Overview
overview
7Static
static
32f7152879d...18.exe
windows7-x64
72f7152879d...18.exe
windows10-2004-x64
7$PLUGINSDI...sg.dll
windows7-x64
1$PLUGINSDI...sg.dll
windows10-2004-x64
1$PLUGINSDI...am.dll
windows7-x64
3$PLUGINSDI...am.dll
windows10-2004-x64
3$PLUGINSDI...ew.dll
windows7-x64
3$PLUGINSDI...ew.dll
windows10-2004-x64
3$PLUGINSDI...ug.dll
windows7-x64
3$PLUGINSDI...ug.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
1$PLUGINSDI...ns.dll
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ta.dll
windows7-x64
3$PLUGINSDI...ta.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
1$PLUGINSDI...LL.dll
windows10-2004-x64
1$PLUGINSDI...te.dll
windows7-x64
1$PLUGINSDI...te.dll
windows10-2004-x64
1$PLUGINSDI...gr.dll
windows7-x64
3$PLUGINSDI...gr.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...nd.dll
windows7-x64
3$PLUGINSDI...nd.dll
windows10-2004-x64
3$PLUGINSDIR/stack.dll
windows7-x64
3$PLUGINSDIR/stack.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3CVAutoUpdate.exe
windows7-x64
1CVAutoUpdate.exe
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CleanVMsg.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/CleanVMsg.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win10v2004-20240708-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/DLLWebCount_new.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/DLLWebCount_new.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/FILEDownPlug.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/FILEDownPlug.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/IsVista.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/IsVista.dll
Resource
win10v2004-20240708-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20240708-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/UserMgr.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/UserMgr.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/processes_second.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/processes_second.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/stack.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/stack.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
CVAutoUpdate.exe
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
CVAutoUpdate.exe
Resource
win10v2004-20240708-en
General
-
Target
2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
2f7152879dda858d5373f07318bc4415
-
SHA1
0484400520ce2cd54ce86f1542a3cd8b4340787a
-
SHA256
e9807419236323c64db44c33927744fe6e036232c643811c13d0411177390266
-
SHA512
7e0714177b5851bcc45a4550a8726baf788f6cdfb822a13d1b704abc535f47af9f3a53770a6b17b2676ca6da0b696b525ae6928d66e774ac68dcc72ee2217cc4
-
SSDEEP
49152:++dFYiaHD4iyreay6VzN7xmBBIdaCPlWGn4WFqCmpEkiEPcHwbVVPMB:+GYxEiyJVdxmBBId5PUGNovEkMHwhVE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2100 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2004 CleanV.exe 1700 cvReg.exe 300 CVAutoUpdate.exe -
Loads dropped DLL 36 IoCs
pid Process 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2004 CleanV.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 1700 cvReg.exe 1700 cvReg.exe 2004 CleanV.exe 300 CVAutoUpdate.exe 300 CVAutoUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CleanVMain = "\"C:\\Program Files (x86)\\CleanV\\CleanV.exe\" /Scan" 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\CleanV\skin\default.avs 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\CVEngine.dll 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\etc\CVFilterDriver.SYS 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\etc\cvMon.exe 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\Lang\kr.xml 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\etc\CVreport.exe 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\CleanV\partner.ini 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\etc\cvReg.exe 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\CleanV\Uninstall.exe 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\CVAutoUpdate.exe 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\CleanV.exe 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\conf.ini 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\etc\CVmonRemote.dll 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\CVUpdateServer.dat 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe File created C:\Program Files (x86)\CleanV\Uninstall.exe 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00050000000193c3-83.dat nsis_installer_1 behavioral1/files/0x00050000000193c3-83.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C859B1F1-3DE4-11EF-A372-5E92D6109A20} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe Token: SeBackupPrivilege 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 904 iexplore.exe 904 iexplore.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2004 CleanV.exe 2004 CleanV.exe 2004 CleanV.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 904 iexplore.exe 904 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 904 iexplore.exe 904 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2004 CleanV.exe 2004 CleanV.exe 1700 cvReg.exe 1700 cvReg.exe 300 CVAutoUpdate.exe 300 CVAutoUpdate.exe 2004 CleanV.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2988 wrote to memory of 788 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 30 PID 2988 wrote to memory of 788 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 30 PID 2988 wrote to memory of 788 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 30 PID 2988 wrote to memory of 788 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 30 PID 2988 wrote to memory of 788 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 30 PID 2988 wrote to memory of 788 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 30 PID 2988 wrote to memory of 788 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 30 PID 904 wrote to memory of 2800 904 iexplore.exe 35 PID 904 wrote to memory of 2800 904 iexplore.exe 35 PID 904 wrote to memory of 2800 904 iexplore.exe 35 PID 904 wrote to memory of 2800 904 iexplore.exe 35 PID 904 wrote to memory of 2800 904 iexplore.exe 35 PID 904 wrote to memory of 2800 904 iexplore.exe 35 PID 904 wrote to memory of 2800 904 iexplore.exe 35 PID 904 wrote to memory of 2260 904 iexplore.exe 36 PID 904 wrote to memory of 2260 904 iexplore.exe 36 PID 904 wrote to memory of 2260 904 iexplore.exe 36 PID 904 wrote to memory of 2260 904 iexplore.exe 36 PID 904 wrote to memory of 2260 904 iexplore.exe 36 PID 904 wrote to memory of 2260 904 iexplore.exe 36 PID 904 wrote to memory of 2260 904 iexplore.exe 36 PID 2988 wrote to memory of 2004 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 37 PID 2988 wrote to memory of 2004 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 37 PID 2988 wrote to memory of 2004 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 37 PID 2988 wrote to memory of 2004 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 37 PID 2988 wrote to memory of 2004 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 37 PID 2988 wrote to memory of 2004 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 37 PID 2988 wrote to memory of 2004 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 37 PID 2988 wrote to memory of 2100 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 38 PID 2988 wrote to memory of 2100 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 38 PID 2988 wrote to memory of 2100 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 38 PID 2988 wrote to memory of 2100 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 38 PID 2988 wrote to memory of 2100 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 38 PID 2988 wrote to memory of 2100 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 38 PID 2988 wrote to memory of 2100 2988 2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe 38 PID 2004 wrote to memory of 1700 2004 CleanV.exe 40 PID 2004 wrote to memory of 1700 2004 CleanV.exe 40 PID 2004 wrote to memory of 1700 2004 CleanV.exe 40 PID 2004 wrote to memory of 1700 2004 CleanV.exe 40 PID 2004 wrote to memory of 1700 2004 CleanV.exe 40 PID 2004 wrote to memory of 1700 2004 CleanV.exe 40 PID 2004 wrote to memory of 1700 2004 CleanV.exe 40 PID 2004 wrote to memory of 300 2004 CleanV.exe 42 PID 2004 wrote to memory of 300 2004 CleanV.exe 42 PID 2004 wrote to memory of 300 2004 CleanV.exe 42 PID 2004 wrote to memory of 300 2004 CleanV.exe 42 PID 2004 wrote to memory of 300 2004 CleanV.exe 42 PID 2004 wrote to memory of 300 2004 CleanV.exe 42 PID 2004 wrote to memory of 300 2004 CleanV.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f7152879dda858d5373f07318bc4415_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn:"Ŭ¸°ºêÀÌ ½ÇÇà" /xml "C:\Users\Admin\AppData\Local\Temp\test_saved.xml"2⤵
- Scheduled Task/Job: Scheduled Task
PID:788
-
-
C:\Program Files (x86)\CleanV\CleanV.exe"C:\Program Files (x86)\CleanV\CleanV.exe" /Scan2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\CleanV\etc\cvReg.exe"C:\Program Files (x86)\CleanV\etc\cvReg.exe" /avscanpro /chk3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
C:\Program Files (x86)\CleanV\CVAutoUpdate.exe"C:\Program Files (x86)\CleanV\CVAutoUpdate.exe" /b3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:300
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c \DelUS.bat2⤵
- Deletes itself
PID:2100
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:209925 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228B
MD57a8d183c5e9f1019080c50939ae0b8ba
SHA111bfd7efe21f618642dda8029f773c4375a6eefb
SHA25626b29bf0cb6f9190560c7ac40147aea3b144b7f0839099b73bc68b2e838445f9
SHA512fbc6f4136ed91f67841a958216edde708d04c565397f8d6f5e6c44974a67b16472be499a0b758357434e9d6eb18d1925eee69e4e8962d62c61fb14e7e42fa653
-
Filesize
452KB
MD5db2c9bf68c99c4eb55406e221f3bdfbd
SHA11df212e7ef9741ca08a1bd01ba6c3e4eff447055
SHA256a19adba1b03c558696cc4ec50f07be7c8c0aa297efecb9f6f791c2030fdecd09
SHA51208262b66236a4d61fe3d994f28dae81485e138f6ee9c8389b7fa3b110485ae4c10b592508142f319acecca9c8e2bcc9af5d20d023a5a7abb612f3dc40f7ef368
-
Filesize
704B
MD571bc085a8e36fd7a52c32bbedcdde48b
SHA16e86d63e0a9f78b357884546ff845dc68e0ad7d0
SHA256c7983c325be24f489231d35cfb720fcd253f096387270da771fbaf3128008eff
SHA51247b38c62e9c836a2ea7505eac89cc3da408f95f0787682893975f4b861c536813ead50058dfd4c538acd2bc101ce96e20dc534b37835fa787945054dfd4b6ade
-
Filesize
8KB
MD5ca8a6fd0848767e764e2cb27df417977
SHA1149039422557cfdb30eb500b64d0dcd231496cff
SHA256d2da1c4b5bc414de6c4fd1603b7394a5e8906fbea453ec164ad2696823c939d0
SHA512a2674b2caddfb2d3650b6f4c09161ffa4e39ac0c436caa1a441ab7e8cabdd447827abd5a3ed88151a5ddf8be1e20201919b9e01eeb00eb97cd5463df6884fcd6
-
Filesize
188B
MD57804c8fccd96c5195a36d9f891ee7bfd
SHA12ea83fa808ce7557a75d0e92719f1522e081b19b
SHA256c230f1845c53c336657e6edb0a8ae23b2bc1e8ae0e00528fc7e90c1bb5453e8d
SHA5129e83b2d9d027a7359dacb6f7437f564329199ccdff3768dfe2f01052338b66bac4df12d586ef1d4b743758eb2b6a3f14bd6e0b3ce9e98b6c74068d1ee72fe17f
-
Filesize
397KB
MD55997a70b895e607092cabd280e4a3731
SHA1d678b2f383c138c9f31075d6bce3701a3daa992c
SHA256bcab36d5be3a5a392cadfbf56df7b29ce57cd8fba3d69945292b28a1d9061497
SHA5127801b602e1eba9ec54595c266392c94967cbe093fbb6e0e276a4b8911f92e8520fd4b1b248fe2084a7711b25e93afb396259a27020a1244dc512896c5b71d1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5b5cb610c294a6618c6043081054508f0
SHA15751c85ee092b7c30c93b1f1ea2baf890bd99d4a
SHA2568040a50a5ab1e6859d1ae14b1a9f84cf0fc328a0d9face70ec27ac8e6abe8cef
SHA512314a5c9e63275ab2d41b445f5b4cf1b9d17c06652c63ce44c0d7a25cc912a836bba7018e7d6efdbd7fb8350337f486cb56f463009cb52cf67fda28507bc2bf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5bed9b8a7721d3258e25a7e938719a295
SHA1af930024c0f3513f48bc6592ff5bf42472e61f90
SHA2563b3e363628a17619b123d087643caba3c26651f3f1d8145e5e42612bcde18157
SHA512900ca0245bc8c4a36adf547f4900f500a3de3529275c74683cdcab26176b63f95924cfc69fa02689a5a5dde4d4d5a6653d6369af1106622579f44ffcf245c8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD55ff9af6512ba0214dd8634b257591281
SHA1c769f6b2c7792a95a98dbeafff92215b18b48a37
SHA256907dd661db5c19c85dff74e23b396ff4bd78e6603d54cd54f2d37c8b995a91af
SHA512e4c966efa38294d132b3faf3767782a25a89fb2cf624973b59bd8d0d890e877e6cb4f6d8c1cce57971d3c4c5f7074db2d862c6b9260d38b7d3f5aa6f78bf111e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
40KB
MD58acc9b03a34766471bb66e1bc758547b
SHA1e8bafb101c92daf4b1f43d8044e40cfd74e55d15
SHA256eadc0cc9ba8870eec32ea1c71596d96ee47ee550b697a86f50517bb8578b3a01
SHA5128ca9c25fc239ec4910fffa5e166a83346462bad07a5fa428bb35032c4ab7e2ebb440b9015abff486d6b58b379c449bd58efd3821bbe254a90115a52141804432
-
Filesize
728B
MD5cce234a253b22709eeff1eb27627eb70
SHA19617f5523a1f0b1b439b689be38197e86a22c04f
SHA256d35ba5bdfc8d4ab4dc1a92c436e29cd30ab66fd63fe970783daab7b177da9156
SHA512f5fa6ec560e5090c5c90dd184de256dcdd3c27369e987d77027a40bc04e30070dc885dc2168beba01b6cc60f60e18b400655e400b24bbad1144fd8cb24f4d51f
-
Filesize
728B
MD54b836f7ce1d00463de54cf6e41ea6f85
SHA1d20223209db0fecb8b79808f2130d103172b77bf
SHA2565d2a7d9dac987fae6c0d3e2716c5dce8cc06e0e8ba63d974a71c5c26e718cc30
SHA5126dc99fb85febe6eb61699890401dcbf680aac339d85e421fa4fef695fa0e03173a011b67de3e3a6b6af30f45a475fc18b4845d992641c1e35bf268fea116317e
-
Filesize
840B
MD5ad9ed7eb38f1be915ee8dde928ee5507
SHA17d093c2037fbe2f2bf49a516aa499c0358ebda2f
SHA256f27d2b11e462dec99d1feb1255c5af76f7f5627153008d64f0f354897d1d240a
SHA512cacb5ca60557ce72bc953cc869628a47e67026991fed021bbf29e31fc8c1ff94ca057324f83f9ae7a8884ece5f3eea9d1b0d53536550d7bd2870f0de578221a9
-
Filesize
840B
MD5b3df2057f35ff9bb6ce4e00ddc7e9faa
SHA1cc31aa8e17eb99aa6017dd4da428b8529e9c0a95
SHA2562fa4097cf3e6f92362264c7e463144b992e8ec1c25b97a94217782a2938c231d
SHA5121133a4a9a3546cc273b3757bb999d9ff18bb46c9d38ade4ac5a940d2fa72cb20ca00409ca3a17a1ed19a23ca32f4dd04c360c209400ae8b6dcd422ee3a36e3dc
-
Filesize
672B
MD587d9e9736eaeba05f5fa309f2c96a152
SHA1e3c6ca90deb3a0f082ec640552f28153854ece9a
SHA256c31e2c6efb7f32c0d9f525291acd7fe2ab5612c64f9b0bb6efd3f7819e8573d2
SHA512305e5394dd3a1b5f74914dcce8417e12a7906a341a3c65a21975a8e9a0b8a06a79c7ce84df53f955e4f96f58eb594bdab54078785bc9d185225e8d30fbfb9550
-
Filesize
276B
MD5e811c204c42e03e0349f9a6ef6f56df7
SHA1f49b3f3f8fd85961ff5b81366b0075d672000a08
SHA25640cb66ca15c55dae3ef084c3693d1d173fd849d1fa1809635f1ece3cff4ed934
SHA512d52023793f2637becc402736c9b77c87a777bc0adb5bc0de7f2db136ee4b64317b70f9f437d0b031822c4ff056b6ef7cee7b1485ffa62eadb305117cc8613c6a
-
Filesize
848B
MD58bac23ed8ad19acbf115336a29e08fcb
SHA1291433de1a0b349f334579d9cf3fc90275daed1d
SHA2568ff6355af6466c1ced23e38593e015061354d3cb915d3c7b58477968b9e14264
SHA512d44f0a51c9dc345308fc5b2e4442ee2bfda15b6efc87cdee9ec2b9fb5c614115f9a74a6a62211e96dc221aa2aab75ce5919b9541151acc4b05a2c7a4bde02f6c
-
Filesize
716B
MD53e8d74634f6a1f21103ecdb340b73821
SHA1865b3eec97c1b1a2260fa9ec68583f2006a5b12a
SHA25619b26a8d5e2d3a988cf87a5cb182d18ee960691650269935c84e1841e3a91fe2
SHA512d99a92d9ea7d9a60f07e506f4ebbabb807fe87284931abab00875827207ba64476d4773ceb3243f5346f6e6348aafdb12e6e3ac15c63a675a290e6ab873a353d
-
Filesize
672B
MD5893198a29458f9697dab732a40e93bba
SHA149a72ca331af9b3f04d68f9f4b408b619d435196
SHA25646a609fb484cb0dd96ba17941baf155e192c0117954f38ac0a847c2c32bd9c63
SHA5123da020cdc1dfcff95d1ddeda1f5facf4fa7184646aa7d4f6c75ce09207d743b4455e3024ec1a888f2daa8cc5f992b80bd86e17eda7998181ab8a08cbbdef3e95
-
Filesize
33KB
MD5f41ead6ac73256c1ed18560c420f77ee
SHA1c9b14976c88b061260fb8b390a8c7168bcb52490
SHA2562b01fd59b5c28a1da925adf04466e763a10c63509225c21e20defca27b85addc
SHA5126d81d5a4c78c859fe2cfa05c2d015fb3e40170ae58d8caa2a7f626a47ab944cd31f2e892e3723131794e9cbc4fd2b17fdf15c810eb2890298109166b31741625
-
Filesize
24KB
MD57bf1bd7661385621c7908e36958f582e
SHA143242d7731c097e95fb96753c8262609ff929410
SHA256c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e
SHA5128317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f
-
Filesize
1KB
MD50d40400060f4cefbf232a3805a89ccd5
SHA143e439c5ede758d455e3b58139ed781d0e63b0b5
SHA2565fa8b519ad171ca719ebc273d16510801071ff128b2fc9280c3fb008cdfacfbe
SHA512a28644a8ce346cfc406e570878ec6feac9add924b5a8af4fe238500e866efdd71698135cdee51d910fa3910f69910f7020e1223897ddbb2f210261d56e9b4fcd
-
Filesize
648KB
MD5e769e43f9db29bcfdb491ae465da9df7
SHA14c35a80b42474876b1d6ecdfd8ed6630c1c610d6
SHA2563303a319aa25357627199fc3b929b2da6f80d3896352677c1e8e93cecd6bf7f5
SHA5121f10b490e2234aab15def4168a492e2c7c6108aa4866ba54c37611ef2e7f5454339faaf865b75787cf782bdb9a23e7904bc98ec914f399743e990ee3957966b4
-
Filesize
784KB
MD5e04498a40d558d27892fca07aa3d8e1c
SHA1675d17a845601992e9e9b8aaa8c811f71885f75e
SHA2561d135448ec75b4dc4ad22c638e0583beaacae4f29f9b89983ba2207bf287dc93
SHA512cd1e4979cdfcbcb582ed415c34c05f7bfde0ee2da8e2266a24c7e51e154c2a68083843da379d750ad2c5681b108ef513e6c531ca88a38cf2fc223bdb74d271bc
-
Filesize
195KB
MD51bca277618127510bd5632573b080622
SHA15e9d803b7c41e6bc7aa1da1d73030982034f7487
SHA2564cf2c51242f6d128a383a8fa3b014293746df5fe296c9f75062b167aaa3d3fbb
SHA51210bd02ff3f49fb212fe79dc066ab9c0bbee8038708668c42d328819b70a22345723509218bce4c8221ca0077db8ab67875ccbdfb11625936b9bdb8faa3cd1c47
-
Filesize
272KB
MD59c149bc59fcde1c6b06b6a9a2030651c
SHA1282051b9f9ebcebdd31f2645aa5183d79caa41d6
SHA2565450d9a8fdbd51b23ac79c4561ebcaf610fb9d24626d5ea6618369e8a803bca9
SHA51289f342296e202dcf60884f54389fabdc6e749aa7c05d9f7b699f79520488fbea3ee8d69a10009309fba2a7bf8414a53f296911e1d628df1e48e81f0cab6a6c5c
-
Filesize
40KB
MD53170cf201ca067197084ea33035038ef
SHA18f3cb810f1d1e255d6d6e824e5cfd41552f6e5da
SHA25601fa586eec4708e3028dfb276c94f63c44eddc556b022a0bce8e132ea1948597
SHA512e1bff237e03751f4176c94c6d2684479d577cc7cec3691375d5ec34c8d015e26fef0e305f5a2b10c463e982323d936988168dc5071f3cd8090a0f7fbee72f3e3
-
Filesize
28KB
MD59c4b8ec42d89f7557bfd90798ce52787
SHA12376dde426ea65aa27c30e304086310605382475
SHA256ed52bdad7b383a179b9b0e21fefdda2d72695c5263a815d5e1e0bfac6c718548
SHA51217c12a27a08746755868558c037376dd7e20f03f0f71888c1329903b70975a54f57786c3c32bf88aaf30119f11ed978a6830ba91949e11cfc94fbb5ad95305b7
-
Filesize
28KB
MD5f16f5feebd9b431a8bc63456c0ad267c
SHA1acc75cfa3ed7888334aa2ccf305a6c6c58a08aaf
SHA2565417af0fc8284e9745650a55803bb34217e314096dc7cedf113c960624ae08ad
SHA512ed1e62d903b511a29abd5def4419b5afa63699ee2d1c91a9d884ffb01d7debe5981559574cac4885140d1f27f4275be56236f5c6f1c327147dcac8893f965512
-
Filesize
20KB
MD5b118053825642ecf3bba36500a70645b
SHA1ce436f731bd8bf744399bf39e77f7bca5a4461af
SHA256eb97c0e8d17986beb01c1366405c8fa70e5d69c5f82b30f184454a47c258fda5
SHA51211e00d2e2fc6b85e96de5b9fd11ea3f1d681180879ac3c2a7cfbe35a3808466f8eaff70faa39d6f5739238a34558825a22f0887d5653df54305a3ccce3836c73
-
Filesize
3KB
MD59701818d39318145dd164794ef3a3846
SHA17db701f8dc19163d46ba88e8b68d8dbf428a8152
SHA2563122b0413f74e88518cfd1b9c6e18435dd326ca177a2374b6405df78f43e776a
SHA512d92786630250e9eb6c47537b09684fa107f959b50d255c7f3952741eb438c3be47e171827d3a4407b049c33c12dad73f8ec381a7265b28a6d8ca101ff702e8a4
-
Filesize
44KB
MD5344d13fd0fdd2d97e8d61960f40a8a30
SHA13f0f120203005eea3e8ed1652a6ea8a607ea934d
SHA25617bb3331e2300aa01666fbee98b9552cec5e46212a4c5a340c0370b93df88f83
SHA512b4e49c58503532e270cc369f1cbd14d85edd46da5ab034dad730bd4297887dd541d445d2fbf205820e6afbbdba7ab6d5b78b694467554320fd6db8e06fe4f719
-
Filesize
36KB
MD56958016193a066833556992077bad4fe
SHA15f564945936f99381d7e2408f034f97d069005a4
SHA256f38c669c87f2a73768a27a01622690997e9d93d5ca3830b349bd24c3ff9f8d2e
SHA512fd6ab5c341b331b80c940ba97a2cd14547c796933a2df26d3dd87ede1602b86d9f8c37baebd7dd4c68d811199fc96a27ad4cb995bb8889d51af91db9f43ba0a7
-
Filesize
55KB
MD5130f66c0161e6da46744abe3c0be4d9c
SHA1d2a44a0cd07bc0c5d81fc0d056d6d45d200896ed
SHA256955705c8c7188d06af16849e5cc3ceae79ea5d0808cc2851630a54d54bbc01f2
SHA512915b9135da230ec8d3016ba83bd7102b3f8cb13050189a176f8d4d50363f13584fb971226458bc493cd2df27723c8ab7273effab7d6c6e14d49e735d24d7fac8
-
Filesize
6KB
MD5cdff6b8f9523b6ef9f20fb5f9e90f1a5
SHA1b25f6e0a19b41ff0a12de8e98e3005bc119d34fa
SHA25680b2740fb3a21ffab022a96ce6b420019072f8ef3a048fd9dea4a5b64498c0c8
SHA51262585c6a6103aed10f9a79c016df8cb630c3e37715542b5f26aa1a910771540c9b323ddbba3329db0ecf524143f7a27b782e198ce944317f764be6b9d04b792e
-
Filesize
140KB
MD5f0a1eae66dd2f54fbe26c26db5493a6f
SHA146d56b4c6694da1ec4d88b0a5b153dad02b5dca7
SHA2568fe4dad8f894bcdb9a83a9d302907de404695be4b50e619afd88f09d72583e69
SHA512e1b3c946e90fc30b6cdf953c8c7e96121b462bf8529099e0587f7f243b9d73eeba52b510dd2598937f188f7a35bc1e3785b7589ec6c249996a5795c10dafd1e7
-
Filesize
10KB
MD50f61a81a543822de5fcb9a8a43f230dd
SHA1d01d4a0f542f3c654637fdfe5a574fe1f150ece1
SHA25646b4a72ae8590b0afb3304cc5c13db0502bc4c4cb02f64f37c79008c17db814f
SHA512596b7a897ba64c32e26ba6168aa3628aad37b187a9814a286298307d8c42eabf8e8a679dbda558f8b2cdc8676c94ec819256432aa5ad7c05a5387759262a4402
-
Filesize
118KB
MD542df1fbaa87567adf2b4050805a1a545
SHA1b892a6efbb39b7144248e0c0d79e53da474a9373
SHA256e900fcb9d598643eb0ee3e4005da925e73e70dbaa010edc4473e99ea0638b845
SHA5124537d408e2f54d07b018907c787da6c7340f909a1789416de33d090055eda8918f338d8571bc3b438dd89e5e03e0ded70c86702666f12adb98523a91cbb1de1d