Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 20:29
Behavioral task
behavioral1
Sample
038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
038f738e8ab47a16ef2a8d71e435714b
-
SHA1
e0b0f7d30b54d5b4d2a1112c02a03e3ba9cb9d93
-
SHA256
db6acf6ff0226ca18c8a0ab374df8d123c3e7c44cd72929774320a4baada0f51
-
SHA512
82f466524b22e721e436dd05ec12ef8d0c7ab8d237ebc14ba48ad9550b88fa4a5ecc277ccd19d2f7147ed401c5c6f98047e76fe10d430186e56a078d7a282b5c
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZH:0UzeyQMS4DqodCnoe+iitjWwwj
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 2404 explorer.exe 1772 explorer.exe 1948 spoolsv.exe 940 spoolsv.exe 1596 spoolsv.exe 2004 spoolsv.exe 2060 spoolsv.exe 1072 spoolsv.exe 2488 spoolsv.exe 1760 spoolsv.exe 1912 spoolsv.exe 2728 spoolsv.exe 2144 spoolsv.exe 2220 spoolsv.exe 1612 spoolsv.exe 2616 spoolsv.exe 864 spoolsv.exe 1996 spoolsv.exe 752 spoolsv.exe 1468 spoolsv.exe 1288 spoolsv.exe 2260 spoolsv.exe 2696 spoolsv.exe 1384 spoolsv.exe 2704 spoolsv.exe 3012 spoolsv.exe 3020 spoolsv.exe 2308 spoolsv.exe 2512 spoolsv.exe 2992 spoolsv.exe 2572 spoolsv.exe 2552 spoolsv.exe 2504 spoolsv.exe 2300 spoolsv.exe 2368 spoolsv.exe 1156 spoolsv.exe 1640 spoolsv.exe 1836 spoolsv.exe 2752 spoolsv.exe 2412 spoolsv.exe 556 spoolsv.exe 1644 spoolsv.exe 1940 spoolsv.exe 3032 spoolsv.exe 1372 spoolsv.exe 2812 spoolsv.exe 2664 spoolsv.exe 1216 spoolsv.exe 2588 spoolsv.exe 1068 spoolsv.exe 2988 spoolsv.exe 2652 spoolsv.exe 2984 spoolsv.exe 1616 spoolsv.exe 636 spoolsv.exe 1824 spoolsv.exe 2536 explorer.exe 1936 spoolsv.exe 1700 spoolsv.exe 2476 spoolsv.exe 1136 spoolsv.exe 1908 spoolsv.exe 2424 spoolsv.exe 2716 explorer.exe -
Loads dropped DLL 64 IoCs
pid Process 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 43 IoCs
description pid Process procid_target PID 2696 set thread context of 2624 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 31 PID 2404 set thread context of 1772 2404 explorer.exe 33 PID 1948 set thread context of 1824 1948 spoolsv.exe 87 PID 940 set thread context of 1936 940 spoolsv.exe 89 PID 2004 set thread context of 1700 2004 spoolsv.exe 90 PID 1596 set thread context of 2476 1596 spoolsv.exe 91 PID 1072 set thread context of 1136 1072 spoolsv.exe 92 PID 2060 set thread context of 2424 2060 spoolsv.exe 94 PID 1760 set thread context of 3172 1760 spoolsv.exe 96 PID 2488 set thread context of 3332 2488 spoolsv.exe 98 PID 2728 set thread context of 3596 2728 spoolsv.exe 99 PID 1912 set thread context of 3604 1912 spoolsv.exe 100 PID 2220 set thread context of 3880 2220 spoolsv.exe 103 PID 2144 set thread context of 3976 2144 spoolsv.exe 104 PID 1612 set thread context of 4064 1612 spoolsv.exe 105 PID 2616 set thread context of 2396 2616 spoolsv.exe 106 PID 864 set thread context of 564 864 spoolsv.exe 107 PID 752 set thread context of 3400 752 spoolsv.exe 108 PID 1616 set thread context of 3324 1616 spoolsv.exe 109 PID 1996 set thread context of 3472 1996 spoolsv.exe 110 PID 1288 set thread context of 1540 1288 spoolsv.exe 111 PID 2696 set thread context of 3808 2696 spoolsv.exe 113 PID 1468 set thread context of 3856 1468 spoolsv.exe 115 PID 2260 set thread context of 608 2260 spoolsv.exe 116 PID 1384 set thread context of 308 1384 spoolsv.exe 117 PID 3020 set thread context of 3996 3020 spoolsv.exe 118 PID 2512 set thread context of 4048 2512 spoolsv.exe 119 PID 2504 set thread context of 1744 2504 spoolsv.exe 121 PID 2664 set thread context of 924 2664 spoolsv.exe 120 PID 2704 set thread context of 4056 2704 spoolsv.exe 123 PID 2572 set thread context of 3056 2572 spoolsv.exe 122 PID 2368 set thread context of 2032 2368 spoolsv.exe 124 PID 1640 set thread context of 1792 1640 spoolsv.exe 125 PID 2752 set thread context of 1628 2752 spoolsv.exe 128 PID 556 set thread context of 4076 556 spoolsv.exe 126 PID 1372 set thread context of 1200 1372 spoolsv.exe 129 PID 2992 set thread context of 912 2992 spoolsv.exe 132 PID 1156 set thread context of 2304 1156 spoolsv.exe 131 PID 1940 set thread context of 4092 1940 spoolsv.exe 127 PID 3012 set thread context of 2672 3012 spoolsv.exe 133 PID 2308 set thread context of 2892 2308 spoolsv.exe 134 PID 2988 set thread context of 888 2988 spoolsv.exe 135 PID 2588 set thread context of 2044 2588 spoolsv.exe 130 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1772 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1772 explorer.exe 1824 spoolsv.exe 1824 spoolsv.exe 1936 spoolsv.exe 1936 spoolsv.exe 1700 spoolsv.exe 1700 spoolsv.exe 2476 spoolsv.exe 2476 spoolsv.exe 1136 spoolsv.exe 1136 spoolsv.exe 2424 spoolsv.exe 2424 spoolsv.exe 3172 spoolsv.exe 3172 spoolsv.exe 3332 spoolsv.exe 3332 spoolsv.exe 3596 spoolsv.exe 3596 spoolsv.exe 3604 spoolsv.exe 3604 spoolsv.exe 3880 spoolsv.exe 3880 spoolsv.exe 3976 spoolsv.exe 3976 spoolsv.exe 4064 spoolsv.exe 4064 spoolsv.exe 2396 spoolsv.exe 2396 spoolsv.exe 564 spoolsv.exe 564 spoolsv.exe 3400 spoolsv.exe 3400 spoolsv.exe 3324 spoolsv.exe 3324 spoolsv.exe 3472 spoolsv.exe 3472 spoolsv.exe 1540 spoolsv.exe 1540 spoolsv.exe 3808 spoolsv.exe 3808 spoolsv.exe 608 spoolsv.exe 608 spoolsv.exe 3856 spoolsv.exe 3856 spoolsv.exe 308 spoolsv.exe 308 spoolsv.exe 4048 spoolsv.exe 4048 spoolsv.exe 3996 spoolsv.exe 3996 spoolsv.exe 1744 spoolsv.exe 924 spoolsv.exe 1744 spoolsv.exe 924 spoolsv.exe 4056 spoolsv.exe 2032 spoolsv.exe 3056 spoolsv.exe 4056 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1888 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 28 PID 2696 wrote to memory of 1888 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 28 PID 2696 wrote to memory of 1888 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 28 PID 2696 wrote to memory of 1888 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 28 PID 2696 wrote to memory of 2624 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 31 PID 2696 wrote to memory of 2624 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 31 PID 2696 wrote to memory of 2624 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 31 PID 2696 wrote to memory of 2624 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 31 PID 2696 wrote to memory of 2624 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 31 PID 2696 wrote to memory of 2624 2696 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2404 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2404 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2404 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2404 2624 038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe 32 PID 2404 wrote to memory of 1772 2404 explorer.exe 33 PID 2404 wrote to memory of 1772 2404 explorer.exe 33 PID 2404 wrote to memory of 1772 2404 explorer.exe 33 PID 2404 wrote to memory of 1772 2404 explorer.exe 33 PID 2404 wrote to memory of 1772 2404 explorer.exe 33 PID 2404 wrote to memory of 1772 2404 explorer.exe 33 PID 1772 wrote to memory of 1948 1772 explorer.exe 34 PID 1772 wrote to memory of 1948 1772 explorer.exe 34 PID 1772 wrote to memory of 1948 1772 explorer.exe 34 PID 1772 wrote to memory of 1948 1772 explorer.exe 34 PID 1772 wrote to memory of 940 1772 explorer.exe 35 PID 1772 wrote to memory of 940 1772 explorer.exe 35 PID 1772 wrote to memory of 940 1772 explorer.exe 35 PID 1772 wrote to memory of 940 1772 explorer.exe 35 PID 1772 wrote to memory of 1596 1772 explorer.exe 36 PID 1772 wrote to memory of 1596 1772 explorer.exe 36 PID 1772 wrote to memory of 1596 1772 explorer.exe 36 PID 1772 wrote to memory of 1596 1772 explorer.exe 36 PID 1772 wrote to memory of 2004 1772 explorer.exe 37 PID 1772 wrote to memory of 2004 1772 explorer.exe 37 PID 1772 wrote to memory of 2004 1772 explorer.exe 37 PID 1772 wrote to memory of 2004 1772 explorer.exe 37 PID 1772 wrote to memory of 2060 1772 explorer.exe 38 PID 1772 wrote to memory of 2060 1772 explorer.exe 38 PID 1772 wrote to memory of 2060 1772 explorer.exe 38 PID 1772 wrote to memory of 2060 1772 explorer.exe 38 PID 1772 wrote to memory of 1072 1772 explorer.exe 39 PID 1772 wrote to memory of 1072 1772 explorer.exe 39 PID 1772 wrote to memory of 1072 1772 explorer.exe 39 PID 1772 wrote to memory of 1072 1772 explorer.exe 39 PID 1772 wrote to memory of 2488 1772 explorer.exe 40 PID 1772 wrote to memory of 2488 1772 explorer.exe 40 PID 1772 wrote to memory of 2488 1772 explorer.exe 40 PID 1772 wrote to memory of 2488 1772 explorer.exe 40 PID 1772 wrote to memory of 1760 1772 explorer.exe 41 PID 1772 wrote to memory of 1760 1772 explorer.exe 41 PID 1772 wrote to memory of 1760 1772 explorer.exe 41 PID 1772 wrote to memory of 1760 1772 explorer.exe 41 PID 1772 wrote to memory of 1912 1772 explorer.exe 42 PID 1772 wrote to memory of 1912 1772 explorer.exe 42 PID 1772 wrote to memory of 1912 1772 explorer.exe 42 PID 1772 wrote to memory of 1912 1772 explorer.exe 42 PID 1772 wrote to memory of 2728 1772 explorer.exe 43 PID 1772 wrote to memory of 2728 1772 explorer.exe 43 PID 1772 wrote to memory of 2728 1772 explorer.exe 43 PID 1772 wrote to memory of 2728 1772 explorer.exe 43 PID 1772 wrote to memory of 2144 1772 explorer.exe 44 PID 1772 wrote to memory of 2144 1772 explorer.exe 44 PID 1772 wrote to memory of 2144 1772 explorer.exe 44 PID 1772 wrote to memory of 2144 1772 explorer.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\038f738e8ab47a16ef2a8d71e435714b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1824 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2536
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2004 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2060 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2716
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1072 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2488 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3332
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1760 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3172
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2728 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3596 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3660
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2144 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3976
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2220 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3880
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1612 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4064
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:864 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:564
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1996 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3400
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1468 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1288 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2260 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:608
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2696 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3808 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3848
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1384 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:308
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2704 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4056
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3012 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3020 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3996
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2308 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2892
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2512 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4048
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2992 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:472
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2504 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1744 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2600
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2300 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3084
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2368 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1156 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1640 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1792
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3508
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2752 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3060
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:556 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4076
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1644 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3288
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4092
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3032 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3080
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1372 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1200
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2812 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2664 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1216 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1608
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2588 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2044
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1068 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3220
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2988 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:888
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2652 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3232
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2984 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2568
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1616 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:3324
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:636
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1908
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3204
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3668
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3692
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4068
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3644
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:800
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3352
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2468
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
56KB
MD5bd72dcf1083b6e22ccbfa0e8e27fb1e0
SHA13fd23d4f14da768da7b8364d74c54932d704e74e
SHA25690f44f69950a796ab46ff09181585ac9dabf21271f16ebb9ea385c957e5955c1
SHA51272360ab4078ad5e0152324f9a856b3396e2d0247f7f95ac8a5a53a25126ac3cff567cc523849e28d92a99730ee8ffb30366f09c428258f93a5cca6d0c5905562
-
Filesize
2.2MB
MD5f6d0e2eafb2b0101c17fe242105108c1
SHA112e8f0742c931400154b402ca48f31fa671acfdf
SHA256346a3b52d894fd1bade35218c35a1818ee334a4275b5a9a869e588167860195f
SHA512e8a10bfcef81cefeabb3f420f3f07617676395bc709cbf34a076a690c1f7fea5f53b0255fad04310d7fbeaa01703195320eb86c736e3740170d24f444accf8cc
-
Filesize
2.2MB
MD56814d0a8b29d923d40a6a433df0d3c24
SHA1d13dec2f8e7f57070f44b048fd111088f2eb12fd
SHA2561acf297f1c7921e99221c80b2cfd21fa76278265bf3af25d2dd9b89171174907
SHA5126ce2261a8bcc28fc2fb369574ec5d1d906d531a4256168b414890f2d4174ec4dda79cc0bec7c54d329a6dfd3a4dfd061d5ac8ac8ccd181fe56b2d1283600df16