Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 23:47
Behavioral task
behavioral1
Sample
5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
5f4e35a011f3717d5ada9865d8867fb0
-
SHA1
cae012e3dcffac07162c72d48f32b62db71b8759
-
SHA256
0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
-
SHA512
7ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e
-
SSDEEP
49152:VdAKs1ZTeWKH7qC2huWZYz827+doDBfEzbsDDS/BsuPYfq7DTAQ:wKs1ZTc7uQWZKb7goFfEzbsDDS/CkOuH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds policy Run key to start application 2 TTPs 20 IoCs
Processes:
5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exesvchost.exevmvctr3.exeexplorer.exevmvctr3.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
explorer.exepid process 3936 explorer.exe -
Executes dropped EXE 16 IoCs
Processes:
vmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exepid process 708 vmvctr3.exe 1932 vmvctr3.exe 3476 vmvctr3.exe 3096 vmvctr3.exe 1460 vmvctr3.exe 1532 vmvctr3.exe 3092 vmvctr3.exe 3516 vmvctr3.exe 2224 vmvctr3.exe 3088 vmvctr3.exe 4476 vmvctr3.exe 1676 vmvctr3.exe 1972 vmvctr3.exe 2352 vmvctr3.exe 1068 vmvctr3.exe 1708 vmvctr3.exe -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
vmvctr3.exe5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exevmvctr3.exeexplorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" vmvctr3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\VMware vCenter3 = "C:\\Users\\Admin\\AppData\\Roaming\\VMware vCenter3\\vmvctr3.exe" explorer.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exedescription pid process target process PID 2264 set thread context of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 708 set thread context of 3516 708 vmvctr3.exe vmvctr3.exe PID 1932 set thread context of 3092 1932 vmvctr3.exe vmvctr3.exe PID 3476 set thread context of 2224 3476 vmvctr3.exe vmvctr3.exe PID 3096 set thread context of 3088 3096 vmvctr3.exe vmvctr3.exe PID 1460 set thread context of 4476 1460 vmvctr3.exe vmvctr3.exe PID 1532 set thread context of 1676 1532 vmvctr3.exe vmvctr3.exe PID 3516 set thread context of 4668 3516 vmvctr3.exe explorer.exe PID 1972 set thread context of 2352 1972 vmvctr3.exe vmvctr3.exe PID 1068 set thread context of 1708 1068 vmvctr3.exe vmvctr3.exe -
Processes:
resource yara_rule behavioral2/memory/2264-0-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2264-8-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/2264-2-0x0000000000400000-0x0000000000B28000-memory.dmp upx C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe upx behavioral2/memory/708-36-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1932-37-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3476-42-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/708-43-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1932-44-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3096-48-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3476-51-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1460-52-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3096-57-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/708-67-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1532-60-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1932-72-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1460-80-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3476-86-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3096-92-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1532-93-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/3096-100-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1460-106-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1460-111-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1532-122-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1972-154-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1972-160-0x0000000000400000-0x0000000000B28000-memory.dmp upx behavioral2/memory/1068-172-0x0000000000400000-0x0000000000B28000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exevmvctr3.exe5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exevmvctr3.exeexplorer.exevmvctr3.exevmvctr3.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmvctr3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 explorer.exe -
Modifies registry class 2 IoCs
Processes:
5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exesvchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
explorer.exepid process 4668 explorer.exe 4668 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exeexplorer.exepid process 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 4668 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exedescription pid process target process PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 2264 wrote to memory of 1796 2264 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe PID 1796 wrote to memory of 3496 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe svchost.exe PID 1796 wrote to memory of 3496 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe svchost.exe PID 1796 wrote to memory of 3496 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe svchost.exe PID 1796 wrote to memory of 3496 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe svchost.exe PID 1796 wrote to memory of 2728 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 2728 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 2980 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 2980 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 2980 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 3936 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 3936 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 3936 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 3936 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 1060 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 1060 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 4880 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 4880 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 4880 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 4292 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 4292 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 2264 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 2264 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 2264 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 2676 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 2676 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 1708 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 1708 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 1708 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 4760 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 4760 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 4532 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 4532 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 4532 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 4884 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 4884 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 1008 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 1008 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 1008 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 2380 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 2380 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 5108 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 5108 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 5108 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 2924 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 2924 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 3024 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 3024 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 3024 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe PID 1796 wrote to memory of 3068 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 3068 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe msedge.exe PID 1796 wrote to memory of 3560 1796 5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f4e35a011f3717d5ada9865d8867fb0_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3496 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:3092
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:2224
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3096 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:3088
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:4476
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:1676
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1920
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1236
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2032
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2980
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4972
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3104
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1008
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3920
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:3460
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:2752
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4076
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:1528
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵PID:3000
-
-
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"5⤵
- Executes dropped EXE
PID:1708
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2728
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2980
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1060
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4292
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2676
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4760
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4884
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2380
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2924
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3068
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:396
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1756
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1488
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4076
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3540
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2520
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2280
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4120
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1372
-
-
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:708 -
C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe"C:\Users\Admin\AppData\Roaming\VMware vCenter3\vmvctr3.exe" vCenter3\vmvctr3.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:1476
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4668
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD514bae2561a767133725257c6ef55c89e
SHA127f7d1009dcf7205e1709146bede191632374ddf
SHA256af93288f4018559643aef401759c059fa53f05be73568eda783092e9d2aed73a
SHA512f7c3ccad371b08105d286521808e2159320b40afdfee957ba2031264d11ba165aef3f71d814534c42c0d00f5823cd2166101b61b85fb62f21a55785cac70a66e
-
Filesize
1018KB
MD5bc9b20d15be56588dc1716ce4b0aedee
SHA1054a2970bc0c453b656d0ef2bd1a4f4c97707145
SHA25635b282de1c0bd77fac64a1b1f692f521a37a706d9f110a696d428a81e3035120
SHA5120620e13687e7d3441ad0c11f30e5d2345b26da00f38ef299eb624f338f900b24b403600c2b153faa6e22d98a2ca0e2cd1307997e62052f04d2fa2176fe5648cb
-
Filesize
2.4MB
MD55f4e35a011f3717d5ada9865d8867fb0
SHA1cae012e3dcffac07162c72d48f32b62db71b8759
SHA2560f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61
SHA5127ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e