Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 12:41
Behavioral task
behavioral1
Sample
ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe
-
Size
255KB
-
MD5
ed9c0c1b20b1873ca8c8fbf5be3036f6
-
SHA1
f5420e40802e6fa199fa043ccfa7df15474fc388
-
SHA256
e522e926aba732c8b053396afccc6c04dfea051945569d1b89b00a092278e82d
-
SHA512
6b4d88df854ab398200584e0cd1b376067022780b1d8603c242da52320de9a736aab4fed3323772206c8070454297d2239c8fc1ab69d84ca4848aef273dea5dd
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJN:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rbzguilgdt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rbzguilgdt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rbzguilgdt.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rbzguilgdt.exe -
Executes dropped EXE 5 IoCs
pid Process 2800 rbzguilgdt.exe 2948 gcotvsnb.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 3024 gcotvsnb.exe -
Loads dropped DLL 5 IoCs
pid Process 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2800 rbzguilgdt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2248-0-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000016dc9-9.dat upx behavioral1/files/0x000b0000000122cf-38.dat upx behavioral1/files/0x0007000000016de6-40.dat upx behavioral1/memory/2780-42-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-41-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000016dc6-37.dat upx behavioral1/memory/2800-32-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2248-44-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/3024-49-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0002000000003d25-72.dat upx behavioral1/files/0x0002000000003d24-70.dat upx behavioral1/memory/2800-82-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2948-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/3024-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2948-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/3024-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/3024-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2948-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/3024-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2948-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-104-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-106-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-105-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-107-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-108-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-109-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-111-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-112-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-110-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-118-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-119-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-120-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-122-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-123-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-121-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-125-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-126-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-124-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-128-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-129-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-127-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-130-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-131-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-134-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-135-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-133-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-137-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-138-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2800-136-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2744-141-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2780-142-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rbzguilgdt.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fnhacsgz = "rbzguilgdt.exe" xbwcpegmozncron.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nifupqaa = "xbwcpegmozncron.exe" xbwcpegmozncron.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "inqrfxucrsqni.exe" xbwcpegmozncron.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: rbzguilgdt.exe File opened (read-only) \??\x: gcotvsnb.exe File opened (read-only) \??\b: rbzguilgdt.exe File opened (read-only) \??\t: rbzguilgdt.exe File opened (read-only) \??\y: gcotvsnb.exe File opened (read-only) \??\g: gcotvsnb.exe File opened (read-only) \??\r: gcotvsnb.exe File opened (read-only) \??\x: gcotvsnb.exe File opened (read-only) \??\v: rbzguilgdt.exe File opened (read-only) \??\t: gcotvsnb.exe File opened (read-only) \??\y: gcotvsnb.exe File opened (read-only) \??\s: rbzguilgdt.exe File opened (read-only) \??\g: gcotvsnb.exe File opened (read-only) \??\o: gcotvsnb.exe File opened (read-only) \??\a: gcotvsnb.exe File opened (read-only) \??\s: gcotvsnb.exe File opened (read-only) \??\k: gcotvsnb.exe File opened (read-only) \??\e: gcotvsnb.exe File opened (read-only) \??\h: rbzguilgdt.exe File opened (read-only) \??\b: gcotvsnb.exe File opened (read-only) \??\j: gcotvsnb.exe File opened (read-only) \??\m: gcotvsnb.exe File opened (read-only) \??\b: gcotvsnb.exe File opened (read-only) \??\y: rbzguilgdt.exe File opened (read-only) \??\l: gcotvsnb.exe File opened (read-only) \??\j: gcotvsnb.exe File opened (read-only) \??\p: gcotvsnb.exe File opened (read-only) \??\v: gcotvsnb.exe File opened (read-only) \??\q: gcotvsnb.exe File opened (read-only) \??\n: gcotvsnb.exe File opened (read-only) \??\w: gcotvsnb.exe File opened (read-only) \??\o: rbzguilgdt.exe File opened (read-only) \??\n: gcotvsnb.exe File opened (read-only) \??\p: gcotvsnb.exe File opened (read-only) \??\z: gcotvsnb.exe File opened (read-only) \??\u: gcotvsnb.exe File opened (read-only) \??\m: gcotvsnb.exe File opened (read-only) \??\a: rbzguilgdt.exe File opened (read-only) \??\l: rbzguilgdt.exe File opened (read-only) \??\n: rbzguilgdt.exe File opened (read-only) \??\w: rbzguilgdt.exe File opened (read-only) \??\e: gcotvsnb.exe File opened (read-only) \??\t: gcotvsnb.exe File opened (read-only) \??\k: rbzguilgdt.exe File opened (read-only) \??\r: gcotvsnb.exe File opened (read-only) \??\i: gcotvsnb.exe File opened (read-only) \??\k: gcotvsnb.exe File opened (read-only) \??\o: gcotvsnb.exe File opened (read-only) \??\q: rbzguilgdt.exe File opened (read-only) \??\s: gcotvsnb.exe File opened (read-only) \??\v: gcotvsnb.exe File opened (read-only) \??\q: gcotvsnb.exe File opened (read-only) \??\h: gcotvsnb.exe File opened (read-only) \??\u: gcotvsnb.exe File opened (read-only) \??\g: rbzguilgdt.exe File opened (read-only) \??\p: rbzguilgdt.exe File opened (read-only) \??\x: rbzguilgdt.exe File opened (read-only) \??\i: gcotvsnb.exe File opened (read-only) \??\w: gcotvsnb.exe File opened (read-only) \??\l: gcotvsnb.exe File opened (read-only) \??\z: gcotvsnb.exe File opened (read-only) \??\r: rbzguilgdt.exe File opened (read-only) \??\u: rbzguilgdt.exe File opened (read-only) \??\z: rbzguilgdt.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rbzguilgdt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rbzguilgdt.exe -
AutoIT Executable 58 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2780-42-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-41-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-32-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2248-44-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/3024-49-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-82-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2948-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/3024-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2948-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/3024-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/3024-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2948-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/3024-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2948-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-104-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-106-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-105-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-107-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-108-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-109-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-111-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-112-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-110-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-118-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-119-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-120-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-122-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-123-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-121-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-125-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-126-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-124-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-128-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-129-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-127-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-130-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-131-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-134-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-135-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-133-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-137-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-138-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-136-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2744-141-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2780-142-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2800-140-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rbzguilgdt.exe ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe File created C:\Windows\SysWOW64\xbwcpegmozncron.exe ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xbwcpegmozncron.exe ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rbzguilgdt.exe File created C:\Windows\SysWOW64\rbzguilgdt.exe ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe File created C:\Windows\SysWOW64\gcotvsnb.exe ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gcotvsnb.exe ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe File created C:\Windows\SysWOW64\inqrfxucrsqni.exe ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\inqrfxucrsqni.exe ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gcotvsnb.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gcotvsnb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gcotvsnb.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gcotvsnb.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gcotvsnb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gcotvsnb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gcotvsnb.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gcotvsnb.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gcotvsnb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gcotvsnb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gcotvsnb.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gcotvsnb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gcotvsnb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gcotvsnb.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gcotvsnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbzguilgdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gcotvsnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbwcpegmozncron.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inqrfxucrsqni.exe -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" rbzguilgdt.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat rbzguilgdt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh rbzguilgdt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc rbzguilgdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" rbzguilgdt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf rbzguilgdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" rbzguilgdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBDFACDFE6AF1E384093B44869C39E3B08003FE4366033AE2CC42EF08A4" ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184EC67815E4DBBEB9BB7FE5ED9F34C8" ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg rbzguilgdt.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" rbzguilgdt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs rbzguilgdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF8FF894F5882139145D62F7E90BDEEE630584466466330D79D" ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F76BC2FE6C21D9D273D1D48A7E9060" ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" rbzguilgdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" rbzguilgdt.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412C7A9D2383586D4276A070532CD97DF365DD" ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B12947E1389F52C8B9D1329BD7C4" ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2036 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2948 gcotvsnb.exe 2948 gcotvsnb.exe 2948 gcotvsnb.exe 2948 gcotvsnb.exe 2800 rbzguilgdt.exe 2800 rbzguilgdt.exe 2800 rbzguilgdt.exe 2800 rbzguilgdt.exe 2800 rbzguilgdt.exe 3024 gcotvsnb.exe 3024 gcotvsnb.exe 3024 gcotvsnb.exe 3024 gcotvsnb.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe 2780 inqrfxucrsqni.exe 2780 inqrfxucrsqni.exe 2744 xbwcpegmozncron.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe Token: SeShutdownPrivilege 2808 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2800 rbzguilgdt.exe 2948 gcotvsnb.exe 2780 inqrfxucrsqni.exe 2800 rbzguilgdt.exe 2948 gcotvsnb.exe 2780 inqrfxucrsqni.exe 2800 rbzguilgdt.exe 2780 inqrfxucrsqni.exe 2948 gcotvsnb.exe 3024 gcotvsnb.exe 3024 gcotvsnb.exe 3024 gcotvsnb.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2744 xbwcpegmozncron.exe 2800 rbzguilgdt.exe 2948 gcotvsnb.exe 2780 inqrfxucrsqni.exe 2800 rbzguilgdt.exe 2948 gcotvsnb.exe 2780 inqrfxucrsqni.exe 2800 rbzguilgdt.exe 2780 inqrfxucrsqni.exe 2948 gcotvsnb.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe 2808 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 WINWORD.EXE 2036 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2800 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2800 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2800 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2800 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2744 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2744 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2744 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2744 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2948 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 33 PID 2248 wrote to memory of 2948 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 33 PID 2248 wrote to memory of 2948 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 33 PID 2248 wrote to memory of 2948 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 33 PID 2248 wrote to memory of 2780 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 34 PID 2248 wrote to memory of 2780 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 34 PID 2248 wrote to memory of 2780 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 34 PID 2248 wrote to memory of 2780 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 34 PID 2248 wrote to memory of 2036 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 35 PID 2248 wrote to memory of 2036 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 35 PID 2248 wrote to memory of 2036 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 35 PID 2248 wrote to memory of 2036 2248 ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe 35 PID 2800 wrote to memory of 3024 2800 rbzguilgdt.exe 36 PID 2800 wrote to memory of 3024 2800 rbzguilgdt.exe 36 PID 2800 wrote to memory of 3024 2800 rbzguilgdt.exe 36 PID 2800 wrote to memory of 3024 2800 rbzguilgdt.exe 36 PID 2036 wrote to memory of 2768 2036 WINWORD.EXE 39 PID 2036 wrote to memory of 2768 2036 WINWORD.EXE 39 PID 2036 wrote to memory of 2768 2036 WINWORD.EXE 39 PID 2036 wrote to memory of 2768 2036 WINWORD.EXE 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed9c0c1b20b1873ca8c8fbf5be3036f6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\rbzguilgdt.exerbzguilgdt.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\gcotvsnb.exeC:\Windows\system32\gcotvsnb.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3024
-
-
-
C:\Windows\SysWOW64\xbwcpegmozncron.exexbwcpegmozncron.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744
-
-
C:\Windows\SysWOW64\gcotvsnb.exegcotvsnb.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2948
-
-
C:\Windows\SysWOW64\inqrfxucrsqni.exeinqrfxucrsqni.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2780
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2768
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2808
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5378940acd1d70c8c164e6ee5ec1c9f30
SHA1dd8b6df329ce137630008cac083c33c6e1c797f1
SHA2565fa55cddd91e99e6ffd5bae96f72f6746fed9de00726d595856accdb4f22de51
SHA5129f2e9171341a705cbae0c068688b575af08fb771d43b51989e8d2225abae78b89acbed6a096cefc5e4b23ad84bcf0480e63c6379609384ec61a2fcefbb33cedb
-
Filesize
255KB
MD5a762b3192bd12f75564824eed27b422e
SHA18d948fa232f79af8b195134799896de2187e4daa
SHA256ae4433498e4fe08e50f33aaf74cbe55c747f384f1165a612a1e7af6c5f91c5bd
SHA512879506160485caa49c7c7a63e88600cca7470895ecf586360a1316ed8435ebcd00bedff20ff95099999028234ffb729a5b51af931ba61a5040772517b863574f
-
Filesize
255KB
MD5404ebace26aa396750fb33b1faf3cbb5
SHA1e64cd424af3fdfc303985a07d0a4c15e549744ae
SHA256aa7f7591bc4309c0591400f3e6ef613392f989a7023988b30291771dcadd231f
SHA5123443a9a09faea309da1e184e1f4883ea1850b64ad92c2e92ba00f029fa92e77e2e6ce487ea4ac39fae21c3684d6e504c43665a102d429fe63731f5b8f051e145
-
Filesize
255KB
MD59734b2bda3ac1e0f395428d355fbdf5d
SHA1efc5077729281bf6cad96422cdc3de1415c57b87
SHA2568b008b3c02da586f045b601fce723073960786a61c5363e877ba170c6f01c2ca
SHA51205e1ea0cce19f4195a373fb99d0318c4e895efdc3ae6d77d73e45b8eedbe2cdbfcb1981b6ac7e45988f2c13fa3fcc4eaa262da80ba1ea840da7d437a13540e7e
-
Filesize
255KB
MD5ca89f9bab53bc7a052d230ac4863bd15
SHA1f50f80f9d82ba808b416c1a127c63dfbd08659f1
SHA2565d940dac82d09f5be001975fee0fcef4c35be4281dd255ea2bbf90f42059a8f7
SHA512724a5abbdb08049bb03b75d9e992cacbdddfe02e9c7b71ade4d452e08cfa006e57f30a476382673793ed8d4c47f1e88b6c6cbc47d70c71be28a94fda7e220621
-
Filesize
255KB
MD53f5f0b23d59030bc4de4b3814b802864
SHA16b1f39f32a957aa42e27dcac699ca3d4be5fc07d
SHA256cd78ae7d541753f372283442e9541aa519f5adad1a174ce5ec77f24767808e96
SHA512c4054f30d3635a2f0d34468ba4d06e6bc2270a2b00f4626bd749666730bb854e029533cb0724f3565dfd17133295161d989c1f64904beaa31b86995b184bc77a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7