Analysis
-
max time kernel
29s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2025, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe
-
Size
315KB
-
MD5
8b98031d68d8ed28f7dd32ac5b648a4e
-
SHA1
5b95ac17daaba2e0627657a186032c88de05e2e4
-
SHA256
17c0cd538a1ab2296e626d49cc25076a8647ad3c8550f8a25e3ad69de17558b8
-
SHA512
04107d23a3c02d420cbbfc280896f199c2ea3cc50ca88f678dbaaf2bf85bce33f668b0956e7adf7b75303dbfe678325b6ec1dde356e8395fe4ff5919b09ef55b
-
SSDEEP
6144:t/BOPNymMiR6k47ySQON/fiHmK3tGQpD3lipW0KdL:sy7u6kIf/6HmK3tzgpox
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 7 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2404-13-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2404-14-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/4440-16-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/4440-17-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2404-122-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2096-125-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot behavioral1/memory/2404-604-0x0000000000400000-0x000000000046D000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "3" JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\06B.exe = "C:\\Program Files (x86)\\LP\\AF32\\06B.exe" JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
resource yara_rule behavioral1/memory/2404-3-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2404-13-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2404-14-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/4440-16-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/4440-17-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2404-122-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2096-124-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2096-125-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2404-604-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\LP\AF32\06B.exe JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe File opened for modification C:\Program Files (x86)\LP\AF32\06B.exe JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData\Microsoft.MicrosoftStickyNotes_8wekyb3d8 explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{063A4725-0197-4250-BF6F-F55F56838489} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData\Microsoft.MicrosoftStickyNotes_8wekyb3d8 = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData\Microsoft.MicrosoftStickyNotes_8wekyb3d8 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\PersistedTitleBarData\Microsoft.MicrosoftStickyNotes_8wekyb3d8 = "1" explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{F7CE7BE6-2ED1-49E2-B096-344CCBE51994} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHos = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeSecurityPrivilege 4432 msiexec.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5884 explorer.exe Token: SeCreatePagefilePrivilege 5884 explorer.exe Token: SeShutdownPrivilege 5648 explorer.exe Token: SeCreatePagefilePrivilege 5648 explorer.exe Token: SeShutdownPrivilege 5648 explorer.exe Token: SeCreatePagefilePrivilege 5648 explorer.exe Token: SeShutdownPrivilege 5648 explorer.exe Token: SeCreatePagefilePrivilege 5648 explorer.exe Token: SeShutdownPrivilege 5648 explorer.exe Token: SeCreatePagefilePrivilege 5648 explorer.exe Token: SeShutdownPrivilege 5648 explorer.exe Token: SeCreatePagefilePrivilege 5648 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5884 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe 5648 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 960 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2404 wrote to memory of 4440 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 101 PID 2404 wrote to memory of 4440 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 101 PID 2404 wrote to memory of 4440 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 101 PID 2404 wrote to memory of 2096 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 109 PID 2404 wrote to memory of 2096 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 109 PID 2404 wrote to memory of 2096 2404 JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe 109 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe"1⤵
- Modifies security service
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe startC:\Users\Admin\AppData\Roaming\2C715\F03AF.exe%C:\Users\Admin\AppData\Roaming\2C7152⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b98031d68d8ed28f7dd32ac5b648a4e.exe startC:\Program Files (x86)\15DA1\lvvm.exe%C:\Program Files (x86)\15DA12⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Program Files (x86)\LP\AF32\9DE.tmp"C:\Program Files (x86)\LP\AF32\9DE.tmp"2⤵PID:4128
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files (x86)\LP\AF32\06B.exe1⤵PID:4640
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5884
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:960
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5648
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:660
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5380
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1924
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4348
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:212
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6104
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5524
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3040
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4468
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2828
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6000
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5360
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5e7cab4aa4304bfbc54b9723fca9bd57a
SHA119d2cc42fd30ab58a8e03569777f4a9ef8fd531d
SHA2560624d004147b8549387ff54f23f50b84096b94671caa471bae5fb138ee23daff
SHA512518e32b0cbbe185fdc284195c44559fff73ab0b013efcf8f413ef63cc653f7fcba839d29edcb6034c63b6c7204d2bce3329a7146b6a0b013b063852d4b2a10c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize471B
MD5f25dcdc613a8e29d6f29372622ac2ced
SHA168d18e7a4b3013fabd9d8fad383e9bec45dbd3ad
SHA256f0a1ff2488b1b4ffbb7aa9fd0108763a6f535d6e485c0c3fceae202b63079d20
SHA512ec023970b3020d6f7fe462ad2bdbeca910a3efff5db6987c62dbab95c54f14107f16513cbe627f9bd4a9e1973d81ebdd089d3c2403e70a6606bb9965b905d2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize412B
MD50fca34936fc49e1b43a2885d96a52a52
SHA1a099813ff86f5b56d0e71ec277d9474ba7423251
SHA25676346da6c290f562827e58ac1cf2330833ff96059596749e8908c2bf2fda60fb
SHA5123e4c922e2c44f3a3a821aa8bac2eaa14763f644cf96caaa181c29f554c19f831743ae02735b270aceb44bdf4e790b53de203582e14fded8bf6f03b61a52492d0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\917WYNDL\microsoft.windows[1].xml
Filesize97B
MD5468d308673768883fbdab8c821174a66
SHA1431bb79b0ef41aac8664e813bbab0d655f1af68a
SHA25651d44ac3d6a72793fd9898120f53ef05261ed573f0334c94cbfaa6c4bee4578a
SHA5121ebb52420b91c4440fee556bdaa23fe5a36656ba925d05a725e45ecbd5934f9984e0c7513a2a00ab854409ec0044ce4aa6aa72cf419992a441d5e9256e948f65
-
Filesize
996B
MD5a7cf31d5e7c4301d30eae2668795dc03
SHA14260a6771b0284606b56201c7da548466148f60b
SHA256d4766b1dcc7541bc62c8898f6ca52e3cb7d047eb81629e6792cabdc4e28858bd
SHA512097cc4b8c56d196aea2419d450cc633ba47d2edb78f26ad72a855ed85a1fac09c08e7f317f0e48c1c29885c17088a4a4b870a65d34c965b7ebd1cf1de814f3e0
-
Filesize
600B
MD5dd4daed8a5277cbbf6af864abf235b9c
SHA11074c5ddb3d83cfbcec89abce8b2b11d41f2ef3b
SHA256949964e86f54cc77157ee7e5efdcd45d3031dba2592748f021e7ae9fdb24d993
SHA51208dc53c75d96cc000e2a969663703ecf0b9fa8532ac084dbe2cdb45dc7835c96995762ba5619ea0b936e80b3a408296a3831e6ba70700ba3f8d377ca446f73b5
-
Filesize
1KB
MD54080908af9868dfe11e4faf6571ad91a
SHA1ea9976d6c96729e38949dcacd48d3ee0a093c397
SHA256c6b9154260894a251b178d3b69168334c9dee179ee6ae38c0f14b0a8eb14d88a
SHA5127f7704aef896d180dfb9770d3678ffc68844d9a5c34c209f2617f88b44a9b69a19af11a589d84aae10b2235f37622e6e72fd5c8ecc4b1687678e52246fb7fb2b