Analysis
-
max time kernel
104s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
ad6f1d6325560ac03b63dc7344142260N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad6f1d6325560ac03b63dc7344142260N.exe
Resource
win10v2004-20240802-en
General
-
Target
ad6f1d6325560ac03b63dc7344142260N.exe
-
Size
64KB
-
MD5
ad6f1d6325560ac03b63dc7344142260
-
SHA1
94da4a98f0105883282ebacc81be60584dc3b064
-
SHA256
e050c03e150f0a41a8382fd23ff15219bda4f666324af691de6e18cec06d6624
-
SHA512
6a396f31cd58b5ea2b3dc79f42d52c22c9428c3d25d0418a5c925a50e8dbc6eb40ec062180c99677f13a588d387f356dc3912aafa219165b1cb6c3534f4eaf7b
-
SSDEEP
1536:WJvxZiJwR74Tcr99R80c52Ll7LIS3hGMcVNtBqq3:K+wNzRGWl7LISpcVAs
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 62 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djdmffnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhhnpjmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chcddk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cegdnopg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnnlaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad ad6f1d6325560ac03b63dc7344142260N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chmndlge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chcddk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmlcbbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" ad6f1d6325560ac03b63dc7344142260N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfbkeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfpnph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceckcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daqbip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caebma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnnlaehj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djgjlelk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnffqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dejacond.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cenahpha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfbkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddonekbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjpckf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmlcbbcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnjafap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cenahpha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceehho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djdmffnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnjafap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daconoae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chmndlge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceckcp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmnpgb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhfajjoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daqbip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnffqf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caebma32.exe -
Executes dropped EXE 31 IoCs
pid Process 3124 Cenahpha.exe 3436 Chmndlge.exe 5004 Cfpnph32.exe 3704 Cnffqf32.exe 4296 Caebma32.exe 4452 Cfbkeh32.exe 5072 Cmlcbbcj.exe 4492 Ceckcp32.exe 3220 Chagok32.exe 208 Cjpckf32.exe 4132 Cmnpgb32.exe 3008 Ceehho32.exe 2404 Chcddk32.exe 4596 Cnnlaehj.exe 3212 Cegdnopg.exe 4228 Dhfajjoj.exe 4780 Djdmffnn.exe 4256 Dejacond.exe 4280 Dhhnpjmh.exe 2952 Djgjlelk.exe 3588 Daqbip32.exe 632 Ddonekbl.exe 3444 Dfnjafap.exe 2680 Dodbbdbb.exe 2704 Daconoae.exe 1048 Dhmgki32.exe 4300 Dogogcpo.exe 2592 Daekdooc.exe 1312 Dddhpjof.exe 2772 Dgbdlf32.exe 4700 Dmllipeg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Chmndlge.exe Cenahpha.exe File opened for modification C:\Windows\SysWOW64\Cjpckf32.exe Chagok32.exe File created C:\Windows\SysWOW64\Cegdnopg.exe Cnnlaehj.exe File created C:\Windows\SysWOW64\Daqbip32.exe Djgjlelk.exe File created C:\Windows\SysWOW64\Cenahpha.exe ad6f1d6325560ac03b63dc7344142260N.exe File created C:\Windows\SysWOW64\Mkijij32.dll ad6f1d6325560ac03b63dc7344142260N.exe File created C:\Windows\SysWOW64\Cfpnph32.exe Chmndlge.exe File created C:\Windows\SysWOW64\Flgehc32.dll Chmndlge.exe File opened for modification C:\Windows\SysWOW64\Cnffqf32.exe Cfpnph32.exe File created C:\Windows\SysWOW64\Cacamdcd.dll Chagok32.exe File created C:\Windows\SysWOW64\Jdipdgch.dll Djgjlelk.exe File created C:\Windows\SysWOW64\Mjelcfha.dll Daqbip32.exe File created C:\Windows\SysWOW64\Cnffqf32.exe Cfpnph32.exe File opened for modification C:\Windows\SysWOW64\Ceckcp32.exe Cmlcbbcj.exe File opened for modification C:\Windows\SysWOW64\Ddonekbl.exe Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Dodbbdbb.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Daconoae.exe Dodbbdbb.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Djgjlelk.exe Dhhnpjmh.exe File created C:\Windows\SysWOW64\Oammoc32.dll Dodbbdbb.exe File opened for modification C:\Windows\SysWOW64\Caebma32.exe Cnffqf32.exe File opened for modification C:\Windows\SysWOW64\Chagok32.exe Ceckcp32.exe File opened for modification C:\Windows\SysWOW64\Cmnpgb32.exe Cjpckf32.exe File created C:\Windows\SysWOW64\Chcddk32.exe Ceehho32.exe File created C:\Windows\SysWOW64\Cnnlaehj.exe Chcddk32.exe File opened for modification C:\Windows\SysWOW64\Cegdnopg.exe Cnnlaehj.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Dhmgki32.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dgbdlf32.exe File opened for modification C:\Windows\SysWOW64\Cfbkeh32.exe Caebma32.exe File created C:\Windows\SysWOW64\Dodbbdbb.exe Dfnjafap.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Olfdahne.dll Cnffqf32.exe File created C:\Windows\SysWOW64\Ceckcp32.exe Cmlcbbcj.exe File created C:\Windows\SysWOW64\Eifnachf.dll Cmlcbbcj.exe File created C:\Windows\SysWOW64\Bilonkon.dll Ceehho32.exe File opened for modification C:\Windows\SysWOW64\Cnnlaehj.exe Chcddk32.exe File created C:\Windows\SysWOW64\Dejacond.exe Djdmffnn.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Mgcail32.dll Cnnlaehj.exe File opened for modification C:\Windows\SysWOW64\Dhhnpjmh.exe Dejacond.exe File created C:\Windows\SysWOW64\Cjpckf32.exe Chagok32.exe File opened for modification C:\Windows\SysWOW64\Djdmffnn.exe Dhfajjoj.exe File created C:\Windows\SysWOW64\Djgjlelk.exe Dhhnpjmh.exe File created C:\Windows\SysWOW64\Poahbe32.dll Ddonekbl.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Dhmgki32.exe File opened for modification C:\Windows\SysWOW64\Chmndlge.exe Cenahpha.exe File created C:\Windows\SysWOW64\Chagok32.exe Ceckcp32.exe File created C:\Windows\SysWOW64\Ffpmlcim.dll Cjpckf32.exe File created C:\Windows\SysWOW64\Dgbdlf32.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Cfpnph32.exe Chmndlge.exe File opened for modification C:\Windows\SysWOW64\Chcddk32.exe Ceehho32.exe File created C:\Windows\SysWOW64\Nbgngp32.dll Dejacond.exe File created C:\Windows\SysWOW64\Dhmgki32.exe Daconoae.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dgbdlf32.exe File created C:\Windows\SysWOW64\Cfbkeh32.exe Caebma32.exe File created C:\Windows\SysWOW64\Cmlcbbcj.exe Cfbkeh32.exe File created C:\Windows\SysWOW64\Djdmffnn.exe Dhfajjoj.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File created C:\Windows\SysWOW64\Amjknl32.dll Daekdooc.exe File created C:\Windows\SysWOW64\Gfghpl32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Aoglcqao.dll Cenahpha.exe File created C:\Windows\SysWOW64\Ddonekbl.exe Daqbip32.exe File opened for modification C:\Windows\SysWOW64\Daqbip32.exe Djgjlelk.exe File created C:\Windows\SysWOW64\Dfnjafap.exe Ddonekbl.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 432 4700 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddonekbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfnjafap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dodbbdbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhmgki32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnffqf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceckcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daqbip32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfbkeh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chcddk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dejacond.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djgjlelk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad6f1d6325560ac03b63dc7344142260N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chmndlge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmnpgb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chagok32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dgbdlf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfpnph32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmlcbbcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnnlaehj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cenahpha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caebma32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceehho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cegdnopg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhhnpjmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daconoae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cjpckf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhfajjoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djdmffnn.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjelcfha.dll" Daqbip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkijij32.dll" ad6f1d6325560ac03b63dc7344142260N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cenahpha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cenahpha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjpckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ingfla32.dll" Chcddk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpdaoioe.dll" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfghpl32.dll" Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 ad6f1d6325560ac03b63dc7344142260N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chmndlge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgcail32.dll" Cnnlaehj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beeppfin.dll" Dhhnpjmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bilonkon.dll" Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceehho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnnlaehj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djgjlelk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdipdgch.dll" Djgjlelk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cegdnopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddonekbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoglcqao.dll" Cenahpha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnffqf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Caebma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chagok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffpmlcim.dll" Cjpckf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnffqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdhpgj32.dll" Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfjhbihm.dll" Cfpnph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfpnph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmnpgb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhhnpjmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daconoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flgehc32.dll" Chmndlge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jekpanpa.dll" Cmnpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eokchkmi.dll" Cegdnopg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhfajjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpnkaj32.dll" Djdmffnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olfdahne.dll" Cnffqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oammoc32.dll" Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" ad6f1d6325560ac03b63dc7344142260N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chmndlge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfbkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbgngp32.dll" Dejacond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dodbbdbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node ad6f1d6325560ac03b63dc7344142260N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3124 2388 ad6f1d6325560ac03b63dc7344142260N.exe 84 PID 2388 wrote to memory of 3124 2388 ad6f1d6325560ac03b63dc7344142260N.exe 84 PID 2388 wrote to memory of 3124 2388 ad6f1d6325560ac03b63dc7344142260N.exe 84 PID 3124 wrote to memory of 3436 3124 Cenahpha.exe 85 PID 3124 wrote to memory of 3436 3124 Cenahpha.exe 85 PID 3124 wrote to memory of 3436 3124 Cenahpha.exe 85 PID 3436 wrote to memory of 5004 3436 Chmndlge.exe 86 PID 3436 wrote to memory of 5004 3436 Chmndlge.exe 86 PID 3436 wrote to memory of 5004 3436 Chmndlge.exe 86 PID 5004 wrote to memory of 3704 5004 Cfpnph32.exe 87 PID 5004 wrote to memory of 3704 5004 Cfpnph32.exe 87 PID 5004 wrote to memory of 3704 5004 Cfpnph32.exe 87 PID 3704 wrote to memory of 4296 3704 Cnffqf32.exe 88 PID 3704 wrote to memory of 4296 3704 Cnffqf32.exe 88 PID 3704 wrote to memory of 4296 3704 Cnffqf32.exe 88 PID 4296 wrote to memory of 4452 4296 Caebma32.exe 89 PID 4296 wrote to memory of 4452 4296 Caebma32.exe 89 PID 4296 wrote to memory of 4452 4296 Caebma32.exe 89 PID 4452 wrote to memory of 5072 4452 Cfbkeh32.exe 90 PID 4452 wrote to memory of 5072 4452 Cfbkeh32.exe 90 PID 4452 wrote to memory of 5072 4452 Cfbkeh32.exe 90 PID 5072 wrote to memory of 4492 5072 Cmlcbbcj.exe 91 PID 5072 wrote to memory of 4492 5072 Cmlcbbcj.exe 91 PID 5072 wrote to memory of 4492 5072 Cmlcbbcj.exe 91 PID 4492 wrote to memory of 3220 4492 Ceckcp32.exe 92 PID 4492 wrote to memory of 3220 4492 Ceckcp32.exe 92 PID 4492 wrote to memory of 3220 4492 Ceckcp32.exe 92 PID 3220 wrote to memory of 208 3220 Chagok32.exe 94 PID 3220 wrote to memory of 208 3220 Chagok32.exe 94 PID 3220 wrote to memory of 208 3220 Chagok32.exe 94 PID 208 wrote to memory of 4132 208 Cjpckf32.exe 95 PID 208 wrote to memory of 4132 208 Cjpckf32.exe 95 PID 208 wrote to memory of 4132 208 Cjpckf32.exe 95 PID 4132 wrote to memory of 3008 4132 Cmnpgb32.exe 96 PID 4132 wrote to memory of 3008 4132 Cmnpgb32.exe 96 PID 4132 wrote to memory of 3008 4132 Cmnpgb32.exe 96 PID 3008 wrote to memory of 2404 3008 Ceehho32.exe 97 PID 3008 wrote to memory of 2404 3008 Ceehho32.exe 97 PID 3008 wrote to memory of 2404 3008 Ceehho32.exe 97 PID 2404 wrote to memory of 4596 2404 Chcddk32.exe 98 PID 2404 wrote to memory of 4596 2404 Chcddk32.exe 98 PID 2404 wrote to memory of 4596 2404 Chcddk32.exe 98 PID 4596 wrote to memory of 3212 4596 Cnnlaehj.exe 99 PID 4596 wrote to memory of 3212 4596 Cnnlaehj.exe 99 PID 4596 wrote to memory of 3212 4596 Cnnlaehj.exe 99 PID 3212 wrote to memory of 4228 3212 Cegdnopg.exe 100 PID 3212 wrote to memory of 4228 3212 Cegdnopg.exe 100 PID 3212 wrote to memory of 4228 3212 Cegdnopg.exe 100 PID 4228 wrote to memory of 4780 4228 Dhfajjoj.exe 101 PID 4228 wrote to memory of 4780 4228 Dhfajjoj.exe 101 PID 4228 wrote to memory of 4780 4228 Dhfajjoj.exe 101 PID 4780 wrote to memory of 4256 4780 Djdmffnn.exe 102 PID 4780 wrote to memory of 4256 4780 Djdmffnn.exe 102 PID 4780 wrote to memory of 4256 4780 Djdmffnn.exe 102 PID 4256 wrote to memory of 4280 4256 Dejacond.exe 104 PID 4256 wrote to memory of 4280 4256 Dejacond.exe 104 PID 4256 wrote to memory of 4280 4256 Dejacond.exe 104 PID 4280 wrote to memory of 2952 4280 Dhhnpjmh.exe 105 PID 4280 wrote to memory of 2952 4280 Dhhnpjmh.exe 105 PID 4280 wrote to memory of 2952 4280 Dhhnpjmh.exe 105 PID 2952 wrote to memory of 3588 2952 Djgjlelk.exe 106 PID 2952 wrote to memory of 3588 2952 Djgjlelk.exe 106 PID 2952 wrote to memory of 3588 2952 Djgjlelk.exe 106 PID 3588 wrote to memory of 632 3588 Daqbip32.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad6f1d6325560ac03b63dc7344142260N.exe"C:\Users\Admin\AppData\Local\Temp\ad6f1d6325560ac03b63dc7344142260N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Cenahpha.exeC:\Windows\system32\Cenahpha.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\Chmndlge.exeC:\Windows\system32\Chmndlge.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\Cfpnph32.exeC:\Windows\system32\Cfpnph32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\Cnffqf32.exeC:\Windows\system32\Cnffqf32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\Caebma32.exeC:\Windows\system32\Caebma32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\Cfbkeh32.exeC:\Windows\system32\Cfbkeh32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\Cmlcbbcj.exeC:\Windows\system32\Cmlcbbcj.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\Ceckcp32.exeC:\Windows\system32\Ceckcp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\Chagok32.exeC:\Windows\system32\Chagok32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\Cjpckf32.exeC:\Windows\system32\Cjpckf32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Cmnpgb32.exeC:\Windows\system32\Cmnpgb32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\Ceehho32.exeC:\Windows\system32\Ceehho32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Chcddk32.exeC:\Windows\system32\Chcddk32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Cnnlaehj.exeC:\Windows\system32\Cnnlaehj.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\Cegdnopg.exeC:\Windows\system32\Cegdnopg.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\Dhfajjoj.exeC:\Windows\system32\Dhfajjoj.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\Djdmffnn.exeC:\Windows\system32\Djdmffnn.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\Dejacond.exeC:\Windows\system32\Dejacond.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\Dhhnpjmh.exeC:\Windows\system32\Dhhnpjmh.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\Djgjlelk.exeC:\Windows\system32\Djgjlelk.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Daqbip32.exeC:\Windows\system32\Daqbip32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\Ddonekbl.exeC:\Windows\system32\Ddonekbl.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:632 -
C:\Windows\SysWOW64\Dfnjafap.exeC:\Windows\system32\Dfnjafap.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3444 -
C:\Windows\SysWOW64\Dodbbdbb.exeC:\Windows\system32\Dodbbdbb.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2704 -
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1048 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4300 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1312 -
C:\Windows\SysWOW64\Dgbdlf32.exeC:\Windows\system32\Dgbdlf32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2772 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 42033⤵
- Program crash
PID:432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4700 -ip 47001⤵PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5a44006e282a87d5826abc9375f34c187
SHA150752bcc4b17eb61595f4fc9ac2b3c6fcd765aa9
SHA256c2f623e5eadac4ceef44cc6da42310bb340a1effd5528a0b0d283b535a21f41c
SHA51204e6be3353a2e1f113b1c2234b7bab6190e30ffd653eef2c5fc0fe0df981d4edf40a16a9652ef877584a5cb58687ea6813075c3a401d3cb52edd54687cfdd8a7
-
Filesize
64KB
MD5983a5d61d5268a2f5a8e28b12cb129f5
SHA197e7bf9e65281a84d158f280300d67c13b99986d
SHA2563d79a65f31949847f164b0030724cd6c1311981991b575b9e5c2491da464240d
SHA512bd02851accf29f67f562733158a9e9fda89915c7982dfd09688390666f216a5d075479b6e92b89d9d1fd17ae0d73dcffeb2ec88542b4d93fabd6a79b3428c04e
-
Filesize
64KB
MD5114f2ca0773d650410a4ffb722a4a562
SHA1ac90f26d0b99729eb2834fde7e2b9600d11018e4
SHA256514cfe4785004abec9f47fdbe5bdf504d858542d972b2d803ae150f3a131949d
SHA51218deb6a7b62f9bf6cce2c4390407c4b1b810ac4251abb53c3d63e55f84643e52599bc67d24e3c92c202888e4bc773a2d9106a0ec7b5fe9ba1958fd71ce52d61f
-
Filesize
64KB
MD5ed37f003b59b80a49c1fa7d33ef257a0
SHA19d698e4841ce06d7fc97900a2acf46d0d4ec4e35
SHA2569fd27b0097784f7099c5ff65bf089812b1468a179ed0b07ff63be82cc9bbe240
SHA51258e9e4c1959b1dfd0783bead96b060f1997837d10d94b79a9e037c45bf6fc186812432b8f0b2c5476e517571d85e725f1242055ed14c3ab740550a84087cc56a
-
Filesize
64KB
MD5cb1eccfa8e71d70b800840e3bbd67eb7
SHA13016aa7110e7c385d1bb73a576f5b3269176bea4
SHA256463e2bde7581c7747f806262af6e157acb830da571c2bdc2754b9b0df173ee3d
SHA512ceb49568228a17b0463f0d8a33e5b067a553e266fc76e2202ec1e7a540f45c74551cce5f2eab4aa5fd352501e13eedaead04f56043581b9bc86f255483febab3
-
Filesize
64KB
MD52ce00fcbbbef3c90516700d14b87edf6
SHA13827ae579357a24ecd44c20229240777f0ab18c6
SHA2565e8da9184c50ef464c42aa27ee95a53bf01bfdebb0b9740c8d92c364a886945f
SHA5128a9113d319cdcd4d4bd24aca3411db0951ff6ff03a6fd2276e77c2981932400684c28d8f3e9a6e754198a4a43a3da25e1a9e91fe1d590d6dd64764b0d529cb59
-
Filesize
64KB
MD59d0ce785883606574afc8a681b8f9c78
SHA169fa736492a165fdcd182b06e7476300651c0f3b
SHA2569ff97d98c4b4cab91c428d2a58b78316d75e2a234dbd259dfd2ce05a1c8c4585
SHA512230ac644f0322b32908c3cb528be6ba81a072367457a6ad67afa43b7c77b9f5f722b84a27f742e4e4483560abca908116dca520bace2daa2fa9f15b9960d48b5
-
Filesize
64KB
MD5ff09f28eebcdf82b50f940ee90dbe1e8
SHA1ba5a1abe4d1bbd3294d880a06bc1b96bf0b14584
SHA256f67c9ed8c5823417387712585b128f677007bd89833bea5c2e8737546dad0ad1
SHA512ece22881b3e174447cbbb73ebf3179f47dab3087b64c68c3b6fc691c726ee45f8a0b47020acdd0f5e7fc4c3691bed4df4b6f91816488f13b34488f316bb073dd
-
Filesize
64KB
MD56c6e14ad78143feacbb4ca1d76ccd57a
SHA1b31d6a2f839a0ebad953b5464bae35ee5b813d8b
SHA256c71662cc7578dad5dc1bbf0f865985b84f07924ff9735534a25bbb5442954371
SHA512c35dd67b32bb6fad637bab604b5db19920f7218374ecf1c7cda9cc34fa15df8b4e82d1f229bf4d97abc1cbd5e822025416503a95aecd66e67387a358b9022596
-
Filesize
64KB
MD5dbedede00abdaabbe8167f50c443da9d
SHA1ea13bfb1b860a0dd88d2bc52f5d41de346707f74
SHA256d7ebaf720fd2ae417eca76f73190aededccc06329c3e018feefc039e88d317af
SHA5126cda3edec8e858caee16c839f661b483789c54f632d2cb500316ce932395e478721109d10598eea511c7c64ec046aaf4f9c25feab18a1a12ee244c3b9762df5e
-
Filesize
64KB
MD5bed85e8f8c84aa71a45dbac069a7d4e3
SHA105642ac0212c57300adfa593dbbcc476ec61dc52
SHA25674ad8725e8bcb2bde30e47cc73fe38d1f8481ab2f3536276d8e9f2f7e76038cf
SHA51206d870c9c771b786b3e16e8b4fac9e6bff4f11727aa4188b73622ea2af11cc583d517e42d655b52dda308d89d7757aa92f4c295b94023cebbb71625dfa6e2a6f
-
Filesize
64KB
MD5253b17fe683cd5b61758318c76e830cc
SHA1bb953f75fb6c1f1310a736de5fa9974c33b485c1
SHA2569824c5a135a6843b5ef84ea44444a64209a2f13ef415104ba48c4178aff130a8
SHA5126565d3975a62e0d724a89813dee2938743df74953e10546c60a75d2a3680eb3b2fbfaa9b1649bc2f497e98fff2efdd566725277106754fe659da093c37840cf8
-
Filesize
64KB
MD5caf0ec604cd08906028b130739059a16
SHA1b4f11223b8cec2d55f51ae0a92f0ec36a6f8510e
SHA256f85df3a28fe1b802fce1bbc63fdf18a3d9a687838465966d9766c0544388e97b
SHA512c5523bc6161d4026aafabc1d1a3c55706b94c16970b5b6d8fe481eb7098868c6396851fa52b94013e9f65c1c92cac323b36b99556ff0452482530d5a621d2e86
-
Filesize
64KB
MD51b3f734404bb37632035aedca78c7a5d
SHA12dbf68f7c53a42a9df8634be7679887536f55c53
SHA2564958a136dbc6fd48def7a75058d128a0c058f49781d9a9691a9e884bc0c7f736
SHA512805c111b1203bf13668348cc1383a2331d2a3c14ec8f2274bdf609ddd817a838b2a9edfd3aedbe44dd183f6e5a0c64fe3c1d64ce14eff9ca5765bd8f7024c8ba
-
Filesize
64KB
MD5032c943c1a679c1ab8e4b5142f822efe
SHA1cad6de5a6a2f2c579466af1a80151675fe46c247
SHA256988723ed0b2f559c4caac8fd378cd4f1ae2fe1255752911f923f0673ba34db02
SHA5128ac2627ee8f3296ecd5357d12e239b4ca33c5adf79cd913f4ada6fd65cd739561beb86b8ca09bc0f47cb9b0ced2a0c621342c0bcac8b62eb5414f3aea37495a8
-
Filesize
64KB
MD5117b5222101c7a90dfbd7753c90984bb
SHA1c394515eff8fffc02255921f327c3fe717a2a6f5
SHA256139c029b9fd037019dd9a9149d4d1c6fa723c4dd6fb6a624f6fa9945393de388
SHA512ad2a73a60acf6386db8d69de80dd58218238b820fddc6afa5ad49dc0440eacf657f7c1ebcf9fed8085da85eb28e6bfcfd9f19f8f9d8c47e3e2a1fe59000b6b96
-
Filesize
64KB
MD56dbf2dff735f1e41c369947f391b6df0
SHA17212ef35c09e83ca3b76e3201da64e752a5adcb6
SHA256e7c5b709e543512328725aca0fb2743a4fa394461f6588e13b70f3246db8c666
SHA512cf2a8fd33f95b3f8cb44f9036fc5e260fab7cce808c91e886e7c067f9d6ee22184b5052e8ec6965d770d9940b7e66960c9b57e6ae1258654c3536ce4a7be0bbd
-
Filesize
64KB
MD5ddbc274b806bfec5824d036ff9f80f63
SHA1fe8bca36e77df2ec76d351936cf514c6ce319e88
SHA2566b49ca3bf6221e07a15210a99cc4ee8045bd0f57d5347d347b25a1cf64a561c4
SHA5121044f1ab9ff4b539419ca800ce302f8c7a9194d1bdd8cdbb196a01deffa079813470b4c0014b2e6bb10b7da95bb910e748da6be8f2fe3b59a13ae723dd6c64ac
-
Filesize
64KB
MD50e74435944eb484fc11e91c7934e343c
SHA1c28663976808fe884e326847a3cf17924c0ac52c
SHA25647a09aea7cfa88ef521acba3248f4b4e5d4df1699d8252094d9fda3d443e9b5c
SHA5125df4587fd2accacb86cdc533a2a8b63a087c217f49776a09fc7262e313e2c6e0e39e321ae9e72e36e9c1ba3ed4658d07d1e637f3871f3f2bfe9735c564897780
-
Filesize
64KB
MD53276a9bad0baf6305aa9d92f1c2a90cb
SHA1d9fd2b0a9ca81415109749b1c6d26fa8bae5efd5
SHA25699137b3b8f9830ce553424e27e20a58a1e163e498db401dc5797bfc2feb754a5
SHA512c970d4db72cc1d6f01d5d65a7312d66e0fb186491c4bff49c4bd77ca119f4f247d8a537bf83c3c37f21b83a74bab51285b65f615f1c750810a7a1978e193fabd
-
Filesize
64KB
MD50926f9aef0645e5043d56a83a08205d6
SHA10b2853336befd6378cf59c8941c0a526be8b23e6
SHA2566108ed35d6c14c23c14158ccf49a685224f5791c4d86f0386b8c48d0e26b4413
SHA5123d7822d4dd3d05595c22022b87b6d911299c58ee5323897f3bd114705ba5875a62623c3c696aa779ee75609cc02906176560c7f6d32ba9df518635a087ed977d
-
Filesize
64KB
MD58cc5498f449003d4800ee09f440c7a62
SHA12a2066b46713580864812430c69de861328f2482
SHA256db15ea2ac77f36463c29d633e32eb856deb30c16ef007d42173dfe9658162fef
SHA512deb14a3ba7021036ddee306c9511e7005e4802c00f4952db4da03dc1e744e67f1314e9a64d280a1c288dd36af9e134b50015703d1a1a958a15a51e4a37d07bb5
-
Filesize
64KB
MD58bf5b09d20762ce11237d0e8eda52ac6
SHA16c2267a8fb1cb5b105972447feaccd3d34ba6d8a
SHA256a1a1a454e080c70ccedd6a12d3bddfe72374fc8aef01abeab2ea74c9c8acbbd0
SHA512493e8260b179c494a23f4f7b90b5ec255d48e74b5c683b9ae261afe6b9d540cddbdb9f5c0be0af13371026f8092a60e373e577eb4da08f4ea0364418bcfb4c68
-
Filesize
64KB
MD564c02061f8d14c330e8b031674a4cba5
SHA10ecd11bbd059b9b6221546a29ed3552722cc0e3f
SHA256608798fc2bd1749fdb1236371a55d72c619fb646b644103649e991ac217a784e
SHA51227b659c6faa6a83897eb5ca45c5d4e64cd59558218857fa6438ca9ad20d2b3131c8ce40bd4eccad29425edb6b54ad0648b3a04e82a3fb3d414eedd25fa513345
-
Filesize
64KB
MD55706ed644bb3b531b5183540bebeccd4
SHA1e1f063440b7fbe7a53148d7fc3593b8feb77c485
SHA25693f7daa2d51ea23a04f4e7eae962508b2b1de99fcf02a9214cb054a156f12c93
SHA512e21c5db3a5873b3a3608218efbf25c0ca8f305203fdf1b66ee21142b492695affd9905b4405c206fec3b3158b86a2cc30c5bde371ae10a5848848dd23f97fdba
-
Filesize
64KB
MD55574b6d2c3c8e081ca3134ff691b94e7
SHA163010fa85c8a7c0bb09f58f985f029eb8004bedc
SHA256450483e30f08f71f122b2e1eb3aad653ad68de668fde97cfedaf2e53f3ac016b
SHA512bce9bd5a4ffdf4a8a57b3d9ad379e3f67279acf385d5a52fc844e957ae73975390c9695a429306ef847fa650f34294ee5b842819c472c39cd7f6021692e10737
-
Filesize
64KB
MD5c18b3bd0204b2d977d3c68ed76d48110
SHA12b7ed3fc8236acf1311d98fd0d4189dbf340babe
SHA2564f732b7fd608b2cf2e4e07e7b67898ac2c41f49a626e4c8746872173c0b03603
SHA5122767017b82bf3896cc0f070eb4f124635c54b00285221497eee4bc573cb0c8ecbe2565cf2b2947d90662747ef93c428a4b4d6ae0cb3655ed471d4f5b2ff581df
-
Filesize
64KB
MD55a44681574386bcf8353eebabecfa5cc
SHA168f7c55885fedcbb8a75b784bf8906ecba758b78
SHA256392a82a71e4ed74c595c05fc29c5e71c79af986fd3bb2cbc81e2e519b6d2c18f
SHA512fca8030a57923fd52d536805f6d47afc9657fa8b150d65c2ebda0ab837d94175e2e970b22260e3be2baa8e9103acaea555584850742915df95e5d84f6b814303
-
Filesize
64KB
MD5d5b49c29012bbc9dfa16fdcedb80757b
SHA19e6c2ae9751daa85473dfa71fec69f200ff91958
SHA2565f54e41ec5ec00da23a4de9c811cab5d623f087c90dcc158b59a98e84ac2233f
SHA51223ba9ca5d505166ff43c656410d085d93cddd861bd75aaf3725aa54029915f99ac8c0c28ac044a5fea313bb98e2242d07bfd9ebb8f342b032edcb181a5b04cfa
-
Filesize
64KB
MD5e52fc6d11afef4e9b7ac925042fb422f
SHA1f1db747f3d971658e04e3048e1ae78139dec6292
SHA25679924ac9432a2836730c30959992f14f50736847410706cb44d254ca0e0ed68f
SHA512e606ecce1aab72eb7bd6b5b34975e8da4476a9c26f216b4fbb30f870bbeba8e2adc562aa5ca8694cbe5caa4c262ca2c65e2223d9177aa1d82c4968282291beff
-
Filesize
64KB
MD5c6a6bfa7c4f695f30df3bbf4fe332c66
SHA136277a047dd54dbb596bf786f4acd913cc3d11d0
SHA256d495992c21823c9e171035656b0f9ef91fce9ef0effb9b603cb07bc8cb109653
SHA51215437ff607c2e2886c3143b2a0dc884a88238f271466420695995ca746a7cd215f75cff42764ed75233f079b333e8f73df0dc79a3cb94b9f2618726a6709b9a6