Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 19:34
Behavioral task
behavioral1
Sample
dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe
-
Size
247KB
-
MD5
dec4216130e239a42f0269214a19eb2c
-
SHA1
95ddfca6203a5bb939e94cad2f9d69a3a2c50de5
-
SHA256
8d515c1ed35ec2cbe416f9b7e3d8e8146ddb4f2361981a6e50aae32d8c2141ed
-
SHA512
5b04d58b6d88302cf2bc41acb8b2b565829da2e0e11a4a45ba617dbafc5a76152fc84af6fc8e7daf78b6fde8c4d409c37c422bd48d2302f7f0c5e8443fba1a17
-
SSDEEP
6144:EfE2i2j97gI2HDFZdbLvnxVKvYWef16STg:8E2phgI2jhbjPKv4QSTg
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2760 igfxbm32.exe -
Executes dropped EXE 40 IoCs
pid Process 2760 igfxbm32.exe 2856 igfxbm32.exe 2488 igfxbm32.exe 2452 igfxbm32.exe 1124 igfxbm32.exe 2952 igfxbm32.exe 568 igfxbm32.exe 1792 igfxbm32.exe 1984 igfxbm32.exe 1132 igfxbm32.exe 1692 igfxbm32.exe 1696 igfxbm32.exe 1368 igfxbm32.exe 824 igfxbm32.exe 2324 igfxbm32.exe 916 igfxbm32.exe 2224 igfxbm32.exe 2436 igfxbm32.exe 2236 igfxbm32.exe 1080 igfxbm32.exe 2600 igfxbm32.exe 2796 igfxbm32.exe 2468 igfxbm32.exe 2996 igfxbm32.exe 2488 igfxbm32.exe 2452 igfxbm32.exe 1632 igfxbm32.exe 2456 igfxbm32.exe 548 igfxbm32.exe 676 igfxbm32.exe 2252 igfxbm32.exe 1800 igfxbm32.exe 2420 igfxbm32.exe 2168 igfxbm32.exe 956 igfxbm32.exe 2888 igfxbm32.exe 1520 igfxbm32.exe 812 igfxbm32.exe 2440 igfxbm32.exe 1932 igfxbm32.exe -
Loads dropped DLL 64 IoCs
pid Process 2656 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe 2656 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe 2760 igfxbm32.exe 2760 igfxbm32.exe 2856 igfxbm32.exe 2856 igfxbm32.exe 2488 igfxbm32.exe 2488 igfxbm32.exe 2452 igfxbm32.exe 2452 igfxbm32.exe 1124 igfxbm32.exe 1124 igfxbm32.exe 2952 igfxbm32.exe 2952 igfxbm32.exe 568 igfxbm32.exe 568 igfxbm32.exe 1792 igfxbm32.exe 1792 igfxbm32.exe 1984 igfxbm32.exe 1984 igfxbm32.exe 1132 igfxbm32.exe 1132 igfxbm32.exe 1692 igfxbm32.exe 1692 igfxbm32.exe 1696 igfxbm32.exe 1696 igfxbm32.exe 1368 igfxbm32.exe 1368 igfxbm32.exe 824 igfxbm32.exe 824 igfxbm32.exe 2324 igfxbm32.exe 2324 igfxbm32.exe 916 igfxbm32.exe 916 igfxbm32.exe 2224 igfxbm32.exe 2224 igfxbm32.exe 2436 igfxbm32.exe 2436 igfxbm32.exe 2236 igfxbm32.exe 2236 igfxbm32.exe 1080 igfxbm32.exe 1080 igfxbm32.exe 2600 igfxbm32.exe 2600 igfxbm32.exe 2796 igfxbm32.exe 2796 igfxbm32.exe 2468 igfxbm32.exe 2468 igfxbm32.exe 2996 igfxbm32.exe 2996 igfxbm32.exe 2488 igfxbm32.exe 2488 igfxbm32.exe 2452 igfxbm32.exe 2452 igfxbm32.exe 1632 igfxbm32.exe 1632 igfxbm32.exe 2456 igfxbm32.exe 2456 igfxbm32.exe 548 igfxbm32.exe 548 igfxbm32.exe 676 igfxbm32.exe 676 igfxbm32.exe 2252 igfxbm32.exe 2252 igfxbm32.exe -
resource yara_rule behavioral1/memory/2656-0-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/files/0x0009000000012255-9.dat upx behavioral1/memory/2760-16-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/2760-17-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/2760-22-0x00000000044C0000-0x000000000458E000-memory.dmp upx behavioral1/memory/1692-80-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/1696-86-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/1080-122-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/2488-140-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/1632-147-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/548-151-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/812-173-0x0000000000400000-0x00000000004CE000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxbm32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\ igfxbm32.exe File opened for modification C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe File created C:\Windows\SysWOW64\igfxbm32.exe igfxbm32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxbm32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe 2656 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe 2760 igfxbm32.exe 2760 igfxbm32.exe 2856 igfxbm32.exe 2856 igfxbm32.exe 2488 igfxbm32.exe 2488 igfxbm32.exe 2452 igfxbm32.exe 2452 igfxbm32.exe 1124 igfxbm32.exe 1124 igfxbm32.exe 2952 igfxbm32.exe 2952 igfxbm32.exe 568 igfxbm32.exe 568 igfxbm32.exe 1792 igfxbm32.exe 1792 igfxbm32.exe 1984 igfxbm32.exe 1984 igfxbm32.exe 1132 igfxbm32.exe 1132 igfxbm32.exe 1692 igfxbm32.exe 1692 igfxbm32.exe 1696 igfxbm32.exe 1696 igfxbm32.exe 1368 igfxbm32.exe 1368 igfxbm32.exe 824 igfxbm32.exe 824 igfxbm32.exe 2324 igfxbm32.exe 2324 igfxbm32.exe 916 igfxbm32.exe 916 igfxbm32.exe 2224 igfxbm32.exe 2224 igfxbm32.exe 2436 igfxbm32.exe 2436 igfxbm32.exe 1080 igfxbm32.exe 1080 igfxbm32.exe 2600 igfxbm32.exe 2600 igfxbm32.exe 2796 igfxbm32.exe 2796 igfxbm32.exe 2468 igfxbm32.exe 2468 igfxbm32.exe 2996 igfxbm32.exe 2996 igfxbm32.exe 2488 igfxbm32.exe 2488 igfxbm32.exe 2452 igfxbm32.exe 2452 igfxbm32.exe 1632 igfxbm32.exe 1632 igfxbm32.exe 2456 igfxbm32.exe 2456 igfxbm32.exe 548 igfxbm32.exe 548 igfxbm32.exe 676 igfxbm32.exe 676 igfxbm32.exe 2252 igfxbm32.exe 2252 igfxbm32.exe 1800 igfxbm32.exe 1800 igfxbm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2760 2656 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2760 2656 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2760 2656 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2760 2656 dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe 30 PID 2760 wrote to memory of 2856 2760 igfxbm32.exe 31 PID 2760 wrote to memory of 2856 2760 igfxbm32.exe 31 PID 2760 wrote to memory of 2856 2760 igfxbm32.exe 31 PID 2760 wrote to memory of 2856 2760 igfxbm32.exe 31 PID 2856 wrote to memory of 2488 2856 igfxbm32.exe 32 PID 2856 wrote to memory of 2488 2856 igfxbm32.exe 32 PID 2856 wrote to memory of 2488 2856 igfxbm32.exe 32 PID 2856 wrote to memory of 2488 2856 igfxbm32.exe 32 PID 2488 wrote to memory of 2452 2488 igfxbm32.exe 33 PID 2488 wrote to memory of 2452 2488 igfxbm32.exe 33 PID 2488 wrote to memory of 2452 2488 igfxbm32.exe 33 PID 2488 wrote to memory of 2452 2488 igfxbm32.exe 33 PID 2452 wrote to memory of 1124 2452 igfxbm32.exe 34 PID 2452 wrote to memory of 1124 2452 igfxbm32.exe 34 PID 2452 wrote to memory of 1124 2452 igfxbm32.exe 34 PID 2452 wrote to memory of 1124 2452 igfxbm32.exe 34 PID 1124 wrote to memory of 2952 1124 igfxbm32.exe 35 PID 1124 wrote to memory of 2952 1124 igfxbm32.exe 35 PID 1124 wrote to memory of 2952 1124 igfxbm32.exe 35 PID 1124 wrote to memory of 2952 1124 igfxbm32.exe 35 PID 2952 wrote to memory of 568 2952 igfxbm32.exe 36 PID 2952 wrote to memory of 568 2952 igfxbm32.exe 36 PID 2952 wrote to memory of 568 2952 igfxbm32.exe 36 PID 2952 wrote to memory of 568 2952 igfxbm32.exe 36 PID 568 wrote to memory of 1792 568 igfxbm32.exe 37 PID 568 wrote to memory of 1792 568 igfxbm32.exe 37 PID 568 wrote to memory of 1792 568 igfxbm32.exe 37 PID 568 wrote to memory of 1792 568 igfxbm32.exe 37 PID 1792 wrote to memory of 1984 1792 igfxbm32.exe 38 PID 1792 wrote to memory of 1984 1792 igfxbm32.exe 38 PID 1792 wrote to memory of 1984 1792 igfxbm32.exe 38 PID 1792 wrote to memory of 1984 1792 igfxbm32.exe 38 PID 1984 wrote to memory of 1132 1984 igfxbm32.exe 39 PID 1984 wrote to memory of 1132 1984 igfxbm32.exe 39 PID 1984 wrote to memory of 1132 1984 igfxbm32.exe 39 PID 1984 wrote to memory of 1132 1984 igfxbm32.exe 39 PID 1132 wrote to memory of 1692 1132 igfxbm32.exe 40 PID 1132 wrote to memory of 1692 1132 igfxbm32.exe 40 PID 1132 wrote to memory of 1692 1132 igfxbm32.exe 40 PID 1132 wrote to memory of 1692 1132 igfxbm32.exe 40 PID 1692 wrote to memory of 1696 1692 igfxbm32.exe 41 PID 1692 wrote to memory of 1696 1692 igfxbm32.exe 41 PID 1692 wrote to memory of 1696 1692 igfxbm32.exe 41 PID 1692 wrote to memory of 1696 1692 igfxbm32.exe 41 PID 1696 wrote to memory of 1368 1696 igfxbm32.exe 42 PID 1696 wrote to memory of 1368 1696 igfxbm32.exe 42 PID 1696 wrote to memory of 1368 1696 igfxbm32.exe 42 PID 1696 wrote to memory of 1368 1696 igfxbm32.exe 42 PID 1368 wrote to memory of 824 1368 igfxbm32.exe 43 PID 1368 wrote to memory of 824 1368 igfxbm32.exe 43 PID 1368 wrote to memory of 824 1368 igfxbm32.exe 43 PID 1368 wrote to memory of 824 1368 igfxbm32.exe 43 PID 824 wrote to memory of 2324 824 igfxbm32.exe 44 PID 824 wrote to memory of 2324 824 igfxbm32.exe 44 PID 824 wrote to memory of 2324 824 igfxbm32.exe 44 PID 824 wrote to memory of 2324 824 igfxbm32.exe 44 PID 2324 wrote to memory of 916 2324 igfxbm32.exe 45 PID 2324 wrote to memory of 916 2324 igfxbm32.exe 45 PID 2324 wrote to memory of 916 2324 igfxbm32.exe 45 PID 2324 wrote to memory of 916 2324 igfxbm32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dec4216130e239a42f0269214a19eb2c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Users\Admin\AppData\Local\Temp\DEC421~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:916 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1080 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:812 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\igfxbm32.exe"C:\Windows\system32\igfxbm32.exe" C:\Windows\SysWOW64\igfxbm32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD5dec4216130e239a42f0269214a19eb2c
SHA195ddfca6203a5bb939e94cad2f9d69a3a2c50de5
SHA2568d515c1ed35ec2cbe416f9b7e3d8e8146ddb4f2361981a6e50aae32d8c2141ed
SHA5125b04d58b6d88302cf2bc41acb8b2b565829da2e0e11a4a45ba617dbafc5a76152fc84af6fc8e7daf78b6fde8c4d409c37c422bd48d2302f7f0c5e8443fba1a17