Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe
Resource
win10v2004-20240508-en
General
-
Target
e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe
-
Size
237KB
-
MD5
732de6d64b3d2b062df68da43bbd74e3
-
SHA1
c1a7fb1667a60b7f46f6608a819cc1366c985057
-
SHA256
e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5
-
SHA512
20c78ef38c607d3da584747f242c824698f816b6dba1edc365bb66a96f83f143276bd4e9efb06f84630abf28de4be93f4777d6382de900ca64371fe25c96818e
-
SSDEEP
3072:JDdQbTnRmFZuYVE2jAUbj8Nq75Sq4iqnAUUjE02ZoL9snKKq:r6mF432jXj8U5ihYjEToZY8
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdhbec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdfofakp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpolqa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njacpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdcijcke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgnnhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njogjfoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndghmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjjmog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndidbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lalcng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnepih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnhmng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjjmog32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdffocib.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liggbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcpllo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkgdml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lddbqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgghhlhq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgdbkohf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liekmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lalcng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liggbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldohebqh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lddbqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mciobn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mncmjfmk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nggqoj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnepih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mciobn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mncmjfmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njogjfoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njacpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgdbkohf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nafokcol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndghmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nggqoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgphpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdhbec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldohebqh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nddkgonp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdcijcke.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcpllo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldaeka32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgpagm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkncdifl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnlfigcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nddkgonp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kinemkko.exe -
Executes dropped EXE 42 IoCs
pid Process 116 Kgphpo32.exe 5108 Kinemkko.exe 2732 Kdcijcke.exe 400 Kdffocib.exe 956 Kgdbkohf.exe 1068 Kdhbec32.exe 1892 Liekmj32.exe 4920 Lalcng32.exe 5056 Liggbi32.exe 1708 Lcpllo32.exe 3668 Lkgdml32.exe 816 Lnepih32.exe 3716 Ldohebqh.exe 4488 Lnhmng32.exe 4880 Ldaeka32.exe 5036 Lgpagm32.exe 4116 Lddbqa32.exe 2932 Mnlfigcc.exe 2944 Mdfofakp.exe 4632 Mciobn32.exe 4660 Mkpgck32.exe 528 Mgghhlhq.exe 3680 Mpolqa32.exe 4888 Mkepnjng.exe 2524 Mncmjfmk.exe 2368 Mglack32.exe 428 Mjjmog32.exe 4312 Maaepd32.exe 3556 Mgnnhk32.exe 2080 Nkjjij32.exe 1920 Ngpjnkpf.exe 644 Njogjfoj.exe 1088 Nafokcol.exe 2616 Nddkgonp.exe 1988 Nkncdifl.exe 228 Njacpf32.exe 1676 Ndghmo32.exe 1380 Ngedij32.exe 1660 Njcpee32.exe 3572 Ndidbn32.exe 1000 Nggqoj32.exe 848 Nkcmohbg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Lkgdml32.exe Lcpllo32.exe File created C:\Windows\SysWOW64\Agbnmibj.dll Mkpgck32.exe File created C:\Windows\SysWOW64\Hnfmbf32.dll Maaepd32.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Nggqoj32.exe File created C:\Windows\SysWOW64\Lnhmng32.exe Ldohebqh.exe File created C:\Windows\SysWOW64\Kdcijcke.exe Kinemkko.exe File created C:\Windows\SysWOW64\Gjoceo32.dll Liggbi32.exe File created C:\Windows\SysWOW64\Bbgkjl32.dll Ldaeka32.exe File opened for modification C:\Windows\SysWOW64\Mkpgck32.exe Mciobn32.exe File opened for modification C:\Windows\SysWOW64\Maaepd32.exe Mjjmog32.exe File created C:\Windows\SysWOW64\Gcgqhjop.dll Lalcng32.exe File created C:\Windows\SysWOW64\Mciobn32.exe Mdfofakp.exe File created C:\Windows\SysWOW64\Geegicjl.dll Mglack32.exe File created C:\Windows\SysWOW64\Jlnpomfk.dll Nafokcol.exe File created C:\Windows\SysWOW64\Njcpee32.exe Ngedij32.exe File opened for modification C:\Windows\SysWOW64\Kdffocib.exe Kdcijcke.exe File created C:\Windows\SysWOW64\Liekmj32.exe Kdhbec32.exe File created C:\Windows\SysWOW64\Maaepd32.exe Mjjmog32.exe File created C:\Windows\SysWOW64\Dngdgf32.dll Lcpllo32.exe File opened for modification C:\Windows\SysWOW64\Ldohebqh.exe Lnepih32.exe File opened for modification C:\Windows\SysWOW64\Ldaeka32.exe Lnhmng32.exe File opened for modification C:\Windows\SysWOW64\Mpolqa32.exe Mgghhlhq.exe File opened for modification C:\Windows\SysWOW64\Ngpjnkpf.exe Nkjjij32.exe File created C:\Windows\SysWOW64\Jcoegc32.dll Njogjfoj.exe File opened for modification C:\Windows\SysWOW64\Nkncdifl.exe Nddkgonp.exe File opened for modification C:\Windows\SysWOW64\Mdfofakp.exe Mnlfigcc.exe File opened for modification C:\Windows\SysWOW64\Mgnnhk32.exe Maaepd32.exe File created C:\Windows\SysWOW64\Ddpfgd32.dll Ngedij32.exe File created C:\Windows\SysWOW64\Addjcmqn.dll Ndidbn32.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Nggqoj32.exe File created C:\Windows\SysWOW64\Kgphpo32.exe e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe File created C:\Windows\SysWOW64\Kgdbkohf.exe Kdffocib.exe File created C:\Windows\SysWOW64\Mnlfigcc.exe Lddbqa32.exe File opened for modification C:\Windows\SysWOW64\Liggbi32.exe Lalcng32.exe File opened for modification C:\Windows\SysWOW64\Mncmjfmk.exe Mkepnjng.exe File created C:\Windows\SysWOW64\Nkncdifl.exe Nddkgonp.exe File created C:\Windows\SysWOW64\Lmbnpm32.dll Nkncdifl.exe File opened for modification C:\Windows\SysWOW64\Kgphpo32.exe e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe File opened for modification C:\Windows\SysWOW64\Mkepnjng.exe Mpolqa32.exe File created C:\Windows\SysWOW64\Egqcbapl.dll Mgnnhk32.exe File created C:\Windows\SysWOW64\Bdiihjon.dll Kgphpo32.exe File created C:\Windows\SysWOW64\Qcldhk32.dll Mpolqa32.exe File created C:\Windows\SysWOW64\Nggqoj32.exe Ndidbn32.exe File created C:\Windows\SysWOW64\Lkgdml32.exe Lcpllo32.exe File opened for modification C:\Windows\SysWOW64\Kgdbkohf.exe Kdffocib.exe File created C:\Windows\SysWOW64\Kdhbec32.exe Kgdbkohf.exe File created C:\Windows\SysWOW64\Mdfofakp.exe Mnlfigcc.exe File opened for modification C:\Windows\SysWOW64\Njogjfoj.exe Ngpjnkpf.exe File created C:\Windows\SysWOW64\Bdknoa32.dll Njacpf32.exe File created C:\Windows\SysWOW64\Fogjfmfe.dll Kdffocib.exe File created C:\Windows\SysWOW64\Njogjfoj.exe Ngpjnkpf.exe File created C:\Windows\SysWOW64\Lfcbokki.dll Ngpjnkpf.exe File created C:\Windows\SysWOW64\Jkeang32.dll Nddkgonp.exe File opened for modification C:\Windows\SysWOW64\Kdhbec32.exe Kgdbkohf.exe File created C:\Windows\SysWOW64\Dnapla32.dll Ldohebqh.exe File created C:\Windows\SysWOW64\Mkepnjng.exe Mpolqa32.exe File opened for modification C:\Windows\SysWOW64\Ndghmo32.exe Njacpf32.exe File created C:\Windows\SysWOW64\Opbnic32.dll Njcpee32.exe File opened for modification C:\Windows\SysWOW64\Lnepih32.exe Lkgdml32.exe File opened for modification C:\Windows\SysWOW64\Nafokcol.exe Njogjfoj.exe File created C:\Windows\SysWOW64\Paadnmaq.dll Ndghmo32.exe File created C:\Windows\SysWOW64\Efhikhod.dll Liekmj32.exe File opened for modification C:\Windows\SysWOW64\Mglack32.exe Mncmjfmk.exe File created C:\Windows\SysWOW64\Ngpjnkpf.exe Nkjjij32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3780 848 WerFault.exe 126 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqjfoc32.dll" e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kinemkko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgdbkohf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkgdml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nddkgonp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Liggbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lddbqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnfmbf32.dll" Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngpjnkpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njogjfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Addjcmqn.dll" Ndidbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcpllo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpolqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlhblb32.dll" Nkjjij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paadnmaq.dll" Ndghmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdcijcke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldohebqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mncmjfmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mglack32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgphpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddpfgd32.dll" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nggqoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdhbec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcgqhjop.dll" Lalcng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgghhlhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fogjfmfe.dll" Kdffocib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdffocib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcpllo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkgdml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmbnpm32.dll" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndghmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kinemkko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkepnjng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egqcbapl.dll" Mgnnhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nafokcol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdknoa32.dll" Njacpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdiihjon.dll" Kgphpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Liekmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njogjfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mciobn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agbnmibj.dll" Mkpgck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkpgck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mglack32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Maaepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgnnhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdhbec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efhikhod.dll" Liekmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Nggqoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldohebqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flfmin32.dll" Mnlfigcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdfofakp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgphpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldaeka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcldhk32.dll" Mpolqa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnhmng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lifenaok.dll" Mdfofakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odegmceb.dll" Mgghhlhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkeang32.dll" Nddkgonp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2288 wrote to memory of 116 2288 e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe 82 PID 2288 wrote to memory of 116 2288 e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe 82 PID 2288 wrote to memory of 116 2288 e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe 82 PID 116 wrote to memory of 5108 116 Kgphpo32.exe 83 PID 116 wrote to memory of 5108 116 Kgphpo32.exe 83 PID 116 wrote to memory of 5108 116 Kgphpo32.exe 83 PID 5108 wrote to memory of 2732 5108 Kinemkko.exe 84 PID 5108 wrote to memory of 2732 5108 Kinemkko.exe 84 PID 5108 wrote to memory of 2732 5108 Kinemkko.exe 84 PID 2732 wrote to memory of 400 2732 Kdcijcke.exe 85 PID 2732 wrote to memory of 400 2732 Kdcijcke.exe 85 PID 2732 wrote to memory of 400 2732 Kdcijcke.exe 85 PID 400 wrote to memory of 956 400 Kdffocib.exe 86 PID 400 wrote to memory of 956 400 Kdffocib.exe 86 PID 400 wrote to memory of 956 400 Kdffocib.exe 86 PID 956 wrote to memory of 1068 956 Kgdbkohf.exe 88 PID 956 wrote to memory of 1068 956 Kgdbkohf.exe 88 PID 956 wrote to memory of 1068 956 Kgdbkohf.exe 88 PID 1068 wrote to memory of 1892 1068 Kdhbec32.exe 89 PID 1068 wrote to memory of 1892 1068 Kdhbec32.exe 89 PID 1068 wrote to memory of 1892 1068 Kdhbec32.exe 89 PID 1892 wrote to memory of 4920 1892 Liekmj32.exe 91 PID 1892 wrote to memory of 4920 1892 Liekmj32.exe 91 PID 1892 wrote to memory of 4920 1892 Liekmj32.exe 91 PID 4920 wrote to memory of 5056 4920 Lalcng32.exe 92 PID 4920 wrote to memory of 5056 4920 Lalcng32.exe 92 PID 4920 wrote to memory of 5056 4920 Lalcng32.exe 92 PID 5056 wrote to memory of 1708 5056 Liggbi32.exe 93 PID 5056 wrote to memory of 1708 5056 Liggbi32.exe 93 PID 5056 wrote to memory of 1708 5056 Liggbi32.exe 93 PID 1708 wrote to memory of 3668 1708 Lcpllo32.exe 94 PID 1708 wrote to memory of 3668 1708 Lcpllo32.exe 94 PID 1708 wrote to memory of 3668 1708 Lcpllo32.exe 94 PID 3668 wrote to memory of 816 3668 Lkgdml32.exe 96 PID 3668 wrote to memory of 816 3668 Lkgdml32.exe 96 PID 3668 wrote to memory of 816 3668 Lkgdml32.exe 96 PID 816 wrote to memory of 3716 816 Lnepih32.exe 97 PID 816 wrote to memory of 3716 816 Lnepih32.exe 97 PID 816 wrote to memory of 3716 816 Lnepih32.exe 97 PID 3716 wrote to memory of 4488 3716 Ldohebqh.exe 98 PID 3716 wrote to memory of 4488 3716 Ldohebqh.exe 98 PID 3716 wrote to memory of 4488 3716 Ldohebqh.exe 98 PID 4488 wrote to memory of 4880 4488 Lnhmng32.exe 99 PID 4488 wrote to memory of 4880 4488 Lnhmng32.exe 99 PID 4488 wrote to memory of 4880 4488 Lnhmng32.exe 99 PID 4880 wrote to memory of 5036 4880 Ldaeka32.exe 100 PID 4880 wrote to memory of 5036 4880 Ldaeka32.exe 100 PID 4880 wrote to memory of 5036 4880 Ldaeka32.exe 100 PID 5036 wrote to memory of 4116 5036 Lgpagm32.exe 101 PID 5036 wrote to memory of 4116 5036 Lgpagm32.exe 101 PID 5036 wrote to memory of 4116 5036 Lgpagm32.exe 101 PID 4116 wrote to memory of 2932 4116 Lddbqa32.exe 102 PID 4116 wrote to memory of 2932 4116 Lddbqa32.exe 102 PID 4116 wrote to memory of 2932 4116 Lddbqa32.exe 102 PID 2932 wrote to memory of 2944 2932 Mnlfigcc.exe 103 PID 2932 wrote to memory of 2944 2932 Mnlfigcc.exe 103 PID 2932 wrote to memory of 2944 2932 Mnlfigcc.exe 103 PID 2944 wrote to memory of 4632 2944 Mdfofakp.exe 104 PID 2944 wrote to memory of 4632 2944 Mdfofakp.exe 104 PID 2944 wrote to memory of 4632 2944 Mdfofakp.exe 104 PID 4632 wrote to memory of 4660 4632 Mciobn32.exe 105 PID 4632 wrote to memory of 4660 4632 Mciobn32.exe 105 PID 4632 wrote to memory of 4660 4632 Mciobn32.exe 105 PID 4660 wrote to memory of 528 4660 Mkpgck32.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe"C:\Users\Admin\AppData\Local\Temp\e4e9f37574f227ff95451052b1f78cdbb5f4c594096046c8e1d34daf937b89c5.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\Kgphpo32.exeC:\Windows\system32\Kgphpo32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\Kinemkko.exeC:\Windows\system32\Kinemkko.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\Kdcijcke.exeC:\Windows\system32\Kdcijcke.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Kdffocib.exeC:\Windows\system32\Kdffocib.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\Kdhbec32.exeC:\Windows\system32\Kdhbec32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\Lalcng32.exeC:\Windows\system32\Lalcng32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\Liggbi32.exeC:\Windows\system32\Liggbi32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\Lkgdml32.exeC:\Windows\system32\Lkgdml32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\Ldohebqh.exeC:\Windows\system32\Ldohebqh.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\Ldaeka32.exeC:\Windows\system32\Ldaeka32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\Lddbqa32.exeC:\Windows\system32\Lddbqa32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Mdfofakp.exeC:\Windows\system32\Mdfofakp.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\Mkpgck32.exeC:\Windows\system32\Mkpgck32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\Mgghhlhq.exeC:\Windows\system32\Mgghhlhq.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:528 -
C:\Windows\SysWOW64\Mpolqa32.exeC:\Windows\system32\Mpolqa32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3680 -
C:\Windows\SysWOW64\Mkepnjng.exeC:\Windows\system32\Mkepnjng.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4888 -
C:\Windows\SysWOW64\Mncmjfmk.exeC:\Windows\system32\Mncmjfmk.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2368 -
C:\Windows\SysWOW64\Mjjmog32.exeC:\Windows\system32\Mjjmog32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:428 -
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4312 -
C:\Windows\SysWOW64\Mgnnhk32.exeC:\Windows\system32\Mgnnhk32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3556 -
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1920 -
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:644 -
C:\Windows\SysWOW64\Nafokcol.exeC:\Windows\system32\Nafokcol.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1088 -
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Njacpf32.exeC:\Windows\system32\Njacpf32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:228 -
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1380 -
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Ndidbn32.exeC:\Windows\system32\Ndidbn32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3572 -
C:\Windows\SysWOW64\Nggqoj32.exeC:\Windows\system32\Nggqoj32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1000 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe43⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 40044⤵
- Program crash
PID:3780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 848 -ip 8481⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5b97de51385ed2d146c2808e4e1ec4b4e
SHA16847024a2e39f514471187aa9a7854afda88e2fa
SHA256b78e0205f865044ee3fb55b9f083866a3ecae985c540731a04c45671da078005
SHA5128d1363e59f1f86734cfc956b6ebcfd91d454d693693e4bbbbb426d70593afb929002fe9526b2dda0445aef647c65c3f92454aa8cd8249e9f7d60f61e3c6facbf
-
Filesize
237KB
MD5589deec0f3219f0b35f19832c24f3bf6
SHA168b4e845836bdc0ddf3c4d7c9d038df2ba5d8832
SHA256d23c59b43aeffb2c04bf98964f0a7d6a00c4c9cd1f983207b63383dfd504c915
SHA512b3e185a9c6892df378d2b2704b3efa3d3184d12794a4c98c783dc9bd28033b7d9c6ab69d3a1d78a004f53be786fd9f96c40179c330b754b591dfd4c8c986dec7
-
Filesize
237KB
MD54974cf1cd3547adfd0a708fe8897262c
SHA12ff8b5c2639c34ca89505e31340d539f410ce6a1
SHA2562704aae9012eb06fee7b285f23dfb5b4c8eb40d0c1ca2bc096825d52ca6ff220
SHA512ca4b57754b4632f846e6180f5e86b391504afd1be54d65fa3a1b3314b9a0ea6b927e867c2efbdf1b1e88ddd06676b6ca878cc39a1e32f5e7e489f05b0485dbbc
-
Filesize
237KB
MD52d58d9eea443fff3903cb6bc124fa693
SHA1b725c8c16a8d3e123c3feb608a92c68bbd30ab80
SHA2567872b73b3c407f13afd2c76182f2192c8338b35da9cc0991f995db526c4481a3
SHA5121f6588be1ae98a8b2a335ea84a025de761d828eed21013848935271e0ecc557056c1c4c406c41ceab714fbb6fb7ab3247526bdc4510bd8bc494892ae1534fd02
-
Filesize
237KB
MD58ecedd07a3a95a12372c858910b567ab
SHA1221f2eadb229099a714a8be7783d938be66547e7
SHA2562091df0b6a65c2908c4095df69a98f7853790f21aa5666026ebdc73b6d8ae6c8
SHA512f9ef1c38a1a725f8782eb27313ecf6c7fe476bd6af64fd1de8221d2400de1c02866d34cb3c3813ece71857eb019c8edaa66a8d37b7b3e954afd30de3c806f9ac
-
Filesize
237KB
MD526cbadce5b068fd2e35bae8579297ed3
SHA14f791ccd870549b17f3c6aa9d8ade2528bf84173
SHA256757584351524cb98a6e98f5dd7139ac75ae23411b67eeac073d46353960bfa6a
SHA512237b3d5e68d3ea6b9e71b87a844f82c33bc5372c57737cdba176f443437c5d21787ed54450b7668fa4caf988b128bfffe937e77fe343eeb5461f70040674d6f7
-
Filesize
237KB
MD589ac2a61b78e143ca1ee754546071a26
SHA1ffcdc7d95806125d932d78e92e126d7824ffcdf3
SHA256e75a59a97cc04569a705083aa6c74f193bb6c0c34b406667bcf7e0cbd36f7da1
SHA512d3a7d89db2623474cf0ccfdbdfaa8ae92d02042cd6781e9a133d51021a58edc2ba6b31470af620799ea1684f31e5ba9ea986d1a1cb880cb51ae4361ed4211344
-
Filesize
237KB
MD5b9179e3c0e8760dcf44517325acb45cd
SHA145d6c8dd15c71f6dbd81216f7b0e15eeab6982c7
SHA256607040b01e74ca9f4f1505e05165366e74eaabb49f6b86d59f41ed1f71ff26c9
SHA512737198a35ec4b7920fd4d22321cabcc31f8ef33d6c9002d02b5df86bef581d5117a3af982eced411053ea7e147e696340d76d8d2d725bba250350f2c82270d59
-
Filesize
237KB
MD5290c74223f9e6c25bccae8fc05ab4a64
SHA116962704e520299a4d022c1230e05c583f28623b
SHA256dd7f35ca2c47b113e31237f1bb2682225d84abddf87d0d06d53f68e0e24bb6ae
SHA512d5c54444d821e0021065c30e85dbf34c2cb512de0b7cce38ed8dfedabcacd6cd7629995a54d20bd5ed6622c80f7ab6d0362e9cd4445bd290f14d99df81995122
-
Filesize
237KB
MD5ed31d496bf65d914b868f3496936487c
SHA11092eb91f6f3ee7629c7a07a7157e76426c388d9
SHA256f48d30a7d50d586cf4365b680954eef26f9fd760d80d5f1347a8e3a719847c26
SHA512a9fac2c212a3c046b7cca86a7bc3d83acc23b4ff73370b5ed8dba6810656c1fd4a7cd82e7c2af7000b28d30460f8c7fe77a145ee164679d6ab7f80e96833fb99
-
Filesize
237KB
MD53c67ef76316440324963f6cda0acbb70
SHA1165bcd4bb9f85372904108cbee2da6833c19addc
SHA2562abcf09edc0c81745fef0bd0deab552342ea49ee4662dbe3480c7f99df340936
SHA512f63b00e84d100c4878e6ee7da3fd6db54abccf7d73d8f75df5063f8df4d43aaa94f1c0b9448a3de13b43e3f1b573d4f27b04760651d352de9592da59a7c97bb8
-
Filesize
237KB
MD5ddbcf7f9166ac7c6b6e7fb2364db04f8
SHA1f0ad4b5e8e9078cf7509ba78b00caedb0c1c97ce
SHA2560ff1e04bf56b5db26cbf3e0cd9d1a355298e35adc079db0500e36c1ba08163de
SHA512ad9b2450fd29ac17135af833d80229890570334edfc26d41377fc75bee746779c9ca6e37bbd3bbfce91b76d2d0db8247a60ba36ec76039f316970540b22ef5f3
-
Filesize
237KB
MD5f0c26e08c5f0720b914777f1fa747b97
SHA1e56a303c9c9b91d3fcdb3a0ca53b6ba7e4b0968c
SHA256052e055d6702199f2b8c79984378a1bb1759e1e9204750904b954a66a3f9fc9f
SHA512c0f672813fc13074b9474ebd3b2ccef6f24ed6d44e3cd2719c3d608fbace4fc14532ecf115dd85d73d0e1a25d7f0a62dfd60cb0ada054e3b525c4289b724ca34
-
Filesize
237KB
MD507badffcd8763d90390ec93e6a4013d6
SHA1dd0ab0629114e04cd6ac733dcb9f10adc52db80d
SHA25688b83977b53c6f50c52744987cfe0867f8cacbc66f7f938a02d2578381cfce2f
SHA512ff5e371113f8494e731033116ee77b5860ab6340131b8aecd7f7fb8d559a52a5ebd4b6e34bfb8036811902c483c1aa2f5e3561e6d9f6e478e50f6a65328a6fd1
-
Filesize
237KB
MD5fab9482747bee4369669827df33ab315
SHA1e29c17e9cf31ca45282d86f0427d61cf0d3a8960
SHA256d833b0d7c786e0e578565735cfb3ba8c1cc7401047ea33efed3402ca0aab751b
SHA512a5861cbacf0f2b8342886334ddcf95936e8648bd786d0c7ba83d296470c16e041db9e2720d8638bf7512d5f7bd21d058123d1652dc5ebc6845fd2597862cecea
-
Filesize
237KB
MD5b05184e8ba106a19c56312e2373eaab5
SHA14cfd3ceba31bc4748cc4b6cf472f44bf11cd713a
SHA256f53acb5e79b016c51748f2a54971804d9cfa9fd5cd50aa5dbb3da074c4ddd199
SHA512f961d702bdb310f6dbf1f26ce0dc21cff0737a08a5aa381d9968da2c4dcc53178eae83118ba02e7468ceb4e9b84d6968d108d8f3a9c511424e2ae803860e891f
-
Filesize
237KB
MD5c73d02190c73d4b4c6c0ba15a94d0544
SHA137d60117cdad12eb266e02f6d5914bcfd595c0f4
SHA256f223b90400b1b4a72258d72e51a4d544cd453e2ce2614ca0ce88929b6b788042
SHA5129e559eac7effe1c8a4bffd49b9e5c8a4ae77deddb90aed3eab28e9547e168038f483847d2bd8809e6ed27afae20c5d860da8c3db7acd88e2101955ba10f5aad5
-
Filesize
237KB
MD592bac5c2cb41e5b133a59263b6d81ed7
SHA1484d607974258e2ee804637f0cc26e04ee03a04c
SHA256282fc7d71e7312e527f3e00cb877b58a36382a00a733707c63706d8c01fe1478
SHA512c4991b1b4d78ddad7c22d54caf9d3298ba209eb6e0a39a640e7d3cc4646cd2128fa0f01f32ed124635eee5b4ff77e075068fadd760c8c91e363b073fce907a1d
-
Filesize
237KB
MD5ae5c0fb5e67f2dd6e02967bd31907412
SHA1ac9de03d23f88cde7955e45936d9352b05c9b73c
SHA2564522869c4ad9e5ec63601637bc06cb9e27bbaedda6b75328e38c24e7e6fc4f0f
SHA512869eea69986d4d2a2775eb6a310c417b40d9833e090a5998a007e9608273d682133f54b3129acc458f4efdd24d4bcd3ab1aa2bb02510e975f48ac4b92fc27858
-
Filesize
237KB
MD5e2ac4d8951549dc462385550becc1ef0
SHA1e4154527bcfb7de706b0ab8d9993ae675d6c7288
SHA256f4aef224891362c5c4e5452615de2c8b6fdec55174eda25ec10654593691b914
SHA5121f77244d9bbde4ff181e487ff23ef0ec32a9327e7171167c341e46364824a9e6aba2f8b2e125f0b2e2920cad2dc66709c064b3ee7bb902b1ef57bc26ac021147
-
Filesize
237KB
MD5f6225c0cde3527109c250f42429d55c5
SHA1704cf94f13b7a35cdb486b91515e9a52bf4059b8
SHA256f12d7bbc2163b1bdaf4d90eb67b4095de6e58a027b9503ef1d70676a71711ef6
SHA512afffcedd17beaa60ac662d1eee538537693d8a9d6d9b7985cd01cf4a03ef2683aed2a89da65f5cc299c4d249eddb7f858a78b514b3ed6cca07d129e8e01bcff6
-
Filesize
237KB
MD50f67a51d2769f9403ed978a3518885f4
SHA1201956685ee8bd047330e4c1236de5999931a6a7
SHA256a12b20d5890727adc259dd797d45529ae8af9867485e7d8a46193ff1e53aaa02
SHA512bccdae83cb0fb1d48fb899be779b6a6c6b0f5831c6f377c3012bd87627defad8cec25a32b53ff765e21b6df155c0f81d6ab6c01374f6fad2d9ea8415d249856e
-
Filesize
237KB
MD56e69276987b1c85aaf763f5f4f7439e0
SHA1ca112b6f35d384641e1579691dd4f159b6a2893f
SHA256e6f46aa665278e07aa384d0bda5d215637d4b14d226789cf71dc2bdc39001430
SHA5120af5d0e5d371c3a64ebe143fc4178bff029e7c8d16c8eaaad07395481dec2d287d1776142269b91f0fed4ff59081d25a7431c36c8d01012e795085a44ec9ad29
-
Filesize
237KB
MD545ff74f143fd179412b6eafc6903c0d7
SHA12b7c5a397cf08ea65176a2cd33079c33105eab0d
SHA256a31fdf260fd483e33183e78df4252f3d1187a260d838af272bb68544adc72f8b
SHA512394db2bb92973d3d1862d66610bc847c33c7bfe12ba768b6b50b6b28d7df37c5df5f38b1039210326cca426cbb5f9060003761837f6f2b369bd963adfd0a8885
-
Filesize
237KB
MD5f1b77248c4b6e6f607e96b1b77e24386
SHA137aab64bb1ab81a8060a7bd429258e2b1163a054
SHA256cfb8a5f32db749937c0615c159ab01f62201bfb89ba400ec1bc7ab9f130c3c5d
SHA512b81aa2a860e4326feaddea7954f3f307e96ada825eee6b4bc188808bce10a40ee3ce49ce816a69c3f1c47e6bbb9688cb2371da5bab81fe28e0dd52a16afac35e
-
Filesize
237KB
MD5dca372bd17387ec1f110c6cab4f9421b
SHA15f453471b390d01ba070007a90ab1cedf64d3ab2
SHA256a6dc46b7ab040e3f18449c2e866e664af60b8e2cb8fa506fc753817e7288b35c
SHA512aeb77c8d4fd30f9f12e9f5e6ebad78c75c88df976252ced78e8ac5333c0d6b3efd12a189c064e707bea17b3624ccc480d84762cf91af5c57430ad12176e4fec0
-
Filesize
237KB
MD52b113654eab9504fa45ac88ef61e2790
SHA1caa8fcef8ef3262992ac0d0c2055118e4f7eee4f
SHA2562ce62f43e4bacdc9f6a36a9fcb1c0cd749dcc636801c3ddba686e4f4d34d05c1
SHA51225040ff91d45345443511206075f7c514c2a92e77d73b90be71de274d4adeaf14dbbd8cd93a422b5cde4aab7cb3549f87481d91505aafe56eb0716f52b766f36
-
Filesize
237KB
MD5f77bdaa1e4642a5e218231f966da986a
SHA14780600627713836c79c9ac0222182fb1bbdc5af
SHA2563616965ca681a119dcff29d427543711a937b55808f1e708a05781632bb8e3ea
SHA5123075d7da73abe775ecd8648ac6290bb5e2a17ab424552ae927602d000d3965414520e23ea46509cf0e197d798907269e397d8798f572536697ef0b26febbe247
-
Filesize
237KB
MD5e2f1a149f0d45b068bd426abc6c47aa7
SHA1fe5208170c519095f391e4036911e0bc4a7b1040
SHA2569f18daa978544c315d9d808f668b06ffc8ed7c7cc05382af51a129886411b239
SHA512dcaf70ec93d6be13937290da6accca0ab8d0775934d0fc57504836161cbaa5ac3e61783488fd4c170d8ae5615f2f4e2e4104d805b23dc425908cdc9d83553b01
-
Filesize
237KB
MD547da523e2f8b666c60b181f89da810aa
SHA1320ebacbf44d7349759f408ea24181132cf5c025
SHA256ff8ce5847ebbd2821df8424387a595afbb95df021cff20e9296a0c6196c16e01
SHA512ea206af6e7c33d0f446abccead4cda6fc0df1fe72bf9b4b9c9995dd4d4b18fe21187540da150b2447ab5dfa90dc29011d85137a81f78beff626f0cb762a78e11
-
Filesize
237KB
MD5d0b36619acacaa2ba7d505138cd5af1b
SHA113453b758b8cf34e6c977dcc6604110ffd5c9da9
SHA2561dc33186ea17d0337d918491f1c094bc1fca3f0cb57c7f7d112e490e2dfc6928
SHA512276683e71f97fcacc2fd634acbc486c13b15f167ddda0ad10b90072609fbe001c558840c205f521c3a257ef4796fca2fdc801a103bdfa8dbd27edf156f705b50
-
Filesize
237KB
MD5a9a1cc8e00117244a06a087a0abe86ca
SHA16653cd36bc6b601d9d5233671350ff616f72b23f
SHA256c4a408c80e46136226420f7d6f3e9253be48df9d5e2e64abda533fedee5e50ae
SHA5129be3cad3840447c3978b63e621058d3c18ea42ce5d8eb62fca857a6c33c4f76b258e0e18097118dc4f03bd2dd5166e023c7e7b8d8763c1db63aac44c1569c4cf