Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe
-
Size
938KB
-
MD5
83c698151d075740628ae7d8aaf39023
-
SHA1
f4725174c66a837870f74222b7cc4fa19160731b
-
SHA256
1d34ccc414f59436188e5c8a29963e16b0913b1f148c4f51eafe6ae23176ea55
-
SHA512
7a970cc742bb5103c4b7296b6f9ac11ee3870be5a8bebba75ebd2d7a0403dacbf5723b3e13bdd7dd40d628c00678feaf5f86b2a5cbe3d947cbcd23c3fa5bb04d
-
SSDEEP
24576:2FTqADbP4qXsZejCxQZPUQz/neABpcIssX0viImQG:ETvgqcZnQRUQbeAvcIhGi
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Tonkman
iiili.in:5300
iiili.in:5310
iiili.in:5320
iiili.in:5330
iiili.in:5340
iiili.in:5350
iiili.in:5360
iiili.in:5370
iiili.in:5380
iiili.in:5390
illiil.in:5300
illiil.in:5310
illiil.in:5320
illiil.in:5330
illiil.in:5340
illiil.in:5350
illiil.in:5360
illiil.in:5370
illiil.in:5380
illiil.in:5390
liilli.in:5300
liilli.in:5310
liilli.in:5320
liilli.in:5330
liilli.in:5340
liilli.in:5350
liilli.in:5360
liilli.in:5370
liilli.in:5380
liilli.in:5390
lllil.in:5300
lllil.in:5310
lllil.in:5320
lllil.in:5330
lllil.in:5340
lllil.in:5350
lllil.in:5360
lllil.in:5370
lllil.in:5380
lllil.in:5390
lllllilllillll.in:5300
lllllilllillll.in:5310
lllllilllillll.in:5320
lllllilllillll.in:5330
lllllilllillll.in:5340
lllllilllillll.in:5350
lllllilllillll.in:5360
lllllilllillll.in:5370
lllllilllillll.in:5380
lllllilllillll.in:5390
iiliiiliilli.info:5300
iiliiiliilli.info:5310
iiliiiliilli.info:5320
iiliiiliilli.info:5330
iiliiiliilli.info:5340
iiliiiliilli.info:5350
iiliiiliilli.info:5360
iiliiiliilli.info:5370
iiliiiliilli.info:5380
iiliiiliilli.info:5390
iillili.info:5300
iillili.info:5310
iillili.info:5320
iillili.info:5330
iillili.info:5340
iillili.info:5350
iillili.info:5360
iillili.info:5370
iillili.info:5380
iillili.info:5390
lilliili.info:5300
lilliili.info:5310
lilliili.info:5320
lilliili.info:5330
lilliili.info:5340
lilliili.info:5350
lilliili.info:5360
lilliili.info:5370
lilliili.info:5380
lilliili.info:5390
llllillllil.info:5300
llllillllil.info:5310
llllillllil.info:5320
llllillllil.info:5330
llllillllil.info:5340
llllillllil.info:5350
llllillllil.info:5360
llllillllil.info:5370
llllillllil.info:5380
llllillllil.info:5390
llllillllili.info:5300
llllillllili.info:5310
llllillllili.info:5320
llllillllili.info:5330
llllillllili.info:5340
llllillllili.info:5350
llllillllili.info:5360
llllillllili.info:5370
llllillllili.info:5380
llllillllili.info:5390
drumgd1.zapto.org:5942
drumgd12.zapto.org:5943
BugTestingReporter
-
gencode
5d7taAMln2CM
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies Windows Firewall 2 TTPs 6 IoCs
pid Process 2488 netsh.exe 1944 netsh.exe 1756 netsh.exe 1492 netsh.exe 2516 netsh.exe 2464 netsh.exe -
Sets file to hidden 1 TTPs 11 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2544 attrib.exe 2228 attrib.exe 1804 attrib.exe 1600 attrib.exe 1736 attrib.exe 2844 attrib.exe 1360 attrib.exe 1772 attrib.exe 2972 attrib.exe 2344 attrib.exe 2528 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 696 errorreporter.exe -
Loads dropped DLL 3 IoCs
pid Process 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\nvidgfx = "C:\\Users\\Admin\\AppData\\Roaming\\nvidgfx.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\nvidgfx = "C:\\Users\\Admin\\AppData\\Roaming\\nvidgfx.exe" JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe -
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\J: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\L: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\M: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\W: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\G: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\A: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\B: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\E: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\Q: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\T: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\X: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\I: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\V: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\Z: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\N: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\H: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\K: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\R: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\S: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\U: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\Y: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\O: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\P: JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened (read-only) \??\W: wmplayer.exe -
Drops autorun.inf file 1 TTPs 6 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\Z:\autorun.inf JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File created F:\autorun.inf JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File created D:\autorun.inf JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File created C:\autorun.inf JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe File opened for modification C:\autorun.inf attrib.exe File opened for modification F:\autorun.inf attrib.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 696 set thread context of 2388 696 errorreporter.exe 81 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727 attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe attrib.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2972 sc.exe 2344 sc.exe 716 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language errorreporter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe -
Modifies Control Panel 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\ScreenSaveActive = "1" JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\ScreenSaveActive = "1" JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\ScreenSaveTimeOut = "60" JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\SCRNSAVE.EXE = "0x1.96cd80p+321ppdata\\Microsoft\\Windows\\(null).scr" JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT = "0" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Show_URLinStatusBar = "yes" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\MINIE reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MINIE\ShowStatusBar = "1" reg.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Show_FullURL = "yes" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Show_StatusBar = "yes" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main reg.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellNew reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellNew\FileName = "C:\\Users\\Admin\\AppData\\Roaming\\newzip.dat" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\CompressedFolder\ShellNew reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\CompressedFolder\ShellNew\FileName = "C:\\Users\\Admin\\AppData\\Roaming\\newzip.dat" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rar\ShellNew reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rar\ShellNew\FileName = "C:\\Users\\Admin\\AppData\\Roaming\\newzip.dat" reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2388 vbc.exe Token: SeSecurityPrivilege 2388 vbc.exe Token: SeTakeOwnershipPrivilege 2388 vbc.exe Token: SeLoadDriverPrivilege 2388 vbc.exe Token: SeSystemProfilePrivilege 2388 vbc.exe Token: SeSystemtimePrivilege 2388 vbc.exe Token: SeProfSingleProcessPrivilege 2388 vbc.exe Token: SeIncBasePriorityPrivilege 2388 vbc.exe Token: SeCreatePagefilePrivilege 2388 vbc.exe Token: SeBackupPrivilege 2388 vbc.exe Token: SeRestorePrivilege 2388 vbc.exe Token: SeShutdownPrivilege 2388 vbc.exe Token: SeDebugPrivilege 2388 vbc.exe Token: SeSystemEnvironmentPrivilege 2388 vbc.exe Token: SeChangeNotifyPrivilege 2388 vbc.exe Token: SeRemoteShutdownPrivilege 2388 vbc.exe Token: SeUndockPrivilege 2388 vbc.exe Token: SeManageVolumePrivilege 2388 vbc.exe Token: SeImpersonatePrivilege 2388 vbc.exe Token: SeCreateGlobalPrivilege 2388 vbc.exe Token: 33 2388 vbc.exe Token: 34 2388 vbc.exe Token: 35 2388 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2772 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 30 PID 2156 wrote to memory of 2772 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 30 PID 2156 wrote to memory of 2772 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 30 PID 2156 wrote to memory of 2772 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 30 PID 2772 wrote to memory of 2816 2772 cmd.exe 32 PID 2772 wrote to memory of 2816 2772 cmd.exe 32 PID 2772 wrote to memory of 2816 2772 cmd.exe 32 PID 2772 wrote to memory of 2816 2772 cmd.exe 32 PID 2156 wrote to memory of 2752 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 33 PID 2156 wrote to memory of 2752 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 33 PID 2156 wrote to memory of 2752 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 33 PID 2156 wrote to memory of 2752 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 33 PID 2156 wrote to memory of 2688 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 35 PID 2156 wrote to memory of 2688 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 35 PID 2156 wrote to memory of 2688 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 35 PID 2156 wrote to memory of 2688 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 35 PID 2156 wrote to memory of 2568 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 36 PID 2156 wrote to memory of 2568 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 36 PID 2156 wrote to memory of 2568 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 36 PID 2156 wrote to memory of 2568 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 36 PID 2156 wrote to memory of 1924 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 37 PID 2156 wrote to memory of 1924 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 37 PID 2156 wrote to memory of 1924 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 37 PID 2156 wrote to memory of 1924 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 37 PID 2568 wrote to memory of 2584 2568 cmd.exe 42 PID 2568 wrote to memory of 2584 2568 cmd.exe 42 PID 2568 wrote to memory of 2584 2568 cmd.exe 42 PID 2568 wrote to memory of 2584 2568 cmd.exe 42 PID 1924 wrote to memory of 2756 1924 cmd.exe 41 PID 1924 wrote to memory of 2756 1924 cmd.exe 41 PID 1924 wrote to memory of 2756 1924 cmd.exe 41 PID 1924 wrote to memory of 2756 1924 cmd.exe 41 PID 2688 wrote to memory of 2228 2688 cmd.exe 43 PID 2688 wrote to memory of 2228 2688 cmd.exe 43 PID 2688 wrote to memory of 2228 2688 cmd.exe 43 PID 2688 wrote to memory of 2228 2688 cmd.exe 43 PID 2156 wrote to memory of 2572 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 44 PID 2156 wrote to memory of 2572 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 44 PID 2156 wrote to memory of 2572 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 44 PID 2156 wrote to memory of 2572 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 44 PID 2156 wrote to memory of 2632 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 46 PID 2156 wrote to memory of 2632 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 46 PID 2156 wrote to memory of 2632 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 46 PID 2156 wrote to memory of 2632 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 46 PID 2156 wrote to memory of 2684 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 47 PID 2156 wrote to memory of 2684 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 47 PID 2156 wrote to memory of 2684 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 47 PID 2156 wrote to memory of 2684 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 47 PID 2632 wrote to memory of 1360 2632 cmd.exe 50 PID 2632 wrote to memory of 1360 2632 cmd.exe 50 PID 2632 wrote to memory of 1360 2632 cmd.exe 50 PID 2632 wrote to memory of 1360 2632 cmd.exe 50 PID 2156 wrote to memory of 2000 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 51 PID 2156 wrote to memory of 2000 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 51 PID 2156 wrote to memory of 2000 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 51 PID 2156 wrote to memory of 2000 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 51 PID 2000 wrote to memory of 2440 2000 cmd.exe 53 PID 2000 wrote to memory of 2440 2000 cmd.exe 53 PID 2000 wrote to memory of 2440 2000 cmd.exe 53 PID 2000 wrote to memory of 2440 2000 cmd.exe 53 PID 2156 wrote to memory of 920 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 54 PID 2156 wrote to memory of 920 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 54 PID 2156 wrote to memory of 920 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 54 PID 2156 wrote to memory of 920 2156 JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe 54 -
Views/modifies file attributes 1 TTPs 18 IoCs
pid Process 2816 attrib.exe 1600 attrib.exe 2544 attrib.exe 1736 attrib.exe 2972 attrib.exe 2584 attrib.exe 2344 attrib.exe 2844 attrib.exe 1036 attrib.exe 2588 attrib.exe 2756 attrib.exe 2228 attrib.exe 1360 attrib.exe 2440 attrib.exe 1772 attrib.exe 2712 attrib.exe 1804 attrib.exe 2528 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib -R -H -S "%appdata%\nvidgfx.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\attrib.exeattrib -R -H -S "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "%temp%\nvidgfx.exe" "%appdata%\nvidgfx.exe"2⤵PID:2752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +R +H +S "%appdata%\nvidgfx.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\attrib.exeattrib +R +H +S "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg ADD "HKCU\software\microsoft\windows\currentversion\run" /v "nvidgfx" /t REG_SZ /d "%appdata%\nvidgfx.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\reg.exereg ADD "HKCU\software\microsoft\windows\currentversion\run" /v "nvidgfx" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\nvidgfx.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib -R -H -S "%windir%\system32\atlsyn.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\attrib.exeattrib -R -H -S "C:\Windows\system32\atlsyn.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "%temp%\nvidgfx.exe" "%windir%\system32\atlsyn.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +R +H +S "%windir%\system32\atlsyn.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\attrib.exeattrib +R +H +S "C:\Windows\system32\atlsyn.exe"3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1360
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c md %appdata%\Microsoft\Windows2⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib -R -H -S "%appdata%\Microsoft\Windows\spacedots.scr"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\attrib.exeattrib -R -H -S "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spacedots.scr"3⤵
- Views/modifies file attributes
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "%temp%\nvidgfx.exe" "%appdata%\Microsoft\Windows\spacedots.scr"2⤵
- System Location Discovery: System Language Discovery
PID:920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +R +H +S "%appdata%\Microsoft\Windows\spacedots.scr"2⤵
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\attrib.exeattrib +R +H +S "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spacedots.scr"3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg ADD "HKCU\Control Panel\Desktop" /v "SCRNSAVE.EXE" /t REG_SZ /d "%appdata%\Microsoft\Windows\spacedots.scr" /f2⤵
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\reg.exereg ADD "HKCU\Control Panel\Desktop" /v "SCRNSAVE.EXE" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spacedots.scr" /f3⤵PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg ADD "HKCU\Control Panel\Desktop" /v ScreenSaveActive /t REG_SZ /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\reg.exereg ADD "HKCU\Control Panel\Desktop" /v ScreenSaveActive /t REG_SZ /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg ADD "HKCU\Control Panel\Desktop" /v ScreenSaveTimeOut /t REG_SZ /d "60" /f2⤵
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\reg.exereg ADD "HKCU\Control Panel\Desktop" /v ScreenSaveTimeOut /t REG_SZ /d "60" /f3⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
-
C:\Users\Admin\AppData\Roaming\errorreporter.exe"C:\Users\Admin\AppData\Roaming\errorreporter.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:696 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h4⤵
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h5⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:1772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h4⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h5⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:1600
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg ADD "HKCR\.zip\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f2⤵
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Windows\SysWOW64\reg.exereg ADD "HKCR\.zip\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f3⤵
- Modifies registry class
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg ADD "HKCR\.zip\CompressedFolder\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f2⤵
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\SysWOW64\reg.exereg ADD "HKCR\.zip\CompressedFolder\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg ADD "HKCR\.rar\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f2⤵PID:2648
-
C:\Windows\SysWOW64\reg.exereg ADD "HKCR\.rar\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f3⤵
- Modifies registry class
PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\plugininstall.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe" "winhttpsvc" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="winhttpsvc" profile=public dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe" enable=yes3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1492
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 5220 "Open Port 5220"3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2516
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Open Port 5220" profile=public dir=in action=allow protocol=TCP localport=52203⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2488
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode DISABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\sc.exesc config upnphost start= auto3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\sc.exesc config SSDPSRV start= auto3⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\SysWOW64\sc.exesc config browser start= auto3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:716
-
-
C:\Windows\SysWOW64\net.exenet start seclogon3⤵
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start seclogon4⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
C:\Windows\SysWOW64\net.exenet start upnphost3⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start upnphost4⤵PID:1748
-
-
-
C:\Windows\SysWOW64\net.exenet start SSDPSRV3⤵
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SSDPSRV4⤵PID:1680
-
-
-
C:\Windows\SysWOW64\net.exenet start browser3⤵
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start browser4⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v EnableBalloonTips /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\reg.exereg DELETE "HKCU\software\microsoft\windows\currentversion\action center\checks" /f3⤵PID:2772
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" /v EnableFirewall /t REG_DWORD /d 0 /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile" /v EnableFirewall /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile" /v EnableFirewall /t REG_DWORD /d 0 /f3⤵PID:2720
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl" /v FEATURE_WEBOC_POPUPMANAGEMENT /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2724
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\Software\Microsoft\Internet Explorer\Main" /v Show_FullURL /t REG_SZ /d yes /f3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2596
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\Software\Microsoft\Internet Explorer\Main" /v Show_StatusBar /t REG_SZ /d yes /f3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2228
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\Software\Microsoft\Internet Explorer\Main" /v Show_URLinStatusBar /t REG_SZ /d yes /f3⤵
- Modifies Internet Explorer settings
PID:2696
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKLM\Software\Microsoft\Internet Explorer\MINIE" /v ShowStatusBar /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2872
-
-
C:\Windows\SysWOW64\reg.exereg DELETE "HKCU\AppEvents\Schemes\Apps\Explorer\Navigating\.Current" /f3⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\reg.exereg DELETE "HKCU\AppEvents\Schemes\Apps\Explorer\Navigating\.Default" /f3⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Check_Associations /t REG_SZ /d no /f3⤵
- Modifies Internet Explorer settings
PID:2568
-
-
C:\Windows\SysWOW64\reg.exereg ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "DisableFirstRunCustomize" /t REG_DWORD /d "1" /f3⤵
- Modifies Internet Explorer settings
PID:2828
-
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2820
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"2⤵
- System Location Discovery: System Language Discovery
PID:328
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"2⤵PID:908
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +R +H "F:\autorun.inf"2⤵PID:2540
-
C:\Windows\SysWOW64\attrib.exeattrib +R +H "F:\autorun.inf"3⤵
- Sets file to hidden
- Drops autorun.inf file
- Views/modifies file attributes
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +R +H "C:\autorun.inf"2⤵
- System Location Discovery: System Language Discovery
PID:1248 -
C:\Windows\SysWOW64\attrib.exeattrib +R +H "C:\autorun.inf"3⤵
- Sets file to hidden
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib -R -H "F:\protect.bat"2⤵PID:536
-
C:\Windows\SysWOW64\attrib.exeattrib -R -H "F:\protect.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib -R -H "C:\protect.bat"2⤵PID:1616
-
C:\Windows\SysWOW64\attrib.exeattrib -R -H "C:\protect.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib -S -R -H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"2⤵PID:2672
-
C:\Windows\SysWOW64\attrib.exeattrib -S -R -H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"3⤵
- Views/modifies file attributes
PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib -S -R -H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"2⤵PID:1932
-
C:\Windows\SysWOW64\attrib.exeattrib -S -R -H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"3⤵
- Views/modifies file attributes
PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Roaming\nvidgfx.exe" "C:\protect.bat"2⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Roaming\nvidgfx.exe" "F:\protect.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +S +R +H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"2⤵
- System Location Discovery: System Language Discovery
PID:592 -
C:\Windows\SysWOW64\attrib.exeattrib +S +R +H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +S +R +H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\attrib.exeattrib +S +R +H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +R +H "F:\protect.bat"2⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\attrib.exeattrib +R +H "F:\protect.bat"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +R +H "C:\protect.bat"2⤵
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\SysWOW64\attrib.exeattrib +R +H "C:\protect.bat"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
2Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692KB
MD5479f8bcbe5729d18e3c42a9b4aeddfac
SHA1dcb37fb7bc0c067c08b4d0b60163b00db59cc411
SHA2567a8efe13b9e02f29c582541a9890282c1e1004b699463517b5ef1de898db8cd3
SHA5122f980051619245d1eba473fd43bf4046b3a2504bdf053180b2ae65058faa0a097517111853261ff88da944ec520d659fb2ab0236f966056fb2e0158958e35888
-
Filesize
2KB
MD59592aa50bf0bfeefbc47eb4bdacfbaab
SHA121a7b9683f6f1374f5f785882a1c1bd05f392c9e
SHA2567a6717ff7d2b63a879b504c0826ec8e3cf25d1616035c8fb70c7d0d932e74ed4
SHA512bfa01bc5c62dbcb3be8f853ca1f1569600f07a3d54b9e19f93fc2353ad201486074c7b9372721e43fb39b0aa3403b010d31475e4d2de8e74fc9719eda3cbcf00
-
Filesize
63B
MD5f64baf418f685884efec59a9d80bc5f6
SHA19c90f7a7efd7ef3059837fdeb06b6b781ca6d1e9
SHA2564b9870b1f52e252451b3fa099e8b270c32ddc6fc29372067be28dcd009ec4e8f
SHA512dceecd6a564c974c71ceeb544b0dfde70a09315db6d72a50fdbecdc0cf505a7ce52b7a83a9a8c79e8cfbb996c054585da6d7c08bf0026b4d9ecdde5f0a2b2a69
-
Filesize
195KB
MD515b8f3be2d9a25def6093dc2d6e1c6b8
SHA1d9adbe4762882de29e0c1dc4aeddf89016a7f94e
SHA2566aff3d70fdc4eb3bfaf610fdad422040e25ab82f7d993d88dc94ccd2f5a96c86
SHA512310a1d6336d4ced1d956fad8b490cafdda697612db0f8e4f98ed7ad76817171cd5af2e8e9778ec803a40a768fa41e52d176f0a2ebc4e6a4182c61b82203d7658