Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe
-
Size
228KB
-
MD5
ea303063e08daf8e3a2f681f43f99d98
-
SHA1
b628f5439cd990fdb0e394fbe70a25a0d8989f87
-
SHA256
14fe6f3564aa67459d8c71631c7fc4571394bfeeeffea9c20e3e954c34e14aaa
-
SHA512
8665329b593680b9507201fa9e87d54255c7032ef268d316c2e1a59ce8f03fbabbf946005433b0d69e18fd309892ca8cc30a52d8689e9deedba32a44ad6c4e1f
-
SSDEEP
3072:Lsr0rpQfJNsEEPlr9+q5DhqGonmv0CGebUCQEtDRQ2myWZEdJevwd:ggS/sBd+m0CrbP3tt0E
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 31 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation igfxdw32.exe -
Deletes itself 1 IoCs
pid Process 336 igfxdw32.exe -
Executes dropped EXE 62 IoCs
pid Process 2168 igfxdw32.exe 336 igfxdw32.exe 2368 igfxdw32.exe 3548 igfxdw32.exe 4844 igfxdw32.exe 4788 igfxdw32.exe 4040 igfxdw32.exe 4204 igfxdw32.exe 4860 igfxdw32.exe 1500 igfxdw32.exe 8 igfxdw32.exe 3320 igfxdw32.exe 4556 igfxdw32.exe 2952 igfxdw32.exe 740 igfxdw32.exe 2548 igfxdw32.exe 4516 igfxdw32.exe 3596 igfxdw32.exe 4628 igfxdw32.exe 324 igfxdw32.exe 4296 igfxdw32.exe 4468 igfxdw32.exe 4576 igfxdw32.exe 4004 igfxdw32.exe 2904 igfxdw32.exe 3044 igfxdw32.exe 1056 igfxdw32.exe 2668 igfxdw32.exe 2888 igfxdw32.exe 5060 igfxdw32.exe 1864 igfxdw32.exe 4984 igfxdw32.exe 4624 igfxdw32.exe 2512 igfxdw32.exe 2900 igfxdw32.exe 5000 igfxdw32.exe 3552 igfxdw32.exe 3784 igfxdw32.exe 1088 igfxdw32.exe 4000 igfxdw32.exe 4664 igfxdw32.exe 2564 igfxdw32.exe 4964 igfxdw32.exe 4556 igfxdw32.exe 2864 igfxdw32.exe 1760 igfxdw32.exe 2980 igfxdw32.exe 1904 igfxdw32.exe 1456 igfxdw32.exe 1512 igfxdw32.exe 116 igfxdw32.exe 1048 igfxdw32.exe 2176 igfxdw32.exe 3448 igfxdw32.exe 2904 igfxdw32.exe 1848 igfxdw32.exe 4668 igfxdw32.exe 1056 igfxdw32.exe 1540 igfxdw32.exe 3056 igfxdw32.exe 1716 igfxdw32.exe 3156 igfxdw32.exe -
resource yara_rule behavioral2/memory/2656-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2656-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2656-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2656-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2656-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/336-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/336-46-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3548-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4788-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4204-68-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1500-76-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3320-83-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2952-91-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2548-97-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2548-99-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3596-107-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/324-114-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4468-121-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4004-130-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3044-139-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2668-147-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5060-155-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4984-163-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2512-171-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/5000-180-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3784-188-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4000-196-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2564-204-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4556-213-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1760-221-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1904-227-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1512-233-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1048-239-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3448-245-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1848-251-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1056-257-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3056-263-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdw32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File opened for modification C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe File created C:\Windows\SysWOW64\igfxdw32.exe igfxdw32.exe File opened for modification C:\Windows\SysWOW64\ igfxdw32.exe -
Suspicious use of SetThreadContext 32 IoCs
description pid Process procid_target PID 3372 set thread context of 2656 3372 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 84 PID 2168 set thread context of 336 2168 igfxdw32.exe 89 PID 2368 set thread context of 3548 2368 igfxdw32.exe 93 PID 4844 set thread context of 4788 4844 igfxdw32.exe 95 PID 4040 set thread context of 4204 4040 igfxdw32.exe 97 PID 4860 set thread context of 1500 4860 igfxdw32.exe 99 PID 8 set thread context of 3320 8 igfxdw32.exe 102 PID 4556 set thread context of 2952 4556 igfxdw32.exe 105 PID 740 set thread context of 2548 740 igfxdw32.exe 107 PID 4516 set thread context of 3596 4516 igfxdw32.exe 109 PID 4628 set thread context of 324 4628 igfxdw32.exe 111 PID 4296 set thread context of 4468 4296 igfxdw32.exe 113 PID 4576 set thread context of 4004 4576 igfxdw32.exe 115 PID 2904 set thread context of 3044 2904 igfxdw32.exe 117 PID 1056 set thread context of 2668 1056 igfxdw32.exe 119 PID 2888 set thread context of 5060 2888 igfxdw32.exe 121 PID 1864 set thread context of 4984 1864 igfxdw32.exe 123 PID 4624 set thread context of 2512 4624 igfxdw32.exe 125 PID 2900 set thread context of 5000 2900 igfxdw32.exe 127 PID 3552 set thread context of 3784 3552 igfxdw32.exe 129 PID 1088 set thread context of 4000 1088 igfxdw32.exe 131 PID 4664 set thread context of 2564 4664 igfxdw32.exe 133 PID 4964 set thread context of 4556 4964 igfxdw32.exe 135 PID 2864 set thread context of 1760 2864 igfxdw32.exe 137 PID 2980 set thread context of 1904 2980 igfxdw32.exe 139 PID 1456 set thread context of 1512 1456 igfxdw32.exe 141 PID 116 set thread context of 1048 116 igfxdw32.exe 143 PID 2176 set thread context of 3448 2176 igfxdw32.exe 145 PID 2904 set thread context of 1848 2904 igfxdw32.exe 147 PID 4668 set thread context of 1056 4668 igfxdw32.exe 149 PID 1540 set thread context of 3056 1540 igfxdw32.exe 151 PID 1716 set thread context of 3156 1716 igfxdw32.exe 153 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdw32.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdw32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 2656 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 2656 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 2656 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 336 igfxdw32.exe 336 igfxdw32.exe 336 igfxdw32.exe 336 igfxdw32.exe 3548 igfxdw32.exe 3548 igfxdw32.exe 3548 igfxdw32.exe 3548 igfxdw32.exe 4788 igfxdw32.exe 4788 igfxdw32.exe 4788 igfxdw32.exe 4788 igfxdw32.exe 4204 igfxdw32.exe 4204 igfxdw32.exe 4204 igfxdw32.exe 4204 igfxdw32.exe 1500 igfxdw32.exe 1500 igfxdw32.exe 1500 igfxdw32.exe 1500 igfxdw32.exe 3320 igfxdw32.exe 3320 igfxdw32.exe 3320 igfxdw32.exe 3320 igfxdw32.exe 2952 igfxdw32.exe 2952 igfxdw32.exe 2952 igfxdw32.exe 2952 igfxdw32.exe 2548 igfxdw32.exe 2548 igfxdw32.exe 2548 igfxdw32.exe 2548 igfxdw32.exe 3596 igfxdw32.exe 3596 igfxdw32.exe 3596 igfxdw32.exe 3596 igfxdw32.exe 324 igfxdw32.exe 324 igfxdw32.exe 324 igfxdw32.exe 324 igfxdw32.exe 4468 igfxdw32.exe 4468 igfxdw32.exe 4468 igfxdw32.exe 4468 igfxdw32.exe 4004 igfxdw32.exe 4004 igfxdw32.exe 4004 igfxdw32.exe 4004 igfxdw32.exe 3044 igfxdw32.exe 3044 igfxdw32.exe 3044 igfxdw32.exe 3044 igfxdw32.exe 2668 igfxdw32.exe 2668 igfxdw32.exe 2668 igfxdw32.exe 2668 igfxdw32.exe 5060 igfxdw32.exe 5060 igfxdw32.exe 5060 igfxdw32.exe 5060 igfxdw32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2656 3372 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 84 PID 3372 wrote to memory of 2656 3372 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 84 PID 3372 wrote to memory of 2656 3372 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 84 PID 3372 wrote to memory of 2656 3372 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 84 PID 3372 wrote to memory of 2656 3372 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 84 PID 3372 wrote to memory of 2656 3372 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 84 PID 3372 wrote to memory of 2656 3372 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 84 PID 2656 wrote to memory of 2168 2656 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 87 PID 2656 wrote to memory of 2168 2656 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 87 PID 2656 wrote to memory of 2168 2656 ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe 87 PID 2168 wrote to memory of 336 2168 igfxdw32.exe 89 PID 2168 wrote to memory of 336 2168 igfxdw32.exe 89 PID 2168 wrote to memory of 336 2168 igfxdw32.exe 89 PID 2168 wrote to memory of 336 2168 igfxdw32.exe 89 PID 2168 wrote to memory of 336 2168 igfxdw32.exe 89 PID 2168 wrote to memory of 336 2168 igfxdw32.exe 89 PID 2168 wrote to memory of 336 2168 igfxdw32.exe 89 PID 336 wrote to memory of 2368 336 igfxdw32.exe 92 PID 336 wrote to memory of 2368 336 igfxdw32.exe 92 PID 336 wrote to memory of 2368 336 igfxdw32.exe 92 PID 2368 wrote to memory of 3548 2368 igfxdw32.exe 93 PID 2368 wrote to memory of 3548 2368 igfxdw32.exe 93 PID 2368 wrote to memory of 3548 2368 igfxdw32.exe 93 PID 2368 wrote to memory of 3548 2368 igfxdw32.exe 93 PID 2368 wrote to memory of 3548 2368 igfxdw32.exe 93 PID 2368 wrote to memory of 3548 2368 igfxdw32.exe 93 PID 2368 wrote to memory of 3548 2368 igfxdw32.exe 93 PID 3548 wrote to memory of 4844 3548 igfxdw32.exe 94 PID 3548 wrote to memory of 4844 3548 igfxdw32.exe 94 PID 3548 wrote to memory of 4844 3548 igfxdw32.exe 94 PID 4844 wrote to memory of 4788 4844 igfxdw32.exe 95 PID 4844 wrote to memory of 4788 4844 igfxdw32.exe 95 PID 4844 wrote to memory of 4788 4844 igfxdw32.exe 95 PID 4844 wrote to memory of 4788 4844 igfxdw32.exe 95 PID 4844 wrote to memory of 4788 4844 igfxdw32.exe 95 PID 4844 wrote to memory of 4788 4844 igfxdw32.exe 95 PID 4844 wrote to memory of 4788 4844 igfxdw32.exe 95 PID 4788 wrote to memory of 4040 4788 igfxdw32.exe 96 PID 4788 wrote to memory of 4040 4788 igfxdw32.exe 96 PID 4788 wrote to memory of 4040 4788 igfxdw32.exe 96 PID 4040 wrote to memory of 4204 4040 igfxdw32.exe 97 PID 4040 wrote to memory of 4204 4040 igfxdw32.exe 97 PID 4040 wrote to memory of 4204 4040 igfxdw32.exe 97 PID 4040 wrote to memory of 4204 4040 igfxdw32.exe 97 PID 4040 wrote to memory of 4204 4040 igfxdw32.exe 97 PID 4040 wrote to memory of 4204 4040 igfxdw32.exe 97 PID 4040 wrote to memory of 4204 4040 igfxdw32.exe 97 PID 4204 wrote to memory of 4860 4204 igfxdw32.exe 98 PID 4204 wrote to memory of 4860 4204 igfxdw32.exe 98 PID 4204 wrote to memory of 4860 4204 igfxdw32.exe 98 PID 4860 wrote to memory of 1500 4860 igfxdw32.exe 99 PID 4860 wrote to memory of 1500 4860 igfxdw32.exe 99 PID 4860 wrote to memory of 1500 4860 igfxdw32.exe 99 PID 4860 wrote to memory of 1500 4860 igfxdw32.exe 99 PID 4860 wrote to memory of 1500 4860 igfxdw32.exe 99 PID 4860 wrote to memory of 1500 4860 igfxdw32.exe 99 PID 4860 wrote to memory of 1500 4860 igfxdw32.exe 99 PID 1500 wrote to memory of 8 1500 igfxdw32.exe 100 PID 1500 wrote to memory of 8 1500 igfxdw32.exe 100 PID 1500 wrote to memory of 8 1500 igfxdw32.exe 100 PID 8 wrote to memory of 3320 8 igfxdw32.exe 102 PID 8 wrote to memory of 3320 8 igfxdw32.exe 102 PID 8 wrote to memory of 3320 8 igfxdw32.exe 102 PID 8 wrote to memory of 3320 8 igfxdw32.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea303063e08daf8e3a2f681f43f99d98_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Users\Admin\AppData\Local\Temp\EA3030~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Users\Admin\AppData\Local\Temp\EA3030~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3320 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3596 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4628 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:324 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4296 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4468 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4576 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4004 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4984 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2512 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5000 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3784 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4556 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1904 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1512 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:116 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1048 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3448 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1848 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3056 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\igfxdw32.exe"C:\Windows\system32\igfxdw32.exe" C:\Windows\SysWOW64\igfxdw32.exe64⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:3156
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5ea303063e08daf8e3a2f681f43f99d98
SHA1b628f5439cd990fdb0e394fbe70a25a0d8989f87
SHA25614fe6f3564aa67459d8c71631c7fc4571394bfeeeffea9c20e3e954c34e14aaa
SHA5128665329b593680b9507201fa9e87d54255c7032ef268d316c2e1a59ce8f03fbabbf946005433b0d69e18fd309892ca8cc30a52d8689e9deedba32a44ad6c4e1f