Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe
-
Size
368KB
-
MD5
e31915acbb7c015d82dfaa72646f9815
-
SHA1
7c29d83215851c4d8be83a15bfcac0747304d602
-
SHA256
69058d92f560ad03fbeff38d50ab8ffdcf39f3e7ddfca4bc5adb440b2b6de7c5
-
SHA512
76a86bc9f0d8086a56c768ade02a0b2aba468631d98d4adc53f578e364d06e1c48b7e3f6c309b1fa9be0090c1aec4042d66e134537c377bc39ec764bc2e428f5
-
SSDEEP
6144:DbXofeVfgK9bZrUmn3t49U9fW/g3C2qvSXt/XbYHJ6HfBnMwnctf12VSPkdJoLeC:DbX4eVT9bNUm3KaZTC5veg6/X/oSBq
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+xubsd.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/679DC7C60503FD5
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/679DC7C60503FD5
http://yyre45dbvn2nhbefbmh.begumvelic.at/679DC7C60503FD5
http://xlowfznrg4wf7dli.ONION/679DC7C60503FD5
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (430) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe -
Executes dropped EXE 2 IoCs
pid Process 2104 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\fojyhwb = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\dsvuwmbodojl.exe" dsvuwmbodojl.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1712 set thread context of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 2104 set thread context of 2628 2104 dsvuwmbodojl.exe 34 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Services\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\cpu.js dsvuwmbodojl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Dot.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_h.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\zh-CN.pak dsvuwmbodojl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\pause_hov.png dsvuwmbodojl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\es-ES\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\calendar.js dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_s.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi dsvuwmbodojl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg dsvuwmbodojl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single_bkg.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\highDpiImageSwap.js dsvuwmbodojl.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\el.pak dsvuwmbodojl.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Internet Explorer\en-US\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows NT\TableTextService\fr-FR\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_ReCoVeRy_+xubsd.txt dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-full_partly-cloudy.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows NT\Accessories\it-IT\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Journal\Templates\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_ReCoVeRy_+xubsd.html dsvuwmbodojl.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_ReCoVeRy_+xubsd.png dsvuwmbodojl.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\RSSFeeds.js dsvuwmbodojl.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\dsvuwmbodojl.exe e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe File opened for modification C:\Windows\dsvuwmbodojl.exe e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsvuwmbodojl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsvuwmbodojl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000866da6eccc39ca14b325ef65b2f4b5b1e3e14ad218353f7869cb10f3cc20ad3b000000000e800000000200002000000091943152176f042672c6091f2d1f241b1f8e7f0887a94e175d71882433d0986c20000000ab2173d2b9855b162c9276e69ea6a34759310f6a303e281013f0145e64ff15e04000000046f27dfaf917e2833a0478aa7d5753aee6e6c51002cfb8c3df57008a85faaea35402b0a3be431463f62c2033dddc070ef1df08dfab82b76addef059bd19dd701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c5061d9b07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4885C011-738E-11EF-808B-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2576 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe 2628 dsvuwmbodojl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe Token: SeDebugPrivilege 2628 dsvuwmbodojl.exe Token: SeIncreaseQuotaPrivilege 1616 WMIC.exe Token: SeSecurityPrivilege 1616 WMIC.exe Token: SeTakeOwnershipPrivilege 1616 WMIC.exe Token: SeLoadDriverPrivilege 1616 WMIC.exe Token: SeSystemProfilePrivilege 1616 WMIC.exe Token: SeSystemtimePrivilege 1616 WMIC.exe Token: SeProfSingleProcessPrivilege 1616 WMIC.exe Token: SeIncBasePriorityPrivilege 1616 WMIC.exe Token: SeCreatePagefilePrivilege 1616 WMIC.exe Token: SeBackupPrivilege 1616 WMIC.exe Token: SeRestorePrivilege 1616 WMIC.exe Token: SeShutdownPrivilege 1616 WMIC.exe Token: SeDebugPrivilege 1616 WMIC.exe Token: SeSystemEnvironmentPrivilege 1616 WMIC.exe Token: SeRemoteShutdownPrivilege 1616 WMIC.exe Token: SeUndockPrivilege 1616 WMIC.exe Token: SeManageVolumePrivilege 1616 WMIC.exe Token: 33 1616 WMIC.exe Token: 34 1616 WMIC.exe Token: 35 1616 WMIC.exe Token: SeIncreaseQuotaPrivilege 1616 WMIC.exe Token: SeSecurityPrivilege 1616 WMIC.exe Token: SeTakeOwnershipPrivilege 1616 WMIC.exe Token: SeLoadDriverPrivilege 1616 WMIC.exe Token: SeSystemProfilePrivilege 1616 WMIC.exe Token: SeSystemtimePrivilege 1616 WMIC.exe Token: SeProfSingleProcessPrivilege 1616 WMIC.exe Token: SeIncBasePriorityPrivilege 1616 WMIC.exe Token: SeCreatePagefilePrivilege 1616 WMIC.exe Token: SeBackupPrivilege 1616 WMIC.exe Token: SeRestorePrivilege 1616 WMIC.exe Token: SeShutdownPrivilege 1616 WMIC.exe Token: SeDebugPrivilege 1616 WMIC.exe Token: SeSystemEnvironmentPrivilege 1616 WMIC.exe Token: SeRemoteShutdownPrivilege 1616 WMIC.exe Token: SeUndockPrivilege 1616 WMIC.exe Token: SeManageVolumePrivilege 1616 WMIC.exe Token: 33 1616 WMIC.exe Token: 34 1616 WMIC.exe Token: 35 1616 WMIC.exe Token: SeBackupPrivilege 2732 vssvc.exe Token: SeRestorePrivilege 2732 vssvc.exe Token: SeAuditPrivilege 2732 vssvc.exe Token: SeIncreaseQuotaPrivilege 2916 WMIC.exe Token: SeSecurityPrivilege 2916 WMIC.exe Token: SeTakeOwnershipPrivilege 2916 WMIC.exe Token: SeLoadDriverPrivilege 2916 WMIC.exe Token: SeSystemProfilePrivilege 2916 WMIC.exe Token: SeSystemtimePrivilege 2916 WMIC.exe Token: SeProfSingleProcessPrivilege 2916 WMIC.exe Token: SeIncBasePriorityPrivilege 2916 WMIC.exe Token: SeCreatePagefilePrivilege 2916 WMIC.exe Token: SeBackupPrivilege 2916 WMIC.exe Token: SeRestorePrivilege 2916 WMIC.exe Token: SeShutdownPrivilege 2916 WMIC.exe Token: SeDebugPrivilege 2916 WMIC.exe Token: SeSystemEnvironmentPrivilege 2916 WMIC.exe Token: SeRemoteShutdownPrivilege 2916 WMIC.exe Token: SeUndockPrivilege 2916 WMIC.exe Token: SeManageVolumePrivilege 2916 WMIC.exe Token: 33 2916 WMIC.exe Token: 34 2916 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2528 iexplore.exe 2020 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2072 1712 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2104 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2104 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2104 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2104 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2684 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 32 PID 2072 wrote to memory of 2684 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 32 PID 2072 wrote to memory of 2684 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 32 PID 2072 wrote to memory of 2684 2072 e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe 32 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2104 wrote to memory of 2628 2104 dsvuwmbodojl.exe 34 PID 2628 wrote to memory of 1616 2628 dsvuwmbodojl.exe 35 PID 2628 wrote to memory of 1616 2628 dsvuwmbodojl.exe 35 PID 2628 wrote to memory of 1616 2628 dsvuwmbodojl.exe 35 PID 2628 wrote to memory of 1616 2628 dsvuwmbodojl.exe 35 PID 2628 wrote to memory of 2576 2628 dsvuwmbodojl.exe 43 PID 2628 wrote to memory of 2576 2628 dsvuwmbodojl.exe 43 PID 2628 wrote to memory of 2576 2628 dsvuwmbodojl.exe 43 PID 2628 wrote to memory of 2576 2628 dsvuwmbodojl.exe 43 PID 2628 wrote to memory of 2528 2628 dsvuwmbodojl.exe 44 PID 2628 wrote to memory of 2528 2628 dsvuwmbodojl.exe 44 PID 2628 wrote to memory of 2528 2628 dsvuwmbodojl.exe 44 PID 2628 wrote to memory of 2528 2628 dsvuwmbodojl.exe 44 PID 2528 wrote to memory of 2788 2528 iexplore.exe 46 PID 2528 wrote to memory of 2788 2528 iexplore.exe 46 PID 2528 wrote to memory of 2788 2528 iexplore.exe 46 PID 2528 wrote to memory of 2788 2528 iexplore.exe 46 PID 2628 wrote to memory of 2916 2628 dsvuwmbodojl.exe 47 PID 2628 wrote to memory of 2916 2628 dsvuwmbodojl.exe 47 PID 2628 wrote to memory of 2916 2628 dsvuwmbodojl.exe 47 PID 2628 wrote to memory of 2916 2628 dsvuwmbodojl.exe 47 PID 2628 wrote to memory of 604 2628 dsvuwmbodojl.exe 50 PID 2628 wrote to memory of 604 2628 dsvuwmbodojl.exe 50 PID 2628 wrote to memory of 604 2628 dsvuwmbodojl.exe 50 PID 2628 wrote to memory of 604 2628 dsvuwmbodojl.exe 50 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System dsvuwmbodojl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" dsvuwmbodojl.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\dsvuwmbodojl.exeC:\Windows\dsvuwmbodojl.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\dsvuwmbodojl.exeC:\Windows\dsvuwmbodojl.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2628 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT5⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2576
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Windows\DSVUWM~1.EXE5⤵
- System Location Discovery: System Language Discovery
PID:604
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\E31915~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD583a9d0dd02737487af2aa9e96368ff57
SHA15c82f9ecf4f09d71655102179dfbfe8479cd2064
SHA2567cec57bf2202316d594254e4fa5bb6ed8de0de81f08dfa6e20dc98cd3d051670
SHA51279750c959ffa86f561a2265fcc133846c94b24bba8d336e1020a69f7d99620a5a353b3b77d189885191848cd6bf7fad12e07547ba1ab3fdb4b9e41dece1001c8
-
Filesize
64KB
MD5bdad4fb63fd8ead0d63d99dac9b9404d
SHA15f76dbce3ce24b7b113a215852cf6f1104b02c62
SHA256a1fbfa85048dec2640df5922246f0b2132449541387cda2e903bbb8102331877
SHA5121d620ce0430c42de6bf8072be6035dc28cdef0421410b0c90d691c454652a8604f8a2aefc1cb8a1a0d38686bf91c0763ae3d5b8970c3b81a1cb6bee8702191bc
-
Filesize
1KB
MD5e19b7c090fea67a5a95e24945ba58aff
SHA188a1a9f9dfd41ea65064dec811b8b268edee102a
SHA2562819a459bf7a4611e536361f5ad0d624da2e2beb804387b4bef1c2f6d96aa746
SHA512ffe957ddeaa274f7e0f993352399fc639ed837a8ac2f3b49859a3a2d77519142aa9a9d195fae90d08ddf2174abecbe81b8f0e0c63b5b97d0071293666e05cca6
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD56070f268474e148e5b35122b74583fa2
SHA1b7ad41f3c8dfad0772db2a7ba322f9a4f5230335
SHA256fefb5b7d44e7cfc44c2f4b3c7eb429edd3b4c174550ac83fd776f0e2ae8ffec8
SHA512154e2142520d2fd068efd025436a302a1b451aaf0a2c674cda0f15beae3c0a9d08c7b2a0b6f695a63bca06d731275ce683bb67d362c02dcad43d8b8252b1a15e
-
Filesize
109KB
MD5291333acd44a7fab1cd812774b8c7c7d
SHA15f3842103641b7b4787b8a71e8bbf1cabc3d72f3
SHA256bcf9b0648672fb03e6b80f057a2e50742fd81143251b044b037c10f4d6973392
SHA5123bc9347b1c9893c74d6701a6339c1a03be958cca8b4785771c8d18335100543b94635f29d0394c56392184dda32e5bc5d97533a66a75299e420a52af08a46037
-
Filesize
173KB
MD589c9a1b542da660e81d5029d49362927
SHA1c33698be4b7e17df607ff7ef124113f8d7883645
SHA256bca32908f1698b06e5a08b2c9191b63a43cca46cc7ff777459946db71fb3b701
SHA5128a067c17566204c7d4ecf1f80658520b8ac74fa34d9689f190d294d912b858a0715a2fa4bdc2d486997e2617a43ac37a637e76e2ccd007f1f095c828ecd437e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e4e404ed7bdc9fbcce07785afd39da
SHA196592e81c47b83a193065b2e6f15f04bde755f16
SHA25689657011b0da54c8759ba08c110e8c03aa1e6602a600cba1e61b5c9252c6c8bd
SHA512d5fc8a97cfd9b15d6d3d6ded46b2ce8acba82d44a9d2f99e733884db9ba12ebda036a8e6b96487c1051c603fbd35e6239e0ed412c427ce6371cca3e631e53f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da521ee7c840d77f54457554edc756b1
SHA1f0d239f811903d9c9afc75816a8cb1983587c747
SHA256b225edcde42b173bbcfc111b4d8b9d7b9ccb14f4381846497fd0c8edbd1e3f5d
SHA51204065cef47043ca60d4ffad7830c409b10aa3a606d55e05a3e108473d3ddd8a1465fbba392fbee3c8de84aa2f533db0fa1f7e2df016e987de8c736048cfdc202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0b30439e029cd94be275b6e0826666
SHA1dd27ac5f9df5c29aa26a41544bbbab2e86dbec21
SHA256eca8a1429d4fb52c801690b7b649e2a292d78ca20cfc07ebd8802018736195ff
SHA51265c0c6822682bdac0c563623a72c6759c0bfb85bee69b736c49c17f62e274ba41655422d00df80d64e06508229cb20130b04db234ea6593e9d4a8804234704e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc7a5141ffae05967c53303fb7dc843
SHA1a25b35b132fe336582540a70ae7726edb44f2244
SHA25670f4690f6a2451ce10adafd4866415e43e1e3e3a12f72d399651338f40dfae7b
SHA512fa2a1c81edf8696a03aedc9d62b219dd05da249882ab176e66f2bd6d5d3567a12128017c9a29a38ce11ed2d2bbc155dffb606cf5772e65e4beb8b02dd919a338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5963810946185d6b16a29f9b395f3cca1
SHA19a7589245614bec53032c6f6a66114a8da1509ed
SHA2567204a78d88d7251f8d333e6ff2ab0b7c287fe642731d42af2ec7be017155adb9
SHA512d4efb32c8ee1d07e911ed51f98a0b718946c1532c2c156f888108e4e54e7046d19f59640130a040d49a9bac4f7fc8fb560263fca76370c3a0257e3764812f6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433d33bf3f92c1284f54f484e975c522
SHA1395713edb39a049a96950af0c826c2a011ea9cf2
SHA256ab07eaec0a35bbd96600f44bdd06ce14d7e4a917a731bc319959b427217f723c
SHA51217ce5108a898e33ba09633b63c0ebd6b3909802ebe96983ad170e76f1c8ec969e20ddf607134f74f65bbfe2c9ffcc687c13076206e393bcf3ff5c6bc951ad8c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b5fa00e59984ef57f565318fbc8806
SHA1ec33930e2e007e002cac729e923fc85dafb21592
SHA256d708475f3d59778be9087b6432ecd28da2496cf90fb9d6635861b531ca2b4bb7
SHA512d824f1b711b0056480ee07dd4858c4a7edfe5e189f12ada0c825f0ab9bdba7fb1831322b389588f23e5af1196616ea0f37db6e75fd570b361c33e9fe5f39b64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc8ff0baab1d699d571f5c5285dc987b
SHA1d4d08eb018ab0111837e149192785a0968c59547
SHA2563870a6b876a6f79eb54491734d57f1cb20eeb80e507fecc31cf4e8091d402d0f
SHA512390dd090178c7eade6b95386740541f2d0ae3de8647120b44271fce93f10f5ef32eac4e51396f500498f30f0fda2af747a15df9bc7af78409a211ae076b708b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8daa93c609f134fabc1b6568f4b321
SHA18a5bac6ebbdb74ee35ab39f8d11291ba2b3913c3
SHA2567a0892d6734be2ab8d05e12a2209b64a06a60cdfcec619f744d7b61659c3889d
SHA512625d6f668dcd628bedb5d893d8f287c4cc8d0337c1da0bd8e8dce80bb26e85a2b5864e3598b225b18c519e74273d93e2fe29d0bd0eabab4b32ab1e1d1aaa1859
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
368KB
MD5e31915acbb7c015d82dfaa72646f9815
SHA17c29d83215851c4d8be83a15bfcac0747304d602
SHA25669058d92f560ad03fbeff38d50ab8ffdcf39f3e7ddfca4bc5adb440b2b6de7c5
SHA51276a86bc9f0d8086a56c768ade02a0b2aba468631d98d4adc53f578e364d06e1c48b7e3f6c309b1fa9be0090c1aec4042d66e134537c377bc39ec764bc2e428f5