Analysis
-
max time kernel
59s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe
-
Size
281KB
-
MD5
955b74dfb09b447254f29aab492ce709
-
SHA1
46e98f0ea9e3274ec3411c7550edcbcf9d99039e
-
SHA256
d6c785ddd37a6cb6c0d6cbdd3dea85bb58e14c21e6969891bcf32c66a601c1be
-
SHA512
2d52a9824c9bf3eaeb666e70df2a2f4029a55765bcfdc27dde8067afc22747f7f40a0c5c63d5b45f3e0b7298e45a14eefcce795f4448986fa6bfcee4eb782677
-
SSDEEP
6144:Hb30Xv5Mq6KhWOqjn2yDwsTA6FdcP2ovWZ3jmodsFljac:Hq5ZVWOqjnpDdAedM7v+hdklja
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 20 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation igfxdmv32.exe -
Deletes itself 1 IoCs
pid Process 4600 igfxdmv32.exe -
Executes dropped EXE 19 IoCs
pid Process 4600 igfxdmv32.exe 4752 igfxdmv32.exe 2720 igfxdmv32.exe 5844 igfxdmv32.exe 2084 igfxdmv32.exe 1560 igfxdmv32.exe 932 igfxdmv32.exe 4080 igfxdmv32.exe 2816 igfxdmv32.exe 2352 igfxdmv32.exe 3876 igfxdmv32.exe 1384 igfxdmv32.exe 1456 igfxdmv32.exe 4348 igfxdmv32.exe 1192 igfxdmv32.exe 3228 igfxdmv32.exe 1412 igfxdmv32.exe 4440 igfxdmv32.exe 4592 igfxdmv32.exe -
Maps connected drives based on registry 3 TTPs 40 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxdmv32.exe -
Drops file in System32 directory 60 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File opened for modification C:\Windows\SysWOW64\ igfxdmv32.exe File created C:\Windows\SysWOW64\igfxdmv32.exe igfxdmv32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 4600 igfxdmv32.exe 4752 igfxdmv32.exe 2720 igfxdmv32.exe 5844 igfxdmv32.exe 2084 igfxdmv32.exe 1560 igfxdmv32.exe 932 igfxdmv32.exe 4080 igfxdmv32.exe 2816 igfxdmv32.exe 2352 igfxdmv32.exe 3876 igfxdmv32.exe 1384 igfxdmv32.exe 1456 igfxdmv32.exe 4348 igfxdmv32.exe 1192 igfxdmv32.exe 3228 igfxdmv32.exe 1412 igfxdmv32.exe 4440 igfxdmv32.exe 4592 igfxdmv32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxdmv32.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxdmv32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe 4600 igfxdmv32.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1784 wrote to memory of 4600 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 88 PID 1784 wrote to memory of 4600 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 88 PID 1784 wrote to memory of 4600 1784 JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe 88 PID 4600 wrote to memory of 4752 4600 igfxdmv32.exe 93 PID 4600 wrote to memory of 4752 4600 igfxdmv32.exe 93 PID 4600 wrote to memory of 4752 4600 igfxdmv32.exe 93 PID 4752 wrote to memory of 2720 4752 igfxdmv32.exe 95 PID 4752 wrote to memory of 2720 4752 igfxdmv32.exe 95 PID 4752 wrote to memory of 2720 4752 igfxdmv32.exe 95 PID 2720 wrote to memory of 5844 2720 igfxdmv32.exe 98 PID 2720 wrote to memory of 5844 2720 igfxdmv32.exe 98 PID 2720 wrote to memory of 5844 2720 igfxdmv32.exe 98 PID 5844 wrote to memory of 2084 5844 igfxdmv32.exe 99 PID 5844 wrote to memory of 2084 5844 igfxdmv32.exe 99 PID 5844 wrote to memory of 2084 5844 igfxdmv32.exe 99 PID 2084 wrote to memory of 1560 2084 igfxdmv32.exe 100 PID 2084 wrote to memory of 1560 2084 igfxdmv32.exe 100 PID 2084 wrote to memory of 1560 2084 igfxdmv32.exe 100 PID 1560 wrote to memory of 932 1560 igfxdmv32.exe 101 PID 1560 wrote to memory of 932 1560 igfxdmv32.exe 101 PID 1560 wrote to memory of 932 1560 igfxdmv32.exe 101 PID 932 wrote to memory of 4080 932 igfxdmv32.exe 102 PID 932 wrote to memory of 4080 932 igfxdmv32.exe 102 PID 932 wrote to memory of 4080 932 igfxdmv32.exe 102 PID 4080 wrote to memory of 2816 4080 igfxdmv32.exe 103 PID 4080 wrote to memory of 2816 4080 igfxdmv32.exe 103 PID 4080 wrote to memory of 2816 4080 igfxdmv32.exe 103 PID 2816 wrote to memory of 2352 2816 igfxdmv32.exe 105 PID 2816 wrote to memory of 2352 2816 igfxdmv32.exe 105 PID 2816 wrote to memory of 2352 2816 igfxdmv32.exe 105 PID 2352 wrote to memory of 3876 2352 igfxdmv32.exe 107 PID 2352 wrote to memory of 3876 2352 igfxdmv32.exe 107 PID 2352 wrote to memory of 3876 2352 igfxdmv32.exe 107 PID 3876 wrote to memory of 1384 3876 igfxdmv32.exe 114 PID 3876 wrote to memory of 1384 3876 igfxdmv32.exe 114 PID 3876 wrote to memory of 1384 3876 igfxdmv32.exe 114 PID 1384 wrote to memory of 1456 1384 igfxdmv32.exe 116 PID 1384 wrote to memory of 1456 1384 igfxdmv32.exe 116 PID 1384 wrote to memory of 1456 1384 igfxdmv32.exe 116 PID 1456 wrote to memory of 4348 1456 igfxdmv32.exe 117 PID 1456 wrote to memory of 4348 1456 igfxdmv32.exe 117 PID 1456 wrote to memory of 4348 1456 igfxdmv32.exe 117 PID 4348 wrote to memory of 1192 4348 igfxdmv32.exe 118 PID 4348 wrote to memory of 1192 4348 igfxdmv32.exe 118 PID 4348 wrote to memory of 1192 4348 igfxdmv32.exe 118 PID 1192 wrote to memory of 3228 1192 igfxdmv32.exe 119 PID 1192 wrote to memory of 3228 1192 igfxdmv32.exe 119 PID 1192 wrote to memory of 3228 1192 igfxdmv32.exe 119 PID 3228 wrote to memory of 1412 3228 igfxdmv32.exe 120 PID 3228 wrote to memory of 1412 3228 igfxdmv32.exe 120 PID 3228 wrote to memory of 1412 3228 igfxdmv32.exe 120 PID 1412 wrote to memory of 4440 1412 igfxdmv32.exe 121 PID 1412 wrote to memory of 4440 1412 igfxdmv32.exe 121 PID 1412 wrote to memory of 4440 1412 igfxdmv32.exe 121 PID 4440 wrote to memory of 4592 4440 igfxdmv32.exe 122 PID 4440 wrote to memory of 4592 4440 igfxdmv32.exe 122 PID 4440 wrote to memory of 4592 4440 igfxdmv32.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5844 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4592 -
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE21⤵PID:4560
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE22⤵PID:2976
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE23⤵PID:4500
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE24⤵PID:4212
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE25⤵PID:1148
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE26⤵PID:5448
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE27⤵PID:5636
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE28⤵PID:1524
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE29⤵PID:1688
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE30⤵PID:3712
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE31⤵PID:3272
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE32⤵PID:3224
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE33⤵PID:3344
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE34⤵PID:1476
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE35⤵PID:4384
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE36⤵PID:800
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE37⤵PID:5860
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE38⤵PID:1888
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE39⤵PID:3360
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE40⤵PID:2340
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE41⤵PID:4240
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE42⤵PID:5244
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE43⤵PID:3884
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE44⤵PID:4932
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE45⤵PID:2000
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE46⤵PID:908
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE47⤵PID:1128
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE48⤵PID:2824
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE49⤵PID:3556
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE50⤵PID:640
-
C:\Windows\SysWOW64\igfxdmv32.exe"C:\Windows\system32\igfxdmv32.exe" C:\Windows\SysWOW64\IGFXDM~1.EXE51⤵PID:852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5955b74dfb09b447254f29aab492ce709
SHA146e98f0ea9e3274ec3411c7550edcbcf9d99039e
SHA256d6c785ddd37a6cb6c0d6cbdd3dea85bb58e14c21e6969891bcf32c66a601c1be
SHA5122d52a9824c9bf3eaeb666e70df2a2f4029a55765bcfdc27dde8067afc22747f7f40a0c5c63d5b45f3e0b7298e45a14eefcce795f4448986fa6bfcee4eb782677