7cae0ef1841d9a10581e74b5804171999581683cd162ffc501a9cd3e6109ec7b83a80a8b7de3e69de27cfd78ae03fb37e1c25ec300b0b6ac7834067a55327f4
-
Filesize
141KB
MD5fa75897daefe291587f195def7e21846
SHA1bc5aca102b3b5b6dd7afbfd0883b639ae2f2f76d
SHA2567a9395ff2cddbc4bdbb455af1ad88ce4a01a8bb695f2ad85ddd48a04ab13808b
SHA512c7cae0ef1841d9a10581e74b5804171999581683cd162ffc501a9cd3e6109ec7b83a80a8b7de3e69de27cfd78ae03fb37e1c25ec300b0b6ac7834067a55327f4
-
Filesize
141KB
MD56f2ff2de26ce6a456b115864cd434135
SHA18c1f706ad3c9f76550ac462f1cbfd11f34977c08
SHA256b076e494303ff0b76c646b4422839c00ad10fa08de6133c8e3bc4c005e1f674c
SHA512ff664b99e86386e3570f5d61bbe9ad744517278ea9c2632c4bbb46443defc536bba5e9356ae44453f07f257c1b3edb313940f6fb3e997a6e7ad85de23319e75f
-
Filesize
141KB
MD56f2ff2de26ce6a456b115864cd434135
SHA18c1f706ad3c9f76550ac462f1cbfd11f34977c08
SHA256b076e494303ff0b76c646b4422839c00ad10fa08de6133c8e3bc4c005e1f674c
SHA512ff664b99e86386e3570f5d61bbe9ad744517278ea9c2632c4bbb46443defc536bba5e9356ae44453f07f257c1b3edb313940f6fb3e997a6e7ad85de23319e75f
-
Filesize
141KB
MD5c4ca22816ed634ea46fbdba6da8d4326
SHA187ebe427c3ebbc530b987dfd3a38e506dfc2bfa7
SHA2562b2c7b042d3c653ca691ce7a9ef7cd420aa5337f8bd9708a5225e57672bd3e62
SHA5127e134c58e6f035a29d7ff03de05b067f96df5fe0c6f6d99b0edba9362bca377025baeebc3bce85ad6dd459e523b44815b0bab7f16bc11ca0666a811ad950276f
-
Filesize
141KB
MD5c4ca22816ed634ea46fbdba6da8d4326
SHA187ebe427c3ebbc530b987dfd3a38e506dfc2bfa7
SHA2562b2c7b042d3c653ca691ce7a9ef7cd420aa5337f8bd9708a5225e57672bd3e62
SHA5127e134c58e6f035a29d7ff03de05b067f96df5fe0c6f6d99b0edba9362bca377025baeebc3bce85ad6dd459e523b44815b0bab7f16bc11ca0666a811ad950276f
-
Filesize
141KB
MD550bc717bba7fdb11cab11409727e8082
SHA1699a925afcbc982cb1be3141ebf5558ca711533f
SHA25644d4b41b55c56101dc46a6c4b306f32c13a47bf25136bf8ea41328268577ab52
SHA512090ee8b596d686e0d14a5e01747bc6fa21d58a397ac458cab00288cb80301b0dcb4e5adc0df2e023b297eded006fe8ebf366d774d95acac871b8d1ece8171e2a
-
Filesize
141KB
MD550bc717bba7fdb11cab11409727e8082
SHA1699a925afcbc982cb1be3141ebf5558ca711533f
SHA25644d4b41b55c56101dc46a6c4b306f32c13a47bf25136bf8ea41328268577ab52
SHA512090ee8b596d686e0d14a5e01747bc6fa21d58a397ac458cab00288cb80301b0dcb4e5adc0df2e023b297eded006fe8ebf366d774d95acac871b8d1ece8171e2a
-
Filesize
141KB
MD56abeb2ab27f20e230046e592ba4cc805
SHA1a1d0b793fa9604da3bdd0e269d84ba53bb7a25ab
SHA256ac645e416bacfbf8024e103754086fd75c8f4715f131071e3339a66f5b1ca4f0
SHA512f192e320169087863e6517252e6ba4de930ce469024d3443b4d95e0101efc2597edc5dce6e385b37db7009e26a1f04ba02f7f9fdd06c3bc91954fef63623d1ae
-
Filesize
141KB
MD56abeb2ab27f20e230046e592ba4cc805
SHA1a1d0b793fa9604da3bdd0e269d84ba53bb7a25ab
SHA256ac645e416bacfbf8024e103754086fd75c8f4715f131071e3339a66f5b1ca4f0
SHA512f192e320169087863e6517252e6ba4de930ce469024d3443b4d95e0101efc2597edc5dce6e385b37db7009e26a1f04ba02f7f9fdd06c3bc91954fef63623d1ae
-
Filesize
141KB
MD5f48abb860d4b0bdc98467cce7e202487
SHA184a2bb3a3d759340ef6e36479baa106a8828bae7
SHA2568acc97adb36741da96ac175aff605cf971a573f8849d0226e237ad70e0d6c1d0
SHA5127d900821335e5fba6b318cd6bdc8699adfceb42486c0e7d29c3aabfd820f8b1c21f1d4f5a291721a3835797e6005a8486bc723ee1caeb62758b43d47baa90a7d
-
Filesize
141KB
MD5f48abb860d4b0bdc98467cce7e202487
SHA184a2bb3a3d759340ef6e36479baa106a8828bae7
SHA2568acc97adb36741da96ac175aff605cf971a573f8849d0226e237ad70e0d6c1d0
SHA5127d900821335e5fba6b318cd6bdc8699adfceb42486c0e7d29c3aabfd820f8b1c21f1d4f5a291721a3835797e6005a8486bc723ee1caeb62758b43d47baa90a7d
-
Filesize
141KB
MD593bfb9f6201901d5434b14dfdc11c90e
SHA158ae93f790dc422438c3c85085e4e08814f93b9e
SHA256bb4fc84ab3e3e3f6fa2161538cc997d5bd64428005b67c18f83a77c726735015
SHA512e8f1cfeabc2cba74499f84cc6074e8fa1362dafdf4befbbd2225eca0b027e6ad454fa5b8fac614b0811bf6f3b80a77d0a2ec9ee3fd32e3a61cb75fb8ffe5ea3c
-
Filesize
141KB
MD593bfb9f6201901d5434b14dfdc11c90e
SHA158ae93f790dc422438c3c85085e4e08814f93b9e
SHA256bb4fc84ab3e3e3f6fa2161538cc997d5bd64428005b67c18f83a77c726735015
SHA512e8f1cfeabc2cba74499f84cc6074e8fa1362dafdf4befbbd2225eca0b027e6ad454fa5b8fac614b0811bf6f3b80a77d0a2ec9ee3fd32e3a61cb75fb8ffe5ea3c
-
Filesize
141KB
MD593bfb9f6201901d5434b14dfdc11c90e
SHA158ae93f790dc422438c3c85085e4e08814f93b9e
SHA256bb4fc84ab3e3e3f6fa2161538cc997d5bd64428005b67c18f83a77c726735015
SHA512e8f1cfeabc2cba74499f84cc6074e8fa1362dafdf4befbbd2225eca0b027e6ad454fa5b8fac614b0811bf6f3b80a77d0a2ec9ee3fd32e3a61cb75fb8ffe5ea3c
-
Filesize
141KB
MD5c7e6274d511d962a5ec806d7986c930b
SHA1345bedc70ca01978a670affbd8df4329021204c6
SHA2560af349a2e2e40f75b2f2de5f6b005de74b4af88c53e8ded4eeeae664db5103f3
SHA512e1b315f8e56c17051a6a981be0928780fdb191149c5cc9596f131a3468c26ece8d12a8cf41d575034eaba58c4317ff7635c138834b0633232e64282c90e4ce67
-
Filesize
141KB
MD5c7e6274d511d962a5ec806d7986c930b
SHA1345bedc70ca01978a670affbd8df4329021204c6
SHA2560af349a2e2e40f75b2f2de5f6b005de74b4af88c53e8ded4eeeae664db5103f3
SHA512e1b315f8e56c17051a6a981be0928780fdb191149c5cc9596f131a3468c26ece8d12a8cf41d575034eaba58c4317ff7635c138834b0633232e64282c90e4ce67
-
Filesize
141KB
MD516ffc1c7bd8c879f16b62475ec76e65b
SHA1b74dd53ab20555c95b413df1a384d9afd9bcc760
SHA256aa7ec96129dc2c90fc56f290c8fd749dff77d00534454d54bc842abc2dc92476
SHA5120cfd2d7483b8b58320e175486fe671c303cac008023fb08cd36952c1069355a8b4141d863bd552301a6c0d946580dac80c1c147cab05a7b18d5e7d9b16483201
-
Filesize
141KB
MD516ffc1c7bd8c879f16b62475ec76e65b
SHA1b74dd53ab20555c95b413df1a384d9afd9bcc760
SHA256aa7ec96129dc2c90fc56f290c8fd749dff77d00534454d54bc842abc2dc92476
SHA5120cfd2d7483b8b58320e175486fe671c303cac008023fb08cd36952c1069355a8b4141d863bd552301a6c0d946580dac80c1c147cab05a7b18d5e7d9b16483201
-
Filesize
141KB
MD516ffc1c7bd8c879f16b62475ec76e65b
SHA1b74dd53ab20555c95b413df1a384d9afd9bcc760
SHA256aa7ec96129dc2c90fc56f290c8fd749dff77d00534454d54bc842abc2dc92476
SHA5120cfd2d7483b8b58320e175486fe671c303cac008023fb08cd36952c1069355a8b4141d863bd552301a6c0d946580dac80c1c147cab05a7b18d5e7d9b16483201
-
Filesize
141KB
MD5696c97fb85509ae8a86282e994a8d340
SHA1957486449812bcee55388804b4782299d10f0c0c
SHA256739e35724b5432aa464b95ecb2421491fcabd0cf878b767233a3be3ab8cb6ed6
SHA512b19f79cb94e1ac25d941a1812665c51e94e6761c1cc1bbdb32860db8cb769b5d18122e78aef089f3ac54c91419d244ead6181a7164aad51e2d98a70a68ba4004
-
Filesize
141KB
MD5696c97fb85509ae8a86282e994a8d340
SHA1957486449812bcee55388804b4782299d10f0c0c
SHA256739e35724b5432aa464b95ecb2421491fcabd0cf878b767233a3be3ab8cb6ed6
SHA512b19f79cb94e1ac25d941a1812665c51e94e6761c1cc1bbdb32860db8cb769b5d18122e78aef089f3ac54c91419d244ead6181a7164aad51e2d98a70a68ba4004
-
Filesize
141KB
MD54fd798111f51b0ba83d757c86ec8e7a2
SHA159b43d727e8ba4185da99900ad0fa0413ca6d639
SHA256586de3d813aac20af0acad72144ff70089c4d49106e8d33b6f89843a1fc597bf
SHA5122c084e3367f2f94acd89321c2d6020253fa1acac440d2da47450ff448139b8cb75e89475dccb9ffb720e395bd31100d20eeb4b555639135184235c5a1f7b6d50
-
Filesize
141KB
MD54fd798111f51b0ba83d757c86ec8e7a2
SHA159b43d727e8ba4185da99900ad0fa0413ca6d639
SHA256586de3d813aac20af0acad72144ff70089c4d49106e8d33b6f89843a1fc597bf
SHA5122c084e3367f2f94acd89321c2d6020253fa1acac440d2da47450ff448139b8cb75e89475dccb9ffb720e395bd31100d20eeb4b555639135184235c5a1f7b6d50
-
Filesize
141KB
MD532d95975733ea2ff8da117b8588bc205
SHA175cc07ac84761bd6c7d8ab7559e6e5c805db12ec
SHA25645e35bd4c0bc2bdfd2b683af32526c4433b0b382857fdfb05fbf333ced7306a3
SHA512b58d589f4c32e34c1598629ec485b56185d9a91738ace9984639ec312f02c400c4adfe02a2e32eda7d561b736b83b6baeaff25aa79f947674c21623cdb906113
-
Filesize
141KB
MD532d95975733ea2ff8da117b8588bc205
SHA175cc07ac84761bd6c7d8ab7559e6e5c805db12ec
SHA25645e35bd4c0bc2bdfd2b683af32526c4433b0b382857fdfb05fbf333ced7306a3
SHA512b58d589f4c32e34c1598629ec485b56185d9a91738ace9984639ec312f02c400c4adfe02a2e32eda7d561b736b83b6baeaff25aa79f947674c21623cdb906113
-
Filesize
141KB
MD52d37ed3e8f608d83a225eb1b69dcc069
SHA155df9276d6502562e079ef6a51a2ed3f454bafe3
SHA25615ab72fa64ade164b2db71de96057ab849cc7918f09b8b55b4292596793b2ae3
SHA512c1f2a1a07741e9de68d31ca49a7d61de1350a01d6030943df601cee8d52ade0202e7e39da0a63ebe3c9e77280913dab7a02a375050e373490374ef77fadb200e
-
Filesize
141KB
MD52d37ed3e8f608d83a225eb1b69dcc069
SHA155df9276d6502562e079ef6a51a2ed3f454bafe3
SHA25615ab72fa64ade164b2db71de96057ab849cc7918f09b8b55b4292596793b2ae3
SHA512c1f2a1a07741e9de68d31ca49a7d61de1350a01d6030943df601cee8d52ade0202e7e39da0a63ebe3c9e77280913dab7a02a375050e373490374ef77fadb200e
-
Filesize
141KB
MD5eb77d4087717925ff4bfe8a40e324265
SHA1cea16854496b988d26bd7d2309c3fcb3acb7f92d
SHA256a87f7718a035c9ebcbed084b2cf0c64474b10d52dd41376cb9146ae51c563d64
SHA512717fd748bb8e59f7a23ae8b0b0cf064bfd700e152ab2dbfabedecea898b429efaec7e24fa84ce14e0e36b04475727ec2d36dd9ac98d512a9a5ce65b7b2dad8a4
-
Filesize
141KB
MD5eb77d4087717925ff4bfe8a40e324265
SHA1cea16854496b988d26bd7d2309c3fcb3acb7f92d
SHA256a87f7718a035c9ebcbed084b2cf0c64474b10d52dd41376cb9146ae51c563d64
SHA512717fd748bb8e59f7a23ae8b0b0cf064bfd700e152ab2dbfabedecea898b429efaec7e24fa84ce14e0e36b04475727ec2d36dd9ac98d512a9a5ce65b7b2dad8a4
-
Filesize
141KB
MD57c4648ea62401a6f6780371245679244
SHA1ba83d1660cbd127d61920bde9c1de811eebf475a
SHA256103f36642a0719fbcca637045a77db16af7d97cdf1e83f8ec50a787fd2b493b1
SHA512ac0184f852f958ba26e7918f680937a78f1cbf3166889c06f1d090cd9f0b23664a98a06d2ae978f6bfd313eeabb027894f5b2f4baf7eaf3444bf4da12fdc9a9e
-
Filesize
141KB
MD57c4648ea62401a6f6780371245679244
SHA1ba83d1660cbd127d61920bde9c1de811eebf475a
SHA256103f36642a0719fbcca637045a77db16af7d97cdf1e83f8ec50a787fd2b493b1
SHA512ac0184f852f958ba26e7918f680937a78f1cbf3166889c06f1d090cd9f0b23664a98a06d2ae978f6bfd313eeabb027894f5b2f4baf7eaf3444bf4da12fdc9a9e
-
Filesize
141KB
MD57cfe3deb891235e9c8f1972a96238fe6
SHA1cbdf9c53d5a053fead059be2c43ee8ceb2b5ef00
SHA2568d9fd28c561fd259243a50b1a8fdfc460a1d3676703292a30cb57e99387068c5
SHA51253e1eb18a6492c9a3baafe128cf1a9334320186cf94f9a90e18afe8bfab32d7d9ae90b7edf73d18d7deb784c552777f1ba0f521c532b7523ce5821297de4307b
-
Filesize
141KB
MD57cfe3deb891235e9c8f1972a96238fe6
SHA1cbdf9c53d5a053fead059be2c43ee8ceb2b5ef00
SHA2568d9fd28c561fd259243a50b1a8fdfc460a1d3676703292a30cb57e99387068c5
SHA51253e1eb18a6492c9a3baafe128cf1a9334320186cf94f9a90e18afe8bfab32d7d9ae90b7edf73d18d7deb784c552777f1ba0f521c532b7523ce5821297de4307b
-
Filesize
141KB
MD5bb05de900cb7985894c94e9807101e63
SHA1b20107739e6453714cf5dd7e96161755cf2545dc
SHA256f16f926c7876621a1bda3c7be9f599722eb0cc3dbb02ffd4f10c2df95901a133
SHA512725f70d3b887a43ebf0ac6af0bbf890f29d8244fca72a145c3a3e7f22d10d427b40986459d0a476ba6336155ab31f9123d6bcc5c6a2a2bb10ad79a9bb6286def
-
Filesize
141KB
MD5bb05de900cb7985894c94e9807101e63
SHA1b20107739e6453714cf5dd7e96161755cf2545dc
SHA256f16f926c7876621a1bda3c7be9f599722eb0cc3dbb02ffd4f10c2df95901a133
SHA512725f70d3b887a43ebf0ac6af0bbf890f29d8244fca72a145c3a3e7f22d10d427b40986459d0a476ba6336155ab31f9123d6bcc5c6a2a2bb10ad79a9bb6286def
-
Filesize
141KB
MD591137d7fd1b2d1072242a663a108508c
SHA1da7e1cec805ffceae62e15ec05cadc72e417e19a
SHA2567e34698a47fe689cb8dd8e1cbbf3e4e9b3592a746af5a4063f54c7eddca0b8b7
SHA512dff361fe9470e631b09293ac977f1bd84c072f9a1fff96076a4d014dc201f967f5c818ef6aaf4efd3340e2283a4d34c50221ff9f352cb21913a048ac89ccad29
-
Filesize
141KB
MD591137d7fd1b2d1072242a663a108508c
SHA1da7e1cec805ffceae62e15ec05cadc72e417e19a
SHA2567e34698a47fe689cb8dd8e1cbbf3e4e9b3592a746af5a4063f54c7eddca0b8b7
SHA512dff361fe9470e631b09293ac977f1bd84c072f9a1fff96076a4d014dc201f967f5c818ef6aaf4efd3340e2283a4d34c50221ff9f352cb21913a048ac89ccad29
-
Filesize
141KB
MD546a82a8ed4ad0b0c52630b6bd62cc4b0
SHA106f000c5be9af87b1d09280afc5192498125762d
SHA2563c2ec3edc32550e7f766f60df5e23487ecf0c7e1413f54f949fbd254bf519a81
SHA512be20f2da61306c907dffe911a4e2e90e46044df54394953485f79ea9d3a95e2084d94a5136eb87a024a0f93ec97dbeef78f32a89a18659c4bb69b45419d98508
-
Filesize
141KB
MD546a82a8ed4ad0b0c52630b6bd62cc4b0
SHA106f000c5be9af87b1d09280afc5192498125762d
SHA2563c2ec3edc32550e7f766f60df5e23487ecf0c7e1413f54f949fbd254bf519a81
SHA512be20f2da61306c907dffe911a4e2e90e46044df54394953485f79ea9d3a95e2084d94a5136eb87a024a0f93ec97dbeef78f32a89a18659c4bb69b45419d98508
-
Filesize
141KB
MD5acc9b1a29482d9be9fd5f966bb9b533d
SHA1de3066d41384183adaf3104e09de6e4acc9f4471
SHA256eb060a5d9f44c4812ce5fca5087106e703721241fec965ce0d519b9eeb0910b8
SHA512879729df61f8d048ab058764bdd8e105a3795c2b89cb6f48f9b589126fc32258ac771bcf6d2969b7d0b880cc30b1900f3125f3f1c1d1d29b9246fa8765768090
-
Filesize
141KB
MD5acc9b1a29482d9be9fd5f966bb9b533d
SHA1de3066d41384183adaf3104e09de6e4acc9f4471
SHA256eb060a5d9f44c4812ce5fca5087106e703721241fec965ce0d519b9eeb0910b8
SHA512879729df61f8d048ab058764bdd8e105a3795c2b89cb6f48f9b589126fc32258ac771bcf6d2969b7d0b880cc30b1900f3125f3f1c1d1d29b9246fa8765768090
-
Filesize
141KB
MD5a020205eed37b106399dff26449ce6cc
SHA1ca8c58fa2f9208aef2801ff0558fc1769b0387ce
SHA2569146c684c094579d6b9863cee01a66691d2ac46e61d8d18622c43cc53c381ff3
SHA512534787c6e27962952a8022c1c69dd3dec7718a57d20d38af4b01f0bfed9117c68fd83742b71b54ebcc1521fa2b3650c93cd44c68d3d3e1c3b7f3315b0d4b6495
-
Filesize
141KB
MD5a020205eed37b106399dff26449ce6cc
SHA1ca8c58fa2f9208aef2801ff0558fc1769b0387ce
SHA2569146c684c094579d6b9863cee01a66691d2ac46e61d8d18622c43cc53c381ff3
SHA512534787c6e27962952a8022c1c69dd3dec7718a57d20d38af4b01f0bfed9117c68fd83742b71b54ebcc1521fa2b3650c93cd44c68d3d3e1c3b7f3315b0d4b6495
-
Filesize
141KB
MD5a020205eed37b106399dff26449ce6cc
SHA1ca8c58fa2f9208aef2801ff0558fc1769b0387ce
SHA2569146c684c094579d6b9863cee01a66691d2ac46e61d8d18622c43cc53c381ff3
SHA512534787c6e27962952a8022c1c69dd3dec7718a57d20d38af4b01f0bfed9117c68fd83742b71b54ebcc1521fa2b3650c93cd44c68d3d3e1c3b7f3315b0d4b6495
-
Filesize
141KB
MD5d7ecb514132843af3878f1f460ad3173
SHA177e898546945162c4e5bcd77c1bacba2ded301f9
SHA256489dff14816906740e1a4406792e3a29994d9f84004e516e68a3ad83a2ccd3fd
SHA5127d3bb73c9139deaeca497ac71d9e79591c4b4836ca8df8e4ffc516930b7335aab565174c8841e367542fe311cc538d7925e74dfee30e078cb4fe9ca52e980351
-
Filesize
141KB
MD5d7ecb514132843af3878f1f460ad3173
SHA177e898546945162c4e5bcd77c1bacba2ded301f9
SHA256489dff14816906740e1a4406792e3a29994d9f84004e516e68a3ad83a2ccd3fd
SHA5127d3bb73c9139deaeca497ac71d9e79591c4b4836ca8df8e4ffc516930b7335aab565174c8841e367542fe311cc538d7925e74dfee30e078cb4fe9ca52e980351
-
Filesize
141KB
MD556c1c8865bf56f968b343cd0f4739cc0
SHA1a0be3b2aff337920e98c8f37891cf0c123308c55
SHA25632b3e2f8015a168bec9cc005467af9a7899d0fdc174a4a25d9dc9024cb84b7cc
SHA512a6b3ffd1384687e1876c1ed7eaa36372d39534200c22a9ff05f2565049928fd90ab3f25f2a2bae8349252648104bbad4847cb948687ba4be314bc981c738c8ca
-
Filesize
141KB
MD51940ec08659dd442ffec976e2470fe8b
SHA1764763ae4a4d88e7402e1464c10204da4155e126
SHA2567d38ab2bc41288d56e367561fb0bfdd822fb27d552bff522fadf8c0c1dd21e76
SHA512a32f46ce3d283101fba23274b234196551eecde3ed36b8fed3adecc84ad005d7fbfe3ed2de9a562ed0a93e7095959d9f7f700a52b22f0436673c9dd0d604bafb