Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 02:55
Behavioral task
behavioral1
Sample
848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe
-
Size
284KB
-
MD5
848c9bf91f695c6af28cadaa862140e1
-
SHA1
369b43275f03407c3d01e50ef4d30555488aee8e
-
SHA256
2476f7b7ef5ad3c5c55b8f367d63875d1e3a3f402a7315e8071b9f4dd3566891
-
SHA512
9852d61c378b500d349843125cc32f9c66634b934e7700389868a5c126a9863ced8c3f4f8af630bfd2a3af4e1adbf9ab9015767e810f0bc37376a91300dd4eea
-
SSDEEP
6144:3k4qm4VgWSUQq0SHSVOBZ9SydFhekft7WNzDGvgreQ:U9wZbq0Sy0gWFxNWN2vgreQ
Malware Config
Extracted
cybergate
2.6
ÖÍíÉ
127.0.0.1:288
127.6.5.1:81
127.0.0.1:71
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
5
-
ftp_password
ª÷Öº+Þ
-
ftp_port
21
-
ftp_server
ftp.server.com
-
ftp_username
ftp_user
-
injected_process
svchost.exe
-
install_file
windows.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
download file
-
message_box_title
4shared
-
password
abcd1234
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\windows\\system32\\microsoft\\windows.exe" 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "c:\\windows\\system32\\microsoft\\windows.exe" 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{FH6DHM67-6JM1-64A7-TC2E-C74I8NNR4G4M} 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FH6DHM67-6JM1-64A7-TC2E-C74I8NNR4G4M}\StubPath = "c:\\windows\\system32\\microsoft\\windows.exe Restart" 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{FH6DHM67-6JM1-64A7-TC2E-C74I8NNR4G4M} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FH6DHM67-6JM1-64A7-TC2E-C74I8NNR4G4M}\StubPath = "c:\\windows\\system32\\microsoft\\windows.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4412 windows.exe -
resource yara_rule behavioral2/memory/896-0-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/896-4-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/896-64-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/5076-68-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/5076-69-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/files/0x000b000000023438-71.dat upx behavioral2/memory/896-139-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4412-564-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5076-1487-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/884-1717-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\microsoft\windows.exe 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\windows.exe 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\windows.exe 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\ 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2452 4412 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 2452 WerFault.exe 2452 WerFault.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Token: SeDebugPrivilege 884 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe Token: SeRestorePrivilege 2452 WerFault.exe Token: SeBackupPrivilege 2452 WerFault.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56 PID 896 wrote to memory of 3472 896 848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:800
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:384
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:812
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2968
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3776
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3864
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3924
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4016
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4112
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4244
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4580
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2752
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:1744
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:376
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4968
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:5032
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1968
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:3280
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:4812
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1288
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:3748
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:644
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:3012
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:1852
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1884
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:2484
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:4980
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1508
-
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵PID:1736
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1740
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:404
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1200
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2976
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1568
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2704
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1808
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1912
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1764
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2160
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2608
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3380
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\848c9bf91f695c6af28cadaa862140e1_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\windows\SysWOW64\microsoft\windows.exe"C:\windows\system32\microsoft\windows.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 5765⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3596
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4756
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5084
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4412 -ip 44122⤵PID:3040
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:212
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:3964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5f564138c1424fd83743046bd51fb8d65
SHA19452ba54b8df0aafd7f3608e5d8985649bdbeee7
SHA2566bc1d36b0a4942f8504976d2924406c2ac2145b1f295cc9c807629cafa872d76
SHA5124a5229813c04e4bfabe6754008e6180253cd679cf68320df11fbee6b5eae5ddbb3cd8f91f5e4d741b40297b39037c3d3d0e64ea2ee958205cf42797b876ab89a
-
Filesize
8B
MD59f1849b31f78030ddb9c735813aec2a4
SHA1f611fe7cf6621d0cd7d9075471542c9500d33e19
SHA2565fc0e4e5b0c2b8487698348f93579f5a44db0a1ecfae138938f94dfdc5f4f107
SHA5126df3f2a5dd1730690d5c9dc93d3c95620ef38f527f0e24fbb8560693fa2ace2c3e5876be9acd4c3c811368234f88a8f7647594e15a8a464ada7ae39a0c0bd213
-
Filesize
8B
MD5d012d019b15e4706c8de241712d3464f
SHA1a14ca6e19092f2f50e98fd1757b30d07b77398f2
SHA2564652fb34faadfa2c39005fb303bbf7aa8896bf74ef961674cf93485b31806fe0
SHA512f062816860223aae08561a3e30adec6bd912a21eb8d4ce4d1fe9785bef589dd30bcaccd27cefdce44a7136aa268c3f45242b14c0c5bd98286a9e72ca6275bc5e
-
Filesize
8B
MD585aa47bf0cbb4235295b5ba7dfb1dfb2
SHA1c6a04f5c41da517c397ce39431cd532bce7bff39
SHA2563fe07787bc77d666ce1b33ed79a91a695ab68e0d955438aac65b267eba3c3786
SHA51244ad60d0671d9da89d5b955d68eab24ae19d576a6c80026d80b3ca5d93be5289cff15c8b065da260757bb89736519b4a6d4225a4863b8bbb1a1d582684d64791
-
Filesize
8B
MD593998c47f33ebe9217d4b056e0e9b074
SHA17218c26b5a93d37d516594f515b6ea791fd4e582
SHA25624d2e071fcedeb60fa309749343d19c552a76bff5a251ff555e7e8f74ce3997d
SHA512e0ec001bca36ee32b30916b724a6dc4d5f67f52407a8965f8b126c727a723f13441173239ee4c52155aeec9b1dab1c74e99ab0ad7cd02a0ff07f3720683fad70
-
Filesize
8B
MD5f799c35aa047ab42c011ced959d93832
SHA12bab7c6b2169eeacf17e977586c99af2b5374145
SHA256accec71efd2be1b700e239dae56ddd5109628eeba6a09dd54a394a679d622f1a
SHA51290fe82128862e2d11c36b54281e4c810e46ab250d125a9c30de2d994d851c725eee7f30ed4d5a039d9eeea5238956ee850bde2683c24f5ccc3a7174b33468c4e
-
Filesize
8B
MD54ec430c523c836469ea491aa8903d285
SHA19ffd43da822f44fcc957c693ee1bbf5393d05596
SHA25617f924c0d0aeeb3b84a6eca5d59a50360c5fbf02dcbe179bc1f2edb06fd3936b
SHA512d37c71b82e5d673b45870f5b733fe4d61c97194961e04800cf30aa221ffa4333a6abc376fe867d311afa9271c47f95091300e0d84c58709b674e9eb99388c2df
-
Filesize
8B
MD5db0bd89ca9ea39e0e4e13592efe269d7
SHA1a05fa29605bbd719f7d99c305d366d9072b6e122
SHA256c03229ed78c860c94059dbe14d6d8db9638fdc5dcaf64384effac9c87871fce8
SHA5126f200746114dd0496ad523dd14a8b30806a941b8cb6b87657c69d68c71586762a998c56a256eb02f2a8954fb1cee5a22ac49407c1861304e308903946c64755a
-
Filesize
8B
MD55250dfe8e9b12a3f453b781899d5c12e
SHA18e77c5fa78a06cec53825803987a8af5e7df88d8
SHA2563f0efb0e231e4af84a1a692e0226bd16cc24b497ffbacd7315439ab5f7cfa429
SHA5127a8d4c0e89495562d953579a35718f0d92d8a1a160482367510e4acfef39f246cf8cfc1bdf6d9db799e9004448d23da2d0a1adbc325aa1a17be0657b5ef19554
-
Filesize
8B
MD5dfbdfd193551db697499ac776ddc89b4
SHA1fbb55c69618fb2ed6106037988c918136f025197
SHA2569dfc5c66f2f3202e42e9f02536c51c7283f3d1c99ed274ffbae867cd48220e98
SHA5124c2ded5fe9560ba7be82435d851f0384571bcc812ab7408661cd061dc06ce0957f8f2546eac87a2d5158893f7651a4aac3171a2497c86a573672ecde291f6678
-
Filesize
8B
MD5e7c0a8d69487ccb3f1821a78f67b4e8d
SHA1733625e85250cafefe2b173b5baed13394b4b555
SHA2566459598e7f180289aa604b610e5259297086e71a49b5049f0c00f2b98f634496
SHA5122de02b4114141b243f7a82ffd38e7f868d0a531ebf456f16bf221eaf9665873edb33f0005c185949bfa9bd8d48b80cc3fc39c98ae65da350facf483ade8e3ad1
-
Filesize
8B
MD5fb5cbbba5bbf94885a44432c2a779d15
SHA175faa0d840235173b4c3f86036ca952b259b8a18
SHA256c2e746f41f254c259dd0731d9f3eacfde379c13c11fa29e101d099d57a8e99c2
SHA51235d79b2bda88bcf22f5a27589ea7ac1412ea37e672cb6914f1c30acb7127271dec192b9f5af98d265d3b2cf55c39aa473c09c59b5151e5f2647539de0284a2bb
-
Filesize
8B
MD5c8002ddc5e7b7340520bf6fe4aa6d25b
SHA155d9e4c58da61f85d68a0a952da6d914cefae619
SHA256cc1854f33884aa3c1e47c9263b06fd56d5398dbabd18fcd0fbaca3732b26f5ae
SHA512f1e49d89b39582afb55a67079e81d8ae6bb61f2db5b55f2d212c7607198214632ccdeaf99568aa7c84e53683cf4c88809881f40b5f8c5a39cee36bea5aaa70e8
-
Filesize
8B
MD5c1d164f5670e433487ccc722a17f9100
SHA14f7bb4b29ab62fccf9cea372659d9f6caa8b64ce
SHA25646de5ae4e0856d7bdb56b1beb7944855ede65da6eb69cc3168098237954c8f97
SHA5129a67e0286897135f36a93c8de5b4cb239fdce8f97227bceda81df5d59c855b272f76deb465b5d66d544221756d2ffef1e8191a5ca6566eb2a07c5e38d5a4b6ac
-
Filesize
8B
MD5b72e2ee1c232d0e1d9bc5a7aeb6a42d7
SHA1bc59e5b6dce51552361339969f7d322a75b34539
SHA25608f859133cd3c6ecb4e35e0639ebb98024c6c06dd7cd42cc2ba19f2398561b81
SHA5128c2c6080c09543440fb950a45542dad9e707a1c36417ca7279cefb12289ab55ecba420efd7a6a37a8606eedfd991d17946e5a8743d7f2427f4259c937e7bdd42
-
Filesize
8B
MD5ff9c10b73c539ab98e826cf3797698d8
SHA1716a905abf68f296fab101788f3f033a563699f2
SHA256ceb8976f2104f26def33867aba5b1e12e4d163f3f19fbff6527b0186bab114b8
SHA512e0d7e32e480546049fc6ace5e62572ae0f5fa6819abd616e9317c1346bffee9d8567fa0e9f205e9901dd5a57a01df90eedad5082bd514e2e43941928fd5e9f69
-
Filesize
8B
MD52d48658ca223a43b3cec62db49697229
SHA12be33d19bce18b25d6e65157d13645916313eaf2
SHA2560c04e76a498f414ec0082b61b45a5dc00da554644863ef5c7586f4acbc6ea60f
SHA512d4187c8612ad63ec10a87a03b78a37a8d7d99869522e537dd60212dde0f9234f2871680b7b190f17c9a70d10a98b9ea865970e9dfa3e7b75a798d73fa73a98dd
-
Filesize
8B
MD560f402c903bb561458726e054c5e73df
SHA119dc8cf1402fd7495b812ad088315a2b214b6e35
SHA25644cd8a5bb18feb89c744bac42eeb303264075e304985c201541fd61dbcc6c37b
SHA5127c3ee4a87c3b3d6b01cad3e470803972387fe6654d46fa0ca7c85accddb96f9d4189ec6335cab3f0d7276933e973901af6ded1024d6ad4f22a94a28596f6142f
-
Filesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
Filesize
284KB
MD5848c9bf91f695c6af28cadaa862140e1
SHA1369b43275f03407c3d01e50ef4d30555488aee8e
SHA2562476f7b7ef5ad3c5c55b8f367d63875d1e3a3f402a7315e8071b9f4dd3566891
SHA5129852d61c378b500d349843125cc32f9c66634b934e7700389868a5c126a9863ced8c3f4f8af630bfd2a3af4e1adbf9ab9015767e810f0bc37376a91300dd4eea