Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe
-
Size
824KB
-
MD5
e95e5a67df941e7150f0c73a5c63f1b1
-
SHA1
1cfedfbbff4202fee0a38ecb775cf189ae4f9739
-
SHA256
008e85f1c73c905fba2a072db714e5e268548b8ec38646b2455cf0b8be1e2f88
-
SHA512
afe1fa188a2250c74ac7cad3cc9b400fa0759b691ebe126d812e3769b92364982e29e57c1eb4d42357ff89e2344efb8e312749044e4c8dd031a57ec872a7cfca
-
SSDEEP
24576:vaT1xyiQQNN3iR1n7HNhf1TlaBVUiYUT:ybAQH817HNhnaPUiYU
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wplayer.exe -
Executes dropped EXE 20 IoCs
pid Process 3384 wplayer.exe 4584 wplayer.exe 4764 wplayer.exe 4864 wplayer.exe 2324 wplayer.exe 2604 wplayer.exe 4768 wplayer.exe 2872 wplayer.exe 5016 wplayer.exe 684 wplayer.exe 2168 wplayer.exe 4932 wplayer.exe 2284 wplayer.exe 2704 wplayer.exe 4144 wplayer.exe 3472 wplayer.exe 3936 wplayer.exe 3272 wplayer.exe 1840 wplayer.exe 440 wplayer.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File opened for modification C:\Windows\SysWOW64\wplayer.exe wplayer.exe File created C:\Windows\SysWOW64\wplayer.exe e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wplayer.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\pQculrjFw = "hHMbU`fiPLa_PWc`yWFS~hEr\x7fOdI]omZ" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@EjEyQrJ\x7fEmhPxmUryT}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@EmEyQrJ\x7fEjhPxmUryh}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~Sb^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\pQculrjFw = "hHMbU`fiPLa_PWc`yWFS~hEr\x7fOdI]omZ" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\ffhBues = "}LpCUwdk|bluwnZd{sCx[rg{mZSOoL" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@EaEyQrJ\x7fEfhPxmUrxN}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~Sf^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\ffhBues = "}LpCUwdk|bluwnZd{sCx[rg{mZSOoL" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\ocbsl = "AJ{Xqv@\x7fhdMxaZLnpmVwZl" wplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC} e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\aBwgncmht = "ZuPgDb|wkyoLfyfj\\ea" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\ffhBues = "}LpCUwdk|bluwnZd{sCx[rg{mZSOoL" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\pQculrjFw = "hHMbU`fiPLa_PWc`yWFS~hEr\x7fOdI]omZ" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXuBp}UP" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpX_}qDYp" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXHG_Cp`" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\ffhBues = "}LpCUwdk|bluwnZd{sCx[rg{mZSOoL" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@EoEyQrJ\x7fEhhPxmUrx_}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~P~^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXcRu\\tp" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\pQculrjFw = "hHMbU`fiPLa_PWc`yWFS~hEr\x7fOdI]omZ" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~P^^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~Q~^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXW]JiD`" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXF}tllP" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@E`EyQrJ\x7fEghPxmUrx_}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@EkEyQrJ\x7fElhPxmUry[}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\ocbsl = "AJ{Xqv@\x7fhdMxaZLnpmVwZl" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\InprocServer32\ThreadingModel = "Both" e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~QN^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\ffhBues = "}LpCUwdk|bluwnZd{sCx[rg{mZSOoL" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~PR^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\pQculrjFw = "hHMbU`fiPLa_PWc`yWFS~hEr\x7fOdI]omZ" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@EiEyQrJ\x7fEnhPxmUryT}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXs\x7fTdV`" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXk]]OR@" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXihTiK`" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXwxQn@p" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~SN^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXVrtYLP" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXmYz}bp" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXYgaFXP" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@E`EyQrJ\x7fEghPxmUrxN}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXhbDDtp" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\aBwgncmht = "ZuPgDb|wkyoLfyfj\\ea" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\aBwgncmht = "ZuPgDb|wkyoLfyfj\\ea" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~PJ^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXLKYwy`" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\ocbsl = "AJ{Xqv@\x7fhdMxaZLnpmVwZl" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~Pn^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXWU_|e@" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXpUqSqp" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpX]o~IZP" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~Pf^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXBpDL@p" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpX^_Owp`" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@EkEyQrJ\x7fElhPxmUry[}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~SB^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~Pz^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\mdOZxgd = "l_@CWmKBZv_ckETiN_~PN^" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\IfgotjfebvvWw = "z@ElEyQrJ\x7fEkhPxmUryy}]ta}epjZTM" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\QqryrdjZhffv = "BqpXUk]mU@" wplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF76B5A2-CA3A-E66F-A851-28D5F2D1CFEC}\aBwgncmht = "ZuPgDb|wkyoLfyfj\\ea" wplayer.exe -
NTFS ADS 11 IoCs
description ioc Process File created C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe File opened for modification C:\ProgramData\TEMP:5D2892D9 wplayer.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: 33 3984 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3984 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Token: 33 3984 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3984 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe Token: 33 4584 wplayer.exe Token: SeIncBasePriorityPrivilege 4584 wplayer.exe Token: 33 4584 wplayer.exe Token: SeIncBasePriorityPrivilege 4584 wplayer.exe Token: 33 4864 wplayer.exe Token: SeIncBasePriorityPrivilege 4864 wplayer.exe Token: 33 4864 wplayer.exe Token: SeIncBasePriorityPrivilege 4864 wplayer.exe Token: 33 2604 wplayer.exe Token: SeIncBasePriorityPrivilege 2604 wplayer.exe Token: 33 2604 wplayer.exe Token: SeIncBasePriorityPrivilege 2604 wplayer.exe Token: 33 2872 wplayer.exe Token: SeIncBasePriorityPrivilege 2872 wplayer.exe Token: 33 2872 wplayer.exe Token: SeIncBasePriorityPrivilege 2872 wplayer.exe Token: 33 684 wplayer.exe Token: SeIncBasePriorityPrivilege 684 wplayer.exe Token: 33 684 wplayer.exe Token: SeIncBasePriorityPrivilege 684 wplayer.exe Token: 33 4932 wplayer.exe Token: SeIncBasePriorityPrivilege 4932 wplayer.exe Token: 33 4932 wplayer.exe Token: SeIncBasePriorityPrivilege 4932 wplayer.exe Token: 33 2704 wplayer.exe Token: SeIncBasePriorityPrivilege 2704 wplayer.exe Token: 33 2704 wplayer.exe Token: SeIncBasePriorityPrivilege 2704 wplayer.exe Token: 33 3472 wplayer.exe Token: SeIncBasePriorityPrivilege 3472 wplayer.exe Token: 33 3472 wplayer.exe Token: SeIncBasePriorityPrivilege 3472 wplayer.exe Token: 33 3272 wplayer.exe Token: SeIncBasePriorityPrivilege 3272 wplayer.exe Token: 33 3272 wplayer.exe Token: SeIncBasePriorityPrivilege 3272 wplayer.exe Token: 33 440 wplayer.exe Token: SeIncBasePriorityPrivilege 440 wplayer.exe Token: 33 440 wplayer.exe Token: SeIncBasePriorityPrivilege 440 wplayer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3620 wrote to memory of 3984 3620 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 83 PID 3984 wrote to memory of 3384 3984 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 84 PID 3984 wrote to memory of 3384 3984 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 84 PID 3984 wrote to memory of 3384 3984 e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe 84 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85 PID 3384 wrote to memory of 4584 3384 wplayer.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1292 "C:\Users\Admin\AppData\Local\Temp\e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1292 "C:\Users\Admin\AppData\Local\Temp\e95e5a67df941e7150f0c73a5c63f1b1_JaffaCakes118.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4584 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1448 "C:\Windows\SysWOW64\wplayer.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1448 "C:\Windows\SysWOW64\wplayer.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4864 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1464 "C:\Windows\SysWOW64\wplayer.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1464 "C:\Windows\SysWOW64\wplayer.exe"8⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1460 "C:\Windows\SysWOW64\wplayer.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1460 "C:\Windows\SysWOW64\wplayer.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2872 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1492 "C:\Windows\SysWOW64\wplayer.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1492 "C:\Windows\SysWOW64\wplayer.exe"12⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1504 "C:\Windows\SysWOW64\wplayer.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1504 "C:\Windows\SysWOW64\wplayer.exe"14⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1496 "C:\Windows\SysWOW64\wplayer.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1496 "C:\Windows\SysWOW64\wplayer.exe"16⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2704 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1532 "C:\Windows\SysWOW64\wplayer.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4144 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1532 "C:\Windows\SysWOW64\wplayer.exe"18⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:3472 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1540 "C:\Windows\SysWOW64\wplayer.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1540 "C:\Windows\SysWOW64\wplayer.exe"20⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:3272 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1552 "C:\Windows\SysWOW64\wplayer.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1552 "C:\Windows\SysWOW64\wplayer.exe"22⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123B
MD537cc21c4fbffe1a0800140588359049d
SHA1f91f0ab24a3d13a522a8f3263370330198fc3d04
SHA256de456a519503107736b6fa9f89b23feb67ddd6d5709a4e24c0044265793ea244
SHA51207cf64c084a7963a8274f3e5681f303039c708688219a4d8322ca54de6a295fc9f9963dd8f123a5a148ce0e62a4f125c03c03df53f1ba909ff39467b9a06bea3
-
Filesize
123B
MD5a37ef3f692951c7ee350d043ebad14ab
SHA1420549454818c0ed8a5d11bdb89861fc5acd76fe
SHA256a4b23dffe5db65025ac3bcee6d08089204d18482d733fba86854a3065e55dda2
SHA51284c5fa8fe84a41c684f58dc83b41a0deb08a576084acf6b375c92185a7ab9292ff2138989387c1e3a82b8bb8b84b9fc579010af8c4a14a07561f2a811969cd3e
-
Filesize
123B
MD5d580e2449d24c2a72d24a459e16e4313
SHA1d56ee30ea1c4a0ca1bc9fe73301fa87442eb09f7
SHA2562e9c2c25d42970e26d41d6d97bbca1a84faf130d70c35a71558cf0f795866ce4
SHA512d3776a3af38c64af5c7c952c7c7c3a6ef8a9fa17acdf0d122832c9f288dda654659cb8181d670993fbcdd0ff02f66a7cefad14f8acef9d30f0c398db0c7cf132
-
Filesize
123B
MD5506e54d3064b52649f65a3ffea5b4bfb
SHA1414fb65a200824d99ecc4b141aab372dac047d9d
SHA256ec678cb3dac7c3c732011fccf3f12d7a302a5d55f5127519b1bffc2e11bf4819
SHA5129ab33fa2b52c4a8b42c237235386c840fbd8054c1bfe639ebadc435594cb4036ae5488f5af2a57134006b7e94b89fb3fc7cf8f8f5060d90e393c131920291080
-
Filesize
123B
MD58428f991d7724328b03157e5b495c629
SHA1a13db922451652d965990e17c3983a87b25c1c8f
SHA2560c17cbe9a21b1aea986e0f1eb5453285b5b1b79d5b868bdfe7bc7bbb2a7b5d17
SHA512f333bcc7136e9e8a2f3ef539d0317291bba6a43c608a5e091db698c19ebedde7233a40bd647086a2ceab344222176eb3945226263fd86bc22f025b2db00b4bff
-
Filesize
123B
MD5075057bcea19a418d589480d3d541a79
SHA13c9e09cd13351550e5101a65e2373358fdd905ff
SHA2563dce66791f75b8c6bc711aa7ab23768d106beb285b195066eb1ff745b2a1d08f
SHA512db5cb0cbff9497e3a3523d745739c1c5ec96ae4115d500380dd1b252cd024c6eefe48c8d162a6455b8b6829baabdfcbe0b2838b1481af59d6222c63b7aa0258c
-
Filesize
123B
MD598bb0b0445d24a583d6fb05b38da5afc
SHA10fc4a62400e16f0d19566bbde89b54e01dcb768d
SHA256505ce2e641b860f9f02104baf6a8ac0b76516a8ac1170a80a824d7d81e511c56
SHA512bda5ef7a4efe116aef48e02d61856901d41546891b3065a2ab05da0de3ce054eae545eed7538920c1a3fdab7ab979aa47f7985b2d269e3c1c88c14856c0e0f24
-
Filesize
123B
MD5783da3ac22f124e26071834fe4fafc16
SHA13290fedcdb58cecd2401957236230849587e13ee
SHA256ea120791937b4e4cc2efa222a25eb36aece2685690c9c0edd3f2a710319d5fe7
SHA51268b9d065b21ad657bdc55369a8332df58f11efb792d5c042110436494f5a153b3adf37a53e357a5aaf746a691050ef100aeb238f7acd9a61ab115dd14d1cf88f
-
Filesize
123B
MD5e5641dfaf8e0d98b724c261dc9e838d0
SHA131042d055ad7d96f197f16ab75e63f8d2419a6aa
SHA25680ba0a97c87b192c8908b8e1faf873c8a4583ceed5a96ca62b2f929af7d75565
SHA512e6aafcf0c2accdfb4ac13691b8cd0406a795763c6258895bd280e837b6532e71f85943a701627a50588190a9e9b524e8a578a6bde0701684f3c2870f10b37a37
-
Filesize
123B
MD516d56748865a786ad86903d375926b11
SHA1cede35fe0a1c3b50fc3fe5ce5a791b6dc8a2f3b8
SHA256af4265f94d072d7c67ec3fc4818044f27c8c8e459e47effec79cb87abe69113b
SHA512997ba232d08b31083367e5d19ba6879ff183056b7fab5bb3affefc7d5f32af1cc69a6f93058936a767b48d6eb29ec32d0ca98b1f176d17898d70fcd28496814a
-
Filesize
123B
MD5a066bec59590c8a90ce2280d8831f5b1
SHA1deb8d7c582541864f870a5805a8914bb59831285
SHA256a8251151ddb1dbdcf01e2d82acc102478dad887181b275b80466e1b12248b7b7
SHA512b2f2a2a9611ed0206759abb92236219fec1ce906d8ee224dddedaff58b6dc1ff403db5e2167387edbcdf232a6d35f17d4c063bd2babc8117a61111b9cd7e1feb
-
Filesize
824KB
MD5e95e5a67df941e7150f0c73a5c63f1b1
SHA11cfedfbbff4202fee0a38ecb775cf189ae4f9739
SHA256008e85f1c73c905fba2a072db714e5e268548b8ec38646b2455cf0b8be1e2f88
SHA512afe1fa188a2250c74ac7cad3cc9b400fa0759b691ebe126d812e3769b92364982e29e57c1eb4d42357ff89e2344efb8e312749044e4c8dd031a57ec872a7cfca