Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe
-
Size
198KB
-
MD5
dc9eb54ed1c3e7b99c207128a76f8ebc
-
SHA1
a76f058783b6918e802d492af5adc50d05b251d7
-
SHA256
23306f0640e23f2487febf1c35be79487c5453fffe38c30ed40d3ad879b6132f
-
SHA512
66c3b0790823c4614c17cc554287ec0d434338f5156f18f7a2edaee33e43a3b1cf983b8b1dbaccf8dc0a7ed7682e9150722e4e98c0e6127b548619892394b662
-
SSDEEP
3072:8boQs34PiJiFX/Zb5L1odA77vsDUUbjTcisIJoldaLGdWHPSn98gDDcuO:8S34HedqY1HT/sMopQw8gDDcuO
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation wmpdtc32.exe -
Deletes itself 1 IoCs
pid Process 1224 wmpdtc32.exe -
Executes dropped EXE 32 IoCs
pid Process 2332 wmpdtc32.exe 1224 wmpdtc32.exe 2592 wmpdtc32.exe 2160 wmpdtc32.exe 3120 wmpdtc32.exe 2096 wmpdtc32.exe 4276 wmpdtc32.exe 1588 wmpdtc32.exe 4840 wmpdtc32.exe 1780 wmpdtc32.exe 876 wmpdtc32.exe 2228 wmpdtc32.exe 548 wmpdtc32.exe 1940 wmpdtc32.exe 2196 wmpdtc32.exe 976 wmpdtc32.exe 2700 wmpdtc32.exe 1040 wmpdtc32.exe 3688 wmpdtc32.exe 4972 wmpdtc32.exe 1340 wmpdtc32.exe 4248 wmpdtc32.exe 2752 wmpdtc32.exe 2660 wmpdtc32.exe 3748 wmpdtc32.exe 4492 wmpdtc32.exe 844 wmpdtc32.exe 2664 wmpdtc32.exe 4976 wmpdtc32.exe 2272 wmpdtc32.exe 1060 wmpdtc32.exe 1348 wmpdtc32.exe -
resource yara_rule behavioral2/memory/1004-0-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1004-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1004-3-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1004-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1004-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1224-44-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1004-47-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1224-48-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1224-55-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2160-60-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2160-65-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2096-69-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2096-72-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1588-77-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1588-80-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2228-87-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1780-86-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1780-89-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2228-95-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2228-98-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1940-103-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1940-106-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/976-112-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/976-115-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1040-120-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1040-123-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4972-129-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4972-132-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4248-137-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4248-142-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2660-146-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2660-151-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4492-156-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4492-160-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2664-164-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2664-169-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2272-173-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2272-178-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 34 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpdtc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpdtc32.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File created C:\Windows\SysWOW64\wmpdtc32.exe wmpdtc32.exe File opened for modification C:\Windows\SysWOW64\ wmpdtc32.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 3792 set thread context of 1004 3792 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 83 PID 2332 set thread context of 1224 2332 wmpdtc32.exe 95 PID 2592 set thread context of 2160 2592 wmpdtc32.exe 98 PID 3120 set thread context of 2096 3120 wmpdtc32.exe 100 PID 4276 set thread context of 1588 4276 wmpdtc32.exe 104 PID 4840 set thread context of 1780 4840 wmpdtc32.exe 106 PID 876 set thread context of 2228 876 wmpdtc32.exe 108 PID 548 set thread context of 1940 548 wmpdtc32.exe 110 PID 2196 set thread context of 976 2196 wmpdtc32.exe 112 PID 2700 set thread context of 1040 2700 wmpdtc32.exe 114 PID 3688 set thread context of 4972 3688 wmpdtc32.exe 116 PID 1340 set thread context of 4248 1340 wmpdtc32.exe 118 PID 2752 set thread context of 2660 2752 wmpdtc32.exe 120 PID 3748 set thread context of 4492 3748 wmpdtc32.exe 122 PID 844 set thread context of 2664 844 wmpdtc32.exe 124 PID 4976 set thread context of 2272 4976 wmpdtc32.exe 126 PID 1060 set thread context of 1348 1060 wmpdtc32.exe 128 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpdtc32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpdtc32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1004 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 1004 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 1004 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 1004 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 1224 wmpdtc32.exe 1224 wmpdtc32.exe 1224 wmpdtc32.exe 1224 wmpdtc32.exe 2160 wmpdtc32.exe 2160 wmpdtc32.exe 2160 wmpdtc32.exe 2160 wmpdtc32.exe 2096 wmpdtc32.exe 2096 wmpdtc32.exe 2096 wmpdtc32.exe 2096 wmpdtc32.exe 1588 wmpdtc32.exe 1588 wmpdtc32.exe 1588 wmpdtc32.exe 1588 wmpdtc32.exe 1780 wmpdtc32.exe 1780 wmpdtc32.exe 1780 wmpdtc32.exe 1780 wmpdtc32.exe 2228 wmpdtc32.exe 2228 wmpdtc32.exe 2228 wmpdtc32.exe 2228 wmpdtc32.exe 1940 wmpdtc32.exe 1940 wmpdtc32.exe 1940 wmpdtc32.exe 1940 wmpdtc32.exe 976 wmpdtc32.exe 976 wmpdtc32.exe 976 wmpdtc32.exe 976 wmpdtc32.exe 1040 wmpdtc32.exe 1040 wmpdtc32.exe 1040 wmpdtc32.exe 1040 wmpdtc32.exe 4972 wmpdtc32.exe 4972 wmpdtc32.exe 4972 wmpdtc32.exe 4972 wmpdtc32.exe 4248 wmpdtc32.exe 4248 wmpdtc32.exe 4248 wmpdtc32.exe 4248 wmpdtc32.exe 2660 wmpdtc32.exe 2660 wmpdtc32.exe 2660 wmpdtc32.exe 2660 wmpdtc32.exe 4492 wmpdtc32.exe 4492 wmpdtc32.exe 4492 wmpdtc32.exe 4492 wmpdtc32.exe 2664 wmpdtc32.exe 2664 wmpdtc32.exe 2664 wmpdtc32.exe 2664 wmpdtc32.exe 2272 wmpdtc32.exe 2272 wmpdtc32.exe 2272 wmpdtc32.exe 2272 wmpdtc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 1004 3792 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 83 PID 3792 wrote to memory of 1004 3792 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 83 PID 3792 wrote to memory of 1004 3792 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 83 PID 3792 wrote to memory of 1004 3792 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 83 PID 3792 wrote to memory of 1004 3792 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 83 PID 3792 wrote to memory of 1004 3792 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 83 PID 3792 wrote to memory of 1004 3792 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 83 PID 1004 wrote to memory of 2332 1004 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 93 PID 1004 wrote to memory of 2332 1004 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 93 PID 1004 wrote to memory of 2332 1004 dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe 93 PID 2332 wrote to memory of 1224 2332 wmpdtc32.exe 95 PID 2332 wrote to memory of 1224 2332 wmpdtc32.exe 95 PID 2332 wrote to memory of 1224 2332 wmpdtc32.exe 95 PID 2332 wrote to memory of 1224 2332 wmpdtc32.exe 95 PID 2332 wrote to memory of 1224 2332 wmpdtc32.exe 95 PID 2332 wrote to memory of 1224 2332 wmpdtc32.exe 95 PID 2332 wrote to memory of 1224 2332 wmpdtc32.exe 95 PID 1224 wrote to memory of 2592 1224 wmpdtc32.exe 97 PID 1224 wrote to memory of 2592 1224 wmpdtc32.exe 97 PID 1224 wrote to memory of 2592 1224 wmpdtc32.exe 97 PID 2592 wrote to memory of 2160 2592 wmpdtc32.exe 98 PID 2592 wrote to memory of 2160 2592 wmpdtc32.exe 98 PID 2592 wrote to memory of 2160 2592 wmpdtc32.exe 98 PID 2592 wrote to memory of 2160 2592 wmpdtc32.exe 98 PID 2592 wrote to memory of 2160 2592 wmpdtc32.exe 98 PID 2592 wrote to memory of 2160 2592 wmpdtc32.exe 98 PID 2592 wrote to memory of 2160 2592 wmpdtc32.exe 98 PID 2160 wrote to memory of 3120 2160 wmpdtc32.exe 99 PID 2160 wrote to memory of 3120 2160 wmpdtc32.exe 99 PID 2160 wrote to memory of 3120 2160 wmpdtc32.exe 99 PID 3120 wrote to memory of 2096 3120 wmpdtc32.exe 100 PID 3120 wrote to memory of 2096 3120 wmpdtc32.exe 100 PID 3120 wrote to memory of 2096 3120 wmpdtc32.exe 100 PID 3120 wrote to memory of 2096 3120 wmpdtc32.exe 100 PID 3120 wrote to memory of 2096 3120 wmpdtc32.exe 100 PID 3120 wrote to memory of 2096 3120 wmpdtc32.exe 100 PID 3120 wrote to memory of 2096 3120 wmpdtc32.exe 100 PID 2096 wrote to memory of 4276 2096 wmpdtc32.exe 103 PID 2096 wrote to memory of 4276 2096 wmpdtc32.exe 103 PID 2096 wrote to memory of 4276 2096 wmpdtc32.exe 103 PID 4276 wrote to memory of 1588 4276 wmpdtc32.exe 104 PID 4276 wrote to memory of 1588 4276 wmpdtc32.exe 104 PID 4276 wrote to memory of 1588 4276 wmpdtc32.exe 104 PID 4276 wrote to memory of 1588 4276 wmpdtc32.exe 104 PID 4276 wrote to memory of 1588 4276 wmpdtc32.exe 104 PID 4276 wrote to memory of 1588 4276 wmpdtc32.exe 104 PID 4276 wrote to memory of 1588 4276 wmpdtc32.exe 104 PID 1588 wrote to memory of 4840 1588 wmpdtc32.exe 105 PID 1588 wrote to memory of 4840 1588 wmpdtc32.exe 105 PID 1588 wrote to memory of 4840 1588 wmpdtc32.exe 105 PID 4840 wrote to memory of 1780 4840 wmpdtc32.exe 106 PID 4840 wrote to memory of 1780 4840 wmpdtc32.exe 106 PID 4840 wrote to memory of 1780 4840 wmpdtc32.exe 106 PID 4840 wrote to memory of 1780 4840 wmpdtc32.exe 106 PID 4840 wrote to memory of 1780 4840 wmpdtc32.exe 106 PID 4840 wrote to memory of 1780 4840 wmpdtc32.exe 106 PID 4840 wrote to memory of 1780 4840 wmpdtc32.exe 106 PID 1780 wrote to memory of 876 1780 wmpdtc32.exe 107 PID 1780 wrote to memory of 876 1780 wmpdtc32.exe 107 PID 1780 wrote to memory of 876 1780 wmpdtc32.exe 107 PID 876 wrote to memory of 2228 876 wmpdtc32.exe 108 PID 876 wrote to memory of 2228 876 wmpdtc32.exe 108 PID 876 wrote to memory of 2228 876 wmpdtc32.exe 108 PID 876 wrote to memory of 2228 876 wmpdtc32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc9eb54ed1c3e7b99c207128a76f8ebc_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Users\Admin\AppData\Local\Temp\DC9EB5~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Users\Admin\AppData\Local\Temp\DC9EB5~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:976 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3688 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4972 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4248 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\wmpdtc32.exe"C:\Windows\system32\wmpdtc32.exe" C:\Windows\SysWOW64\wmpdtc32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:1348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5dc9eb54ed1c3e7b99c207128a76f8ebc
SHA1a76f058783b6918e802d492af5adc50d05b251d7
SHA25623306f0640e23f2487febf1c35be79487c5453fffe38c30ed40d3ad879b6132f
SHA51266c3b0790823c4614c17cc554287ec0d434338f5156f18f7a2edaee33e43a3b1cf983b8b1dbaccf8dc0a7ed7682e9150722e4e98c0e6127b548619892394b662