Analysis
-
max time kernel
162s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe
Resource
win10v2004-20220812-en
General
-
Target
99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe
-
Size
202KB
-
MD5
354d967bad7246ccfe991bf5145823bd
-
SHA1
cc2646129c81b8a2e8c86f8981c0860b597c5715
-
SHA256
99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
-
SHA512
03e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
SSDEEP
3072:fvIO+GJioPq+PYAsGghkRmBxSxXDzubM5Rk+WZye0uHekRID3SsG8DGtedJpJjql:fJHVIeXDzubM0B0uED3SVtgjq1+s
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 26 IoCs
pid Process 4936 igfxct32.exe 4872 igfxct32.exe 1600 igfxct32.exe 1316 igfxct32.exe 3164 igfxct32.exe 1528 igfxct32.exe 3972 igfxct32.exe 4256 igfxct32.exe 1612 igfxct32.exe 2672 igfxct32.exe 1516 igfxct32.exe 4404 igfxct32.exe 1680 igfxct32.exe 2140 igfxct32.exe 3984 igfxct32.exe 4560 igfxct32.exe 5088 igfxct32.exe 2328 igfxct32.exe 4828 igfxct32.exe 2728 igfxct32.exe 5104 igfxct32.exe 1508 igfxct32.exe 1524 igfxct32.exe 1600 igfxct32.exe 1296 igfxct32.exe 1452 igfxct32.exe -
resource yara_rule behavioral2/memory/2604-133-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2604-135-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2604-136-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2604-137-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2604-138-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4872-148-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2604-149-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4872-152-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4872-153-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1316-160-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1316-163-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1528-170-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1528-173-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4256-180-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4256-183-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2672-190-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2672-193-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4404-200-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4404-203-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2140-210-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2140-213-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4560-220-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/4560-223-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2328-230-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2328-233-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2728-240-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/2728-244-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1508-251-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1508-254-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1600-261-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1600-264-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/memory/1452-271-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation igfxct32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe -
Maps connected drives based on registry 3 TTPs 28 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxct32.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\ 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File created C:\Windows\SysWOW64\igfxct32.exe igfxct32.exe File opened for modification C:\Windows\SysWOW64\ igfxct32.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 3312 set thread context of 2604 3312 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 80 PID 4936 set thread context of 4872 4936 igfxct32.exe 83 PID 1600 set thread context of 1316 1600 igfxct32.exe 85 PID 3164 set thread context of 1528 3164 igfxct32.exe 87 PID 3972 set thread context of 4256 3972 igfxct32.exe 92 PID 1612 set thread context of 2672 1612 igfxct32.exe 97 PID 1516 set thread context of 4404 1516 igfxct32.exe 99 PID 1680 set thread context of 2140 1680 igfxct32.exe 101 PID 3984 set thread context of 4560 3984 igfxct32.exe 103 PID 5088 set thread context of 2328 5088 igfxct32.exe 105 PID 4828 set thread context of 2728 4828 igfxct32.exe 107 PID 5104 set thread context of 1508 5104 igfxct32.exe 109 PID 1524 set thread context of 1600 1524 igfxct32.exe 111 PID 1296 set thread context of 1452 1296 igfxct32.exe 113 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxct32.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2604 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 2604 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 2604 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 2604 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 4872 igfxct32.exe 4872 igfxct32.exe 4872 igfxct32.exe 4872 igfxct32.exe 1316 igfxct32.exe 1316 igfxct32.exe 1316 igfxct32.exe 1316 igfxct32.exe 1528 igfxct32.exe 1528 igfxct32.exe 1528 igfxct32.exe 1528 igfxct32.exe 4256 igfxct32.exe 4256 igfxct32.exe 4256 igfxct32.exe 4256 igfxct32.exe 2672 igfxct32.exe 2672 igfxct32.exe 2672 igfxct32.exe 2672 igfxct32.exe 4404 igfxct32.exe 4404 igfxct32.exe 4404 igfxct32.exe 4404 igfxct32.exe 2140 igfxct32.exe 2140 igfxct32.exe 2140 igfxct32.exe 2140 igfxct32.exe 4560 igfxct32.exe 4560 igfxct32.exe 4560 igfxct32.exe 4560 igfxct32.exe 2328 igfxct32.exe 2328 igfxct32.exe 2328 igfxct32.exe 2328 igfxct32.exe 2728 igfxct32.exe 2728 igfxct32.exe 2728 igfxct32.exe 2728 igfxct32.exe 1508 igfxct32.exe 1508 igfxct32.exe 1508 igfxct32.exe 1508 igfxct32.exe 1600 igfxct32.exe 1600 igfxct32.exe 1600 igfxct32.exe 1600 igfxct32.exe 1452 igfxct32.exe 1452 igfxct32.exe 1452 igfxct32.exe 1452 igfxct32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 2604 3312 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 80 PID 3312 wrote to memory of 2604 3312 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 80 PID 3312 wrote to memory of 2604 3312 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 80 PID 3312 wrote to memory of 2604 3312 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 80 PID 3312 wrote to memory of 2604 3312 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 80 PID 3312 wrote to memory of 2604 3312 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 80 PID 3312 wrote to memory of 2604 3312 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 80 PID 2604 wrote to memory of 4936 2604 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 82 PID 2604 wrote to memory of 4936 2604 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 82 PID 2604 wrote to memory of 4936 2604 99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe 82 PID 4936 wrote to memory of 4872 4936 igfxct32.exe 83 PID 4936 wrote to memory of 4872 4936 igfxct32.exe 83 PID 4936 wrote to memory of 4872 4936 igfxct32.exe 83 PID 4936 wrote to memory of 4872 4936 igfxct32.exe 83 PID 4936 wrote to memory of 4872 4936 igfxct32.exe 83 PID 4936 wrote to memory of 4872 4936 igfxct32.exe 83 PID 4936 wrote to memory of 4872 4936 igfxct32.exe 83 PID 4872 wrote to memory of 1600 4872 igfxct32.exe 84 PID 4872 wrote to memory of 1600 4872 igfxct32.exe 84 PID 4872 wrote to memory of 1600 4872 igfxct32.exe 84 PID 1600 wrote to memory of 1316 1600 igfxct32.exe 85 PID 1600 wrote to memory of 1316 1600 igfxct32.exe 85 PID 1600 wrote to memory of 1316 1600 igfxct32.exe 85 PID 1600 wrote to memory of 1316 1600 igfxct32.exe 85 PID 1600 wrote to memory of 1316 1600 igfxct32.exe 85 PID 1600 wrote to memory of 1316 1600 igfxct32.exe 85 PID 1600 wrote to memory of 1316 1600 igfxct32.exe 85 PID 1316 wrote to memory of 3164 1316 igfxct32.exe 86 PID 1316 wrote to memory of 3164 1316 igfxct32.exe 86 PID 1316 wrote to memory of 3164 1316 igfxct32.exe 86 PID 3164 wrote to memory of 1528 3164 igfxct32.exe 87 PID 3164 wrote to memory of 1528 3164 igfxct32.exe 87 PID 3164 wrote to memory of 1528 3164 igfxct32.exe 87 PID 3164 wrote to memory of 1528 3164 igfxct32.exe 87 PID 3164 wrote to memory of 1528 3164 igfxct32.exe 87 PID 3164 wrote to memory of 1528 3164 igfxct32.exe 87 PID 3164 wrote to memory of 1528 3164 igfxct32.exe 87 PID 1528 wrote to memory of 3972 1528 igfxct32.exe 91 PID 1528 wrote to memory of 3972 1528 igfxct32.exe 91 PID 1528 wrote to memory of 3972 1528 igfxct32.exe 91 PID 3972 wrote to memory of 4256 3972 igfxct32.exe 92 PID 3972 wrote to memory of 4256 3972 igfxct32.exe 92 PID 3972 wrote to memory of 4256 3972 igfxct32.exe 92 PID 3972 wrote to memory of 4256 3972 igfxct32.exe 92 PID 3972 wrote to memory of 4256 3972 igfxct32.exe 92 PID 3972 wrote to memory of 4256 3972 igfxct32.exe 92 PID 3972 wrote to memory of 4256 3972 igfxct32.exe 92 PID 4256 wrote to memory of 1612 4256 igfxct32.exe 96 PID 4256 wrote to memory of 1612 4256 igfxct32.exe 96 PID 4256 wrote to memory of 1612 4256 igfxct32.exe 96 PID 1612 wrote to memory of 2672 1612 igfxct32.exe 97 PID 1612 wrote to memory of 2672 1612 igfxct32.exe 97 PID 1612 wrote to memory of 2672 1612 igfxct32.exe 97 PID 1612 wrote to memory of 2672 1612 igfxct32.exe 97 PID 1612 wrote to memory of 2672 1612 igfxct32.exe 97 PID 1612 wrote to memory of 2672 1612 igfxct32.exe 97 PID 1612 wrote to memory of 2672 1612 igfxct32.exe 97 PID 2672 wrote to memory of 1516 2672 igfxct32.exe 98 PID 2672 wrote to memory of 1516 2672 igfxct32.exe 98 PID 2672 wrote to memory of 1516 2672 igfxct32.exe 98 PID 1516 wrote to memory of 4404 1516 igfxct32.exe 99 PID 1516 wrote to memory of 4404 1516 igfxct32.exe 99 PID 1516 wrote to memory of 4404 1516 igfxct32.exe 99 PID 1516 wrote to memory of 4404 1516 igfxct32.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe"C:\Users\Admin\AppData\Local\Temp\99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe"C:\Users\Admin\AppData\Local\Temp\99deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Users\Admin\AppData\Local\Temp\99DEAE~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Users\Admin\AppData\Local\Temp\99DEAE~1.EXE4⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe8⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe10⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe12⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4404 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1680 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe16⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3984 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe18⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4560 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5088 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe20⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4828 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe22⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5104 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe24⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1524 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe26⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1296 -
C:\Windows\SysWOW64\igfxct32.exe"C:\Windows\system32\igfxct32.exe" C:\Windows\SysWOW64\igfxct32.exe28⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7
-
Filesize
202KB
MD5354d967bad7246ccfe991bf5145823bd
SHA1cc2646129c81b8a2e8c86f8981c0860b597c5715
SHA25699deae7640eee2611b43d5b73f5ee579476c7b2d0930a878a2dcee397432d728
SHA51203e5f1d4247db2c3e8fdb84d542f28fa36e08036cac4739267e255d593320a410af7c71e9fd6f55fb09d2fe95769740c0016fe0b7a8068e96ce1016f9af63cf7