Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
faddc3f2bbd29804c67442c527a45890
-
SHA1
52076fedaa0592bc81bd4bfeb7cfb90c29db473b
-
SHA256
5a9d617e78467db2648608417a550c0cd2072708962d8afebdd865d08f4ae13e
-
SHA512
764da64df51ddcae6641c9f267e4c00752e13e73cd4126196fed74f790deda1e98f4a0e33dd111f65d302c1a79ccddb1e89f4d1b2a1fab643f20f81c77ec70d8
-
SSDEEP
24576:FHLI4YHHEmomR1VN0F6tr/OzBBSDrz1nPTdgdXrdBHLcsH661S0C0xytR:VAkX0N0gtr/AShnUBHLcsauCJR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp -
Executes dropped EXE 2 IoCs
pid Process 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 976 KAV_97_10.exe -
Loads dropped DLL 3 IoCs
pid Process 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 3728 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\prgenerate\is-FBR4N.tmp faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\prgenerate\is-FBR4N.tmp faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Program Files (x86)\prgenerate\is-13SPR.tmp faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Program Files (x86)\prgenerate\is-795KJ.tmp faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\prgenerate\unins000.dat faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Program Files (x86)\prgenerate\unins000.dat faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\vistaw7\Install.tmp faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\vistaw7\comrundu.ducc faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\vistaw7\taobao.ico faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\vistaw7\rd.txt faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\vistaw7\serverID.txt faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\Condu.lnk faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File opened for modification C:\Windows\vistaw7\Install.tmp faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\vistaw7\Config.ini faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\vistaw7\honst.uic faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\vistaw7\infofile.tmp faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp File created C:\Windows\vistaw7\KAV_97_10.exe faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 54 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node KAV_97_10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories KAV_97_10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} KAV_97_10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "bba2a94c9ac4794fb3818fad7d0e5853" KAV_97_10.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uic\Shell\Open\Command faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.uic\ = "uic" faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000008c58e65b102057696e646f777300400009000400efbe874fdb49935862902e0000008205000000000100000000000000000000000000000075942500570069006e0064006f0077007300000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID KAV_97_10.exe Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uic\DefaultIcon faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uic\Shell\Open faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "0" KAV_97_10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.uic faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = 7e00310000000000874fdc4911205374617274557000680009000400efbe874fdb498c580b672e000000a40500000000010000000000000000003e0000000000d33df2005300740061007200740055007000000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003700000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} KAV_97_10.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 5c003100000000008c58745d14204d4943524f537e310000440009000400efbe874fdb49935862902e000000510500000000010000000000000000000000000000009aa1b4004d006900630072006f0073006f0066007400000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 8600310000000000874fdc49112053544152544d7e3100006e0009000400efbe874fdb49935862902e0000009d050000000001000000000000000000440000000000581df5005300740061007200740020004d0065006e007500000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003600000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uic faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uic\Shell\Open\ faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uic\Shell\Open\Command\ = "\"Rundll32.exe\" \"C:\\Windows\\vistaw7\\infofile.icl\" Resetrun" faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 60003100000000008c58015e122050524f4752417e330000480009000400efbe874fdb49935862902e000000500500000000010000000000000000000000000000007c100200500072006f006700720061006d004400610074006100000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 82003100000000008c58115e112050726f6772616d7300006a0009000400efbe874fdb49935862902e0000009e050000000001000000000000000000400000000000cbdb1100500072006f006700720061006d007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003200000018000000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uic\Shell faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2 KAV_97_10.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2\Blob = 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 KAV_97_10.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4036 explorer.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 3136 identity_helper.exe 3136 identity_helper.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4036 explorer.exe 4036 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3292 wrote to memory of 572 3292 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe 85 PID 3292 wrote to memory of 572 3292 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe 85 PID 3292 wrote to memory of 572 3292 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe 85 PID 572 wrote to memory of 3004 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 89 PID 572 wrote to memory of 3004 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 89 PID 572 wrote to memory of 3004 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 89 PID 572 wrote to memory of 3728 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 96 PID 572 wrote to memory of 3728 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 96 PID 572 wrote to memory of 3728 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 96 PID 572 wrote to memory of 2032 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 97 PID 572 wrote to memory of 2032 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 97 PID 2032 wrote to memory of 4188 2032 msedge.exe 98 PID 2032 wrote to memory of 4188 2032 msedge.exe 98 PID 572 wrote to memory of 976 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 99 PID 572 wrote to memory of 976 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 99 PID 572 wrote to memory of 976 572 faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp 99 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2440 2032 msedge.exe 100 PID 2032 wrote to memory of 2956 2032 msedge.exe 101 PID 2032 wrote to memory of 2956 2032 msedge.exe 101 PID 2032 wrote to memory of 644 2032 msedge.exe 102 PID 2032 wrote to memory of 644 2032 msedge.exe 102 PID 2032 wrote to memory of 644 2032 msedge.exe 102 PID 2032 wrote to memory of 644 2032 msedge.exe 102 PID 2032 wrote to memory of 644 2032 msedge.exe 102 PID 2032 wrote to memory of 644 2032 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\is-5JQNB.tmp\faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-5JQNB.tmp\faddc3f2bbd29804c67442c527a45890_JaffaCakes118.tmp" /SL5="$40214,1119550,51712,C:\Users\Admin\AppData\Local\Temp\faddc3f2bbd29804c67442c527a45890_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp3⤵PID:3004
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\vistaw7\comrundu.ducc" message13⤵
- Loads dropped DLL
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cdjspaper.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2aa346f8,0x7ffe2aa34708,0x7ffe2aa347184⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:24⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:84⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:14⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:14⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:14⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:84⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:14⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:14⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:14⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:14⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,12037518300465564974,13282027079053727569,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5736 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
-
C:\Windows\vistaw7\KAV_97_10.exe"C:\Windows\vistaw7\KAV_97_10.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Modifies system certificate store
PID:976
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4036
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4DD39726D4B55AC3B4119B35A893323C_5670351899FEFFE1111FCD3D8BEA636E
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5fd222fc8bd117e85746730f20e526a54
SHA1abfc94fe731ca91491c437b93f3f64710d014e1c
SHA256e27265f475366f5771def4dd4b2f4711803060995850b161b8e5d07facecbfee
SHA51280274c592e910188a975d674e873e134b390ce56b0ffd499fe7d55e2465eb946988ab78481673ec0ab44591a85a3ea7519e3dea200ec0d09cde554fe4ae84918
-
Filesize
152B
MD57e0880992c640aca08737893588a0010
SHA16ceec5cb125a52751de8aeda4bab7112f68ae0fe
SHA2568649a39877c190ec740a5422284ec5f9ff509b30b2d7896635476873dd8824e2
SHA51252bd0a38ca7f43b26731966035045b1cbd8b60b2d81bdf9aad791cf444da8af8b722ebf3cb364a6e660bebdf23084eb0e30bc23562575b704801669817549f8a
-
Filesize
152B
MD55e2f0fe48e7ee1aad1c24db5c01c354a
SHA15bfeb862e107dd290d87385dc9369bd7a1006b36
SHA256f13b3ebe8d71bd0086d5bb82364c35f59a95d32b39753af251e8639360e291a9
SHA512140d026437fd5e8a874cd00b03950c8f010e1a0732a0a1cc5bdde477e7f8315ccb95790bb4c15b8dbaab9468ad532eb885b6c429300a64e39412d976d079324e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD596bfa2fb47e49a55a98eb522b70f4003
SHA1df9d18d730acce6a3ac0cd507058cfe93407cbed
SHA25606d1f7b0698ad635a7c6b7f209790f43f7db8c4e9702244aa68ed71f36b6f8fe
SHA5128cc6afba59224359c4a7d06dad48a0c0f3d187137682b22dc6da16c736253a2987c36e99f70f17e500ec610f5c241437aa1216a5b67938015689dab4228a5c1c
-
Filesize
871B
MD54ccf47b383bafcb9ca4bccfd27203c19
SHA118bc1dc1cdc36a9957f77980d51e597422840b9c
SHA25681b511bc7e06d7c5cd3a37ca40077b84fe19185e02da4e9ecabb63ba75c61783
SHA5127199f61b3782aa1ee5c19fd8537bd123205ac13916f78fe0ba5406ff70bd5fc6c4993bf9eb7a1d46e2a7e865b979cb191f9370c09149f2e116b88baebc1966b5
-
Filesize
871B
MD5d3d93671dad51dc4172a82134e588830
SHA1e923cc478be1199b2c42be44d2e9ff8d27975c6a
SHA256981c1c8ca9072e75272506028524786e124dee22c4db805ec8de1e66174a8406
SHA5128462f86a8df940166647ef1935d537287668bce216faa9ded31f222cce198d6c312bd0e42ab6e22092f5e339e8908db3a5899961d05f3538e90b48484ecdbf9d
-
Filesize
6KB
MD515233cb6d2c37bd020dd529ca8a1f2a6
SHA1ef4605fee53858f5530a9f61cab5115748bef510
SHA256520195943cec43255144be2bff45c126cf0ac9eb6dc1a223d209959946efb393
SHA512dd43a906e2b8d09d2aa1b83dcb97a1e57b03fc2f7728f2eeb536170a532b5fe9eaaf0a68f0c5d150cadca3b74b0ec4f71f30f8c62ce937388a8742fd4ac3f658
-
Filesize
6KB
MD5edbd0219581cfd8cea6809cde18222bc
SHA18199f5106e13611c9ac38b50a7e1265b813da7f2
SHA256e397e5dc5677c563177cf11ad79fb3d4581101923b6d780bf1d1c73787c78ce4
SHA512d780b187d0c3031c20190c6c903b692dbc2df0ffadd9edf366ce44f6378d62a9b8b98eb5b89b61d4cbc465157e0ab5c17fde2916c3cf04caa605f46f66d0d0a2
-
Filesize
6KB
MD5a15667ed660e11cfb5ec33ed16302cd4
SHA191943e241c9e6ee7db2986e192cd9791b7ab252c
SHA256e883f27523ba98c8c141495475f10c24e37788571f62ad5ec5a36a1aac48dc6a
SHA51264cc04cc60fe669fe02201f1aa2afafa8a27a16fbf1f1a29823847a848c8712e1f03a3d762ed9543932c6b2fd3e003f53e1ba039e6dac4ffca08b5ea3aad27ab
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56052069eec3a4161efd0438b58774ea0
SHA15933ef77dceda128001458c4287f89579e9110b0
SHA256c73b88395867768485ea319dca1b55851fcb118313860d6e202a448ecacbc529
SHA5128cbf7ed070868fa0d4563b793a3896ea4f2e8221bf7c765ff68169bab8cb3911b5de4eec17d4a3de002476e4fb39bd54044222c594c3f09c34f54646bbdb1732
-
Filesize
705KB
MD5eb494bad9478bc28c4f8fb7fd7778445
SHA11b3e504108b39c6978e737e08d4cbd2c22d95e86
SHA256e1af346595829eba017ec343cb179dd217b7991fb322cc4e8f18bf40ef8f941d
SHA5128b14a9c14185d5afaba7443bf43cf14371ef3c3d524de00ba850f07952d1d18abdc62118cc4893ed2fa66570eb4098d01ba338f0cc00ae19be7bb697dc8d9f91
-
Filesize
442KB
MD5853a849864b0a11962f27832bb3cc84c
SHA1dcc4aedec6a3c56483979ba4343067066c4fe0e4
SHA256592c77e4ce824e191dce77ae631285443e7c2e53783c7211fbdebdb1b2af5cf6
SHA512e93a2a4ade5d43dc05e2ae3ae58183e6bbd578b1a106cde6a4a8380066d9a40fd502f3f237e402a70e061afbcd9965ae45389be51e9958e65e30d92b44fab497
-
Filesize
866KB
MD5dfbef39d176da6636249d8583ddcc96d
SHA17c61f1c649ee3ee21a297bb59d0c8c093cdfdc7e
SHA256837503486e5ef9cd430cbb2939d29bbca76491450759a749b69ff4619d9cc175
SHA512f50647d70b360698d404248ace1a18a9d25a3d9fac88715d6d984ab15ce644b220754b177bacb14b20e1eb773cdf4a1edec1efac834a1b76f5e71f036d1f2640
-
Filesize
677KB
MD5e473d4d66d043c5ef07b1bc80af31e27
SHA13b33cbc5fda3ded92434f450fbdf34c9da11f541
SHA256f7108dcf904c5256d8904ac2f9bc8cbd1e545dace38b4cf0210d9c3b7f10c919
SHA5124f3be6f4c3ee89d8e13928ddf22edfc09c55b1a0149b8c50d4aa1999183d33ba9273dc6c26a620b40954391972f91381a7d73bc3d1eeaa8e414f232bb20b7ba9
-
Filesize
381KB
MD51a0cdae51e615380089b0c953db3c70d
SHA1867bae67c4fb300bb30d0ac502864ebe8a0a634e
SHA256c8c6ed1345a13ff90a4d08d6b0852f78423e8ddc69ae8910ce7ddae65b165451
SHA512f0ffb1c91a6e771ac9256306d529b214c2a65902911422e6d820e4579fee5b02166f99725551de65b819dd0f70ebf57b641c6b3d50f333a1c3082be8afe5dce7